SlideShare une entreprise Scribd logo
1  sur  59
Extracting the Ham from Spam David J. Young
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History ,[object Object]
SP iced h AM
SPAM sketch http://www.youtube.com/results?search_query=spam+monty+python http://video.google.com/videosearch?q=spam+monty+python ,[object Object],[object Object]
Spam Spam Spam lyrics ,[object Object]
What is spam? ,[object Object],[object Object],[object Object]
The cost of spam ,[object Object],[object Object],[object Object]
How do spammers get e-mail addresses? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Anti-spam best practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Terminology True Positive (*****SPAM*****) False Positive SPAM (Positive) False Negative (*****SPAM*****) True Negative Not SPAM (Negative) Identified as SPAM Not Identified as SPAM
xxxxx Listing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More ASSP terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Processing matrix No processing (also doesn’t contribute to spam/nospam collections) Redlist   (but  does  contribute to spam/nospam collections) Doesn’t contribute to whitelist Spam Lover Normal ASSP operation Contributes to whitelist Unfiltered Mail Filtered Mail
What is ASSP? ,[object Object],[object Object],[object Object]
Theory of Operation ,[object Object],[object Object],[object Object]
True Theory of Operation ,[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP Target User Base ,[object Object],[object Object],[object Object],[object Object]
ASSP Philosophy ,[object Object],[object Object],[object Object],[object Object]
Main ASSP capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP Flexibility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP Mail Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Installation Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP Installation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configure ASSP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP Configuration
Initial Configuration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mail Flow Internet Mail Svr Clients Inbound Outbound Internet ASSP Mail Svr Clients Inbound Outbound Internet ASSP Mail Svr Clients Internet Mail Svr Clients with ASSP Internet Mail Svr ASSP Clients Invalid
Email Flow Internet ASSP GroupWise/ Exchange Clients Inbound Outbound MTA Internet GroupWise/ Exchange Clients MTA ASSP ASSP MTA smtp0 in out spam Not spam white red black grey Bayesian DB Errors 125 25
1999 This is an email that is being sent to the Internet. Th This is an email that is   GWIA MTA POA GroupWise Internet
2003 Internet GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA DNS Block List
2004 GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA sendmail SpamAssassin SpamAssassin Internet
2006 GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA ASSP sendmail ASSP spam Not spam white red black grey Bayesian DB Errors sendmail SpamAssassin SpamAssassin Internet
Phase In GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA ASSP sendmail ASSP spam Not spam white red black grey Bayesian DB Errors sendmail SpamAssassin SpamAssassin Internet
Flow with Anti-Virus Internet ASSP Mail Svr Clients Internet ASSP Clients Inbound Outbound Antivirus Mail Svr Antivirus
Flow with Groupware ,[object Object],Internet ASSP Groupware Clients Inbound Outbound MTA Internet Groupware Clients MTA ASSP
DNSBL vs Greylist ,[object Object],[object Object],[object Object]
Penalty Box ,[object Object]
SMTP Ports ,[object Object]
Sender Notification ,[object Object],[object Object]
Catch-22 ,[object Object],[object Object]
Email Interface ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spam Report
Benchmarks ,[object Object],[object Object],[object Object]
Filter effectiveness ,[object Object],[object Object],[object Object],[object Object],[object Object]
ASSP vs SpamAssassin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Before ASSP
Turning ASSP on
With ASSP
stat.pl Statistics [root@smtp]# perl stat.pl /tmp/m.log As of Mon Jan 22 21:48:46 2007 the mail logfile shows: 0 proxy / smtp connections 253 were dropped for attempted relays (0.0% of total). 31523 messages, 16758 were spam (53.2%) in 65 days for 485.0 messages per day or 257.8 spams per day 1518 additions to / verifications of the whitelist (23.4 per day) 14643 were judged spam by the bayesian filter (87.4% of spam) 2115 were to spam addresses (12.6% of spam) 0 were rejected for executable attachments (0% of spam) 10121 were sent from local clients (68.5% of nonspam) 842 were from whitelisted addresses (5.7% of nonspam) 0 messages were passed to SPAMLOVERs 3802 were ok after a bayesian check (25.8% of nonspam) 1498 addresses are on the whitelist 0 hits on the blacklist 0 resulted in spam (0.0% of Bayesian spam, 0.0% of blacklist hits) 0 resulted in non-spam (0.000% of blacklist hits)
ASSP Statistics
Issues ,[object Object],[object Object],[object Object],[object Object]
Lessons Learned ,[object Object],[object Object],[object Object],[object Object]
Utilities ,[object Object],[object Object],[object Object],[object Object]
Demo ,[object Object],[object Object]
Resources on the Internet ,[object Object],[object Object],[object Object]
Questions

Contenu connexe

En vedette

En vedette (7)

Etica y responsabilidad en el uso de las redes sociales
Etica y responsabilidad en el uso de las redes socialesEtica y responsabilidad en el uso de las redes sociales
Etica y responsabilidad en el uso de las redes sociales
 
Infograma
InfogramaInfograma
Infograma
 
Abpa . a diagnostic dilemma
Abpa . a diagnostic dilemmaAbpa . a diagnostic dilemma
Abpa . a diagnostic dilemma
 
Bienes de cambio
Bienes de cambioBienes de cambio
Bienes de cambio
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Греческая кухня
Греческая кухняГреческая кухня
Греческая кухня
 
Японская кухня
Японская кухняЯпонская кухня
Японская кухня
 

Similaire à ASSP: Extracting the Ham from Spam -- by David J. Young

Fighting Spam for fun and profit
Fighting Spam for fun and profitFighting Spam for fun and profit
Fighting Spam for fun and profitGiovanni Bechis
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedDryden Geary
 
Lessons Learned From the Evolution of Spam
Lessons Learned From the Evolution of SpamLessons Learned From the Evolution of Spam
Lessons Learned From the Evolution of SpamSparkPost
 
Sending email with perl
Sending email with perlSending email with perl
Sending email with perlapeiron
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paperniallmmackey
 

Similaire à ASSP: Extracting the Ham from Spam -- by David J. Young (9)

Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Fighting Spam for fun and profit
Fighting Spam for fun and profitFighting Spam for fun and profit
Fighting Spam for fun and profit
 
Email deliverability
Email deliverabilityEmail deliverability
Email deliverability
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
spam.ppt
spam.pptspam.ppt
spam.ppt
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Lessons Learned From the Evolution of Spam
Lessons Learned From the Evolution of SpamLessons Learned From the Evolution of Spam
Lessons Learned From the Evolution of Spam
 
Sending email with perl
Sending email with perlSending email with perl
Sending email with perl
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
 

Dernier

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

ASSP: Extracting the Ham from Spam -- by David J. Young

  • 1. Extracting the Ham from Spam David J. Young
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Terminology True Positive (*****SPAM*****) False Positive SPAM (Positive) False Negative (*****SPAM*****) True Negative Not SPAM (Negative) Identified as SPAM Not Identified as SPAM
  • 12.
  • 13.
  • 14. Processing matrix No processing (also doesn’t contribute to spam/nospam collections) Redlist (but does contribute to spam/nospam collections) Doesn’t contribute to whitelist Spam Lover Normal ASSP operation Contributes to whitelist Unfiltered Mail Filtered Mail
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. Mail Flow Internet Mail Svr Clients Inbound Outbound Internet ASSP Mail Svr Clients Inbound Outbound Internet ASSP Mail Svr Clients Internet Mail Svr Clients with ASSP Internet Mail Svr ASSP Clients Invalid
  • 31. Email Flow Internet ASSP GroupWise/ Exchange Clients Inbound Outbound MTA Internet GroupWise/ Exchange Clients MTA ASSP ASSP MTA smtp0 in out spam Not spam white red black grey Bayesian DB Errors 125 25
  • 32. 1999 This is an email that is being sent to the Internet. Th This is an email that is GWIA MTA POA GroupWise Internet
  • 33. 2003 Internet GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA DNS Block List
  • 34. 2004 GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA sendmail SpamAssassin SpamAssassin Internet
  • 35. 2006 GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA ASSP sendmail ASSP spam Not spam white red black grey Bayesian DB Errors sendmail SpamAssassin SpamAssassin Internet
  • 36. Phase In GWIA MTA POA GroupWise sendmail Virtuser table aliases Internet MTA ASSP sendmail ASSP spam Not spam white red black grey Bayesian DB Errors sendmail SpamAssassin SpamAssassin Internet
  • 37. Flow with Anti-Virus Internet ASSP Mail Svr Clients Internet ASSP Clients Inbound Outbound Antivirus Mail Svr Antivirus
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 46.
  • 47.
  • 48.
  • 52. stat.pl Statistics [root@smtp]# perl stat.pl /tmp/m.log As of Mon Jan 22 21:48:46 2007 the mail logfile shows: 0 proxy / smtp connections 253 were dropped for attempted relays (0.0% of total). 31523 messages, 16758 were spam (53.2%) in 65 days for 485.0 messages per day or 257.8 spams per day 1518 additions to / verifications of the whitelist (23.4 per day) 14643 were judged spam by the bayesian filter (87.4% of spam) 2115 were to spam addresses (12.6% of spam) 0 were rejected for executable attachments (0% of spam) 10121 were sent from local clients (68.5% of nonspam) 842 were from whitelisted addresses (5.7% of nonspam) 0 messages were passed to SPAMLOVERs 3802 were ok after a bayesian check (25.8% of nonspam) 1498 addresses are on the whitelist 0 hits on the blacklist 0 resulted in spam (0.0% of Bayesian spam, 0.0% of blacklist hits) 0 resulted in non-spam (0.000% of blacklist hits)
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.