Spam detection software, running on the system "intellinetinc.com", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or block similar future email. If you have any questions, see the administrator of that system for details. Content preview: Quoting "David F. Skoll" : > Really? I would think that most would at least contain the headers of the > failing message. Here is the typical bounce one of my users is getting. I can see everything there (and yes, the SPAM HTML message itself!) except for headers of the original message! [...] Content analysis details: (5.6 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.3 NO_REAL_NAME From: does not include a real name 0.0 HTML_MESSAGE BODY: HTML included in message 0.1 HTML_FONT_BIG BODY: HTML has a big font 0.4 HTML_FONT_INVISIBLE BODY: HTML font color is same as background 0.7 HTTP_EXCESSIVE_ESCAPES URI: Completely unnecessary %-escapes inside a URL 2.4 HTTP_ESCAPED_HOST URI: Uses %-escapes inside a URL's hostname 0.8 BIZ_TLD URI: Contains a URL in the BIZ top-level domain 0.8 PRIORITY_NO_NAME Message has priority setting, but no X-Mailer