Header:
Received-SPF: pass (mailserver: domain of 3gksa.com designates 38.64.38.198 as permitted sender)
client-ip=38.64.38.198
Received: from mai.hsphereonline.com ([38.64.38.198]) by mailserver with
MailEnable ESMTPS (version=TLS1 cipher=TLS_RSA_WITH_AES_256_CBC_SHA); Tue, 8 Jan 2019 18:41:37 -0600
Received: (qmail 8194 invoked by uid 399); 8 Jan 2019 19:41:48 -0500
Received: from unknown (HELO ?177-21-38-118.customer.sinalbr.com.br?) (sales@3gksa.com@45.70.3.130)
by mail.royaltyservers.com with ESMTPAMMMMMMMMMMMMMMMMMM; 8 Jan 2019 19:41:48 -0500
X-Originating-IP: 45.70.3.130
To: emailaddress@mailserver.com
X-Sender: <sales@3gksa.com>
List-ID: 9ftpfodwi32lmpl55j.lsiv05ogrqrscvdfr8
Abuse-Reports-To: <abuse@mailer.3gksa.com>
From: <emailaddress@mailserver.com>
Date: Wed, 9 Jan 2019 01:41:48 +0100
Errors-To: notification+gid5lr70_@3gksa.com
Subject: This account has been hacked! Change your password right now!
Message-ID: <1svszw.4nr3671fwmxgu14@mail.3gksa.com>
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset=UTF-8
X-header: 21
List-Unsubscribe:
<https://3gksa.com/unsubscribe/e/2236/mn ... zewb/11409>
List-Help: <mailto:{contact|info|abuse|zaut@3gksa.com?subject=help>
X-Complaints-To: <abuse@3gksa.com>
X-ME-CountryOrigin: CA
X-Envelope-Sender: sales@3gksa.com
X-ME-Bayesian: 50.000000
X-0Spam-Location: NonUS
Return-Path: <sales@3gksa.com>
X-Read: 1