Spam Score Checker

Analyze SpamAssassin reports and get a breakdown of sender spam scores.

Options

SpamAssassin Score Reference

Score Thresholds

  • < 2.0Clean / Legitimate
  • 2.0-5.0Suspicious
  • >= 5.0Likely Spam

Score Meanings

  • +X.XIndicates spam characteristics
  • -X.XIndicates legitimate email
  • 0.0Informational / No impact

Note: Administrator notices (e.g., blocked DNS queries) typically have 0.0 scores and indicate configuration issues rather than spam characteristics.

Default SpamAssassin Rules Reference (80 rules)
Showing 80 of 80 rules
ScoreRule NameCategoryDescription
+1000.0GTUBETestGeneric Test for Unsolicited Bulk Email
+4.4KB_RATWARE_OUTLOOK_MIDForgeryRatware Message-ID pretending to be Outlook
+4.3HELO_DYNAMIC_HCCNetworkHELO contains dynamic IP pattern
+4.3HK_NAME_DRUGSContentPharmaceutical spam keywords in sender name
+4.1BITCOIN_EXTORT_01ScamBitcoin extortion/sextortion attempt
+4.1KB_RATWARE_MSGIDForgeryRatware-style Message-ID detected
+4.0URI_PHISHPhishingURI found in phishing database
+4.0FORGED_MUA_OUTLOOKForgeryForged Outlook mail user agent
+3.9FSL_INTERIA_ABUSENetworkSent from known abuse source
+3.9MSGID_OUTLOOK_INVALIDForgeryInvalid Outlook Message-ID format
+3.8KB_DATE_CONTAINS_TABHeaderDate header contains tab character
+3.8FILL_THIS_FORM_LONGPhishingContains form-filling phishing text
+3.8DOS_BODY_HIGH_NO_MIDHeaderHigh body score with no Message-ID
+3.8HTML_SHORT_CENTERHTMLShort HTML message with centered text
+3.5PHISH_AZURE_CLOUDAPPPhishingLink to Azure cloudapp phishing site
+3.5BITCOIN_MALF_HTMLScamBitcoin malware/scam in HTML content
+3.5ADVANCE_FEE_3_NEWScamAdvance fee fraud (419 scam) patterns
+3.5FSL_HAS_TINYURLURIContains TinyURL shortened link
+3.5HTML_TEXT_INVISIBLE_STYLEHTMLInvisible text using CSS styling
+3.5URI_WP_DIRINDEXURIWordPress directory index exploit
+3.5PDS_FROM_2_EMAILSHeaderFrom header contains two email addresses
+3.5REPLICA_WATCHContentReplica watch spam keywords
+3.4SCC_CANSPAM_2LegalMissing CAN-SPAM compliance elements
+3.4FROM_MISSP_FREEMAILForgeryMisspelled freemail provider in From
+3.4TO_EQ_FM_HTML_ONLYHeaderTo equals From, HTML only message
+3.2FROM_MISSP_PHISHPhishingMisspelled domain in From (phishing)
+3.1MALE_ENHANCEContentMale enhancement spam keywords
+3.1UNDISC_MONEYScamUndisclosed money transfer scam
+3.1DEAR_WINNERScamLottery/prize winner scam
+3.1FROM_UNBAL2HeaderUnbalanced quotes in From header
+3.1UNDISC_FREEMHeaderUndisclosed recipients from freemail
+3.0FORGED_MUA_THEBAT_BOUNForgeryForged The Bat! mailer bounce
+3.0IMG_DIRECT_TO_MXURIImage links directly to mail server
+3.0LONG_INVISIBLE_TEXTHTMLLong sections of invisible text
+3.0ACCT_PHISHING_MANYPhishingMultiple account phishing indicators
+3.0URI_EXCESS_SLASHESURIExcessive slashes in URI (obfuscation)
+3.0URI_FIREBASEAPPPhishingFirebase app link (often phishing)
+3.0GOOG_STO_EMAIL_PHISHPhishingGoogle storage email phishing
+3.0HTML_ENTITY_ASCIIHTMLHTML entities for ASCII obfuscation
+3.1MONEY_FORMScamMoney transfer form scam
+2.9DOS_OE_TO_MX_IMAGENetworkOutlook Express to MX with image
+2.9X_MAILER_CME_6543_MSNForgeryForged MSN mailer header
+2.5MISSING_MIDHeaderMissing Message-ID header
+2.3TVD_PH_1PhishingPhishing pattern detected
+2.3FUZZY_CREDITContentFuzzy match on credit card terms
+2.2SUBJ_ALL_CAPSHeaderSubject is all capital letters
+2.1FROM_EXCESS_BASE64HeaderExcessive Base64 in From header
+2.1FUZZY_AMBIENContentFuzzy match on pharmaceutical terms
+2.0RCVD_IN_BL_SPAMCOP_NETNetworkListed in SpamCop blocklist
+2.0RCVD_IN_XBLNetworkListed in Spamhaus XBL
+1.8HTML_MESSAGEFormatHTML message (no plain text)
+1.7MISSING_HEADERSHeaderMissing essential headers
+1.6FORGED_OUTLOOK_HTMLForgeryOutlook HTML signature forged
+1.5MIME_HTML_ONLYFormatMIME HTML only, no text part
+1.5RCVD_IN_SBLNetworkListed in Spamhaus SBL
+1.3RCVD_IN_PBLNetworkListed in Spamhaus PBL
+1.2SPF_FAILAuthSPF check failed
+1.0DKIM_INVALIDAuthDKIM signature invalid
+1.0RDNS_NONENetworkNo reverse DNS for sending IP
+1.0URIBL_BLACKURIURI in Spamhaus URIBL blacklist
+0.8BAYES_50BayesBayesian spam probability 40-60%
+0.5HTML_FONT_LOW_CONTRASTHTMLLow contrast font colors
+0.1DKIM_SIGNEDAuthDKIM signature present (not validated)
+0.1SPF_HELO_NONEAuthNo SPF record for HELO domain
-1.9BAYES_00BayesBayesian spam probability 0-1%
-0.5BAYES_05BayesBayesian spam probability 1-5%
-0.1DKIM_VALIDAuthValid DKIM signature
-0.1DKIM_VALID_AUAuthDKIM valid, author domain match
-0.1DKIM_VALID_EFAuthDKIM valid, envelope from match
-0.1SPF_PASSAuthSPF check passed
-1.0ALL_TRUSTEDNetworkAll relays are trusted
+0.0RCVD_IN_DNSWL_NONENetworkListed in DNSWL, no trust level
-0.7RCVD_IN_DNSWL_LOWNetworkListed in DNSWL, low trust
-2.3RCVD_IN_DNSWL_MEDNetworkListed in DNSWL, medium trust
-5.0RCVD_IN_DNSWL_HINetworkListed in DNSWL, high trust
-0.5RCVD_IN_MSPIKE_H2NetworkCloudmark Sender Intelligence good
-1.0RCVD_IN_MSPIKE_H3NetworkCloudmark excellent reputation
-2.0RCVD_IN_MSPIKE_H4NetworkCloudmark outstanding reputation
-100.0USER_IN_WELCOMELISTWhitelistSender in user's welcomelist
-50.0USER_IN_DEF_WELCOMELISTWhitelistSender in default welcomelist

Source: Apache SpamAssassin GitHub Repository