ipv6-wg
Threads by month
- ----- 2025 -----
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- 1 participants
- 1055 discussions
Good morning all,
I have a question about chromecast audios
[https://www.whathifi.com/google/chromecast-audio/review] and their
operation on an IPv6-only mostly LAN.
Several months ago, following the great tutorial Ondřej Caletka from the
RIPE NCC did and then the talk Jen Linkova did in Tuesday's plenary at
RIPE87 in Rome, I deployed a new Vlan in my home network to test the use
of option 108 etc. It worked a treat to the point where I believed I'd
tested any potential corner cases and so a few weeks back I transitioned
to deploying it on my main home network vlan. Once again I thought
everything worked a treat and got no complaints until recent days when
my wife tried to stream some music to an old chromecast audio device we
use to connect to some wired ceiling speakers.
Having looked into the issue it would appear that the chromecast audio
can't/won't do v6 and this is something that caught me on the hop a
little. Those devices that are dual-stacked continue to see and can make
use of this chromecast audio but those devices that are happily working
away and utilising the option 108 to not have v4 (such as my wife's
mobile device) can no longer see/communicate with the chromecast.
I guess my question out of all of this is if any of you have run up
against this particular problem and if so what was your solution. I
suppose in theory it doesn't need to be a chromecast, I guess any device
that's unable or unwilling to use v6. How have you managed direct
communications between two devices on the same LAN segment whereby one
device is doing v6 only and the other refuses to use v6 and will only
use v4?
I'd dearly love to avoid having to turn off option 108 on the main network.
Thanks,
--
Mick O’Donovan
Senior Network Engineer
HEAnet CLG
Ireland's National Education and Research Network
3rd Floor, North Dock 2 | 93/94 North Wall Quay | Dublin D01 V8Y6 | Ireland
+353 1 6609040 | mick.odonovan(a)heanet.ie | www.heanet.ie
Registered in Ireland, No. 275301 | CRA No. 20036270
2
1

Re: [ipv6-wg] By Details 520, 000, 000, 000, 000 Reall Bank Melli IR540170000000221964447005 NAME :NOSRAT RAFE POOR DELIVERY FOR-DEBT Company's AutoBidMaster and Activated by the account number of Iran Account Bank account
by دانا یزدانی 24 Jun '24
by دانا یزدانی 24 Jun '24
24 Jun '24
در تاریخ دوشنبه ۲۴ اکتبر ۲۰۲۲، ۰۵:۲۳ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
> "{"@type":"dcat:Catalog","describedBy":"https:\/\/
> project-open-data.cio.gov
> \/v1.1\/schema\/catalog.json","conformsTo":"https:\/\/
> project-open-data.cio.gov\/v1.1\/schema","@context":"https:\/\/
> project-open-data.cio.gov\/v1.1\/schema\/data.json","dataset":[{"@type":"dcat:Dataset","title":"Antidumping
> and Countervailing Duty Federal Register Notices and Unpublished
> Decisions","description":"Antidumping and countervailing duty decisions
> published in the Federal Register and their accompanying unpublished issues
> and decision memoranda.","keyword":["dumping","imports","manufactured
> goods","subsidies","trade law","unfair
> trade"],"modified":"2018-07-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Brooke
> Kennedy","hasEmail":"mailto:Brooke.Kennedy@trade.gov
> "},"identifier":"DOC-4587","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"http:\/\/
> enforcement.trade.gov\/frn\/index.html","accrualPeriodicity":"R\/P1D","language":["en-US"]},{"@type":"dcat:Dataset","title":"Antidumping
> and Countervailing Duty Suspension Agreements and Other Bilateral
> Agreements","description":"Publicly-available list of suspension and other
> bilateral agreements administered by ITA, including active weblinks to
> Federal Register copies of agreements\/amendments and reference prices
> under non-market-economy agreements, where
> applicable.","keyword":["agreements","anti-dumping","bilateral","countervailing
> duty"],"modified":"2016-10-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Sally
> Gannon","hasEmail":"mailto:Sally.Gannon@trade.gov
> "},"identifier":"DOC-5442","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","accrualPeriodicity":"R\/P3M","landingPage":"https:\/\/
> www.trade.gov\/suspension-agreements","language":["en-US"]},{"@type":"dcat:Dataset","title":"Business
> Service Providers API","description":"The Business Service Providers (BSP)
> API is a directory of U.S. and foreign-based businesses providing services
> that many small and medium sized exporters require to succeed in foreign
> markets. Businesses can sign up to be a Service Provider on export.gov.
> The output format for this API is JSON. This data set is updated
> hourly.","keyword":["export","services","U.S.
> company"],"modified":"2020-07-21","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0010","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/PT1H","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=BusinessServiceProvidersAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"Consolidated
> Screening List API","description":"\u200bThe Consolidated Screening List
> API consolidates eleven export screening lists of the Departments of
> Commerce, State and the Treasury into a single data feed as an aid to
> industry in conducting electronic screens of potential parties to regulated
> transactions.","keyword":["compliance","control","denied persons
> list","enforcement","entity list","export","export compliance","export
> control","foreign sanctions","itar debarred","non-sdn Iranian
> sanctions","nonproliferation sanctions","palestinian legislative
> sanctions","part 561 list","sectoral sanctions","specially designated
> list","unverified
> list"],"modified":"2020-07-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0006","accessLevel":"public","bureauCode":["006:003"],"programCode":["006:003"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/PT1H","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=ConsolidatedScreeningListAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"De
> Minimis API","description":"The De Minimis API provides data about the De
> Minimis amount and the Value Added Tax (VAT) amount that products may be
> subject to when exported to foreign countries. \u201cDe Minimis\u201d is
> the threshold for a product\u2019s value below which no duty or tariff is
> charged. Furthermore, products below the De Minimis undergo minimal
> clearance procedures, such as customs and paperwork requirements.
> Similarly, the value of the exported products must exceed the VAT amount
> before it is subject to VAT. The API includes De Minimis and VAT amounts
> for almost 80 countries in that country\u2019s currency. The output format
> for this API is JSON. This data set is updated only when the De Minimis or
> VAT amounts have been updated, which is usually once a
> year.","keyword":["customs","de minimis","duty","export","minimal
> clearance","tariff","trade","VAT"],"modified":"2020-03-05","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0012","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"irregular","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=DeMinimisAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"Electronic
> Subsidies Enforcement Library","description":"Monitors foreign subsidies
> and identifies subsidies that can be remedied under the Subsidies Agreement
> of the World Trade
> Organization.","keyword":["enforcement","imports","manufactured
> goods","subsidy","trade law","unfair
> trade"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Jesse
> Cortes","hasEmail":"mailto:Jesse.Cortes@trade.gov
> "},"identifier":"DOC-4594","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"http:\/\/
> esel.trade.gov\/esel\/groups\/public\/documents\/web_resources\/esel_home.hcsp","accrualPeriodicity":"irregular","language":["en-US"]},{"@type":"dcat:Dataset","title":"Enhanced
> Global Steel Trade Monitor","description":"Enforcement and
> Compliance\u0027s Global Steel Trade Monitor provides global import and
> export trends for the top countries trading in steel mill products.To
> supplement ITA\u0027s core trade statistics in the Steel Import Monitoring
> and Analysis (SIMA) system, quarterly country reports for the top 20 steel
> importing and top 20 steel exporting countries will be published.Each
> country report includes export and import trends by country and aggregate
> product, production and consumption data, and where available, information
> about trade remedy actions taken on steel
> products.","keyword":["exports","imports","SIMA","steel","steel mill
> products","trade","U S
> steel"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Julie
> Al-Saadawi","hasEmail":"mailto:Julie.Al-Saadawi@trade.gov
> "},"identifier":"ITA-0020","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/data-visualization\/global-steel-trade-monitor","accrualPeriodicity":"R\/P1M","landingPage":"https:\/\/
> www.trade.gov\/steel","language":["en-US"]},{"@type":"dcat:Dataset","title":"FAQs
> on Exporting API","description":"The Frequently Asked Questions (FAQs) API
> includes more than 300 commonly asked questions about exporting. The
> answers provided are from government experts that specialize in unique
> aspects of trade.","keyword":["export","frequently asked
> questions"],"modified":"2020-03-23","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0008","accessLevel":"public","bureauCode":["006:004"],"programCode":["006:004"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/P1D","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=FAQsOnExportingAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"FTA
> Tariff Rates API","description":"The FTA Tariff Rates API provides data
> about each country with whom the United States has a Free Trade Agreement
> (FTA). When the U.S. enters into an FTA with a foreign government, it
> negotiates lower tariff rates with that government for a wide variety of
> products. A tariff is a tax that a company must pay a foreign country when
> shipping a product to that country. Typically the FTA tariffs rates decline
> over several years.","keyword":["export","free trade
> agreements","fta","rates","tariff"],"modified":"2019-07-29","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0007","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/P3M","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=FTATariffRatesAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"Foreign
> Trade Zones Annual Report to Congress","description":"Using data submitted
> by each zone, the FTZ Board prepares and submits a report annually to
> Congress summarizing activity conducted in foreign-trade zones throughout
> the year. The full report is available on the FTZ Board
> website.","keyword":["foreign trade zone","FTZ","FTZ
> Board"],"modified":"2018-11-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Elizabeth
> Whiteman","hasEmail":"mailto:Elizabeth.Whiteman@trade.gov
> "},"identifier":"DOC-5438","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"http:\/\/
> enforcement.trade.gov\/ftzpage\/annual-report.html","accrualPeriodicity":"irregular","language":["en-US"]},{"@type":"dcat:Dataset","title":"Foreign
> Trade Zones Manufacturing (T\/IM) Database","description":"This database
> allows the public to browse and search recent FTZ Board manufacturing
> approvals.","keyword":["foreign trade
> zone","FTZ","manufacturing"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Elizabeth
> Whiteman","hasEmail":"mailto:Elizabeth.Whiteman@trade.gov
> "},"identifier":"DOC-5426","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"http:\/\/
> ita-web.ita.doc.gov\/ia\/FTZManufac.nsf","accrualPeriodicity":"R\/P1D","language":["en-US"]},{"@type":"dcat:Dataset","title":"ITA
> Offices \u0026 Centers API","description":"\u200bThe ITA Offices \u0026
> Centers API provides contact and address information for all of ITA\u2019s
> domestic and international offices. There are almost 200 ITA offices
> worldwide whose locations are managed by ITA\u2019s internal office
> management system.","keyword":["agricultural exports","assistance
> center","contact","export
> assistance","information"],"modified":"2020-06-19","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0003","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/P1W","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=ITAOfficesAndCentersAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"ITA
> Taxonomies API","description":"The ITA Taxonomies API gives developers
> direct access to the exporting, trade, and investment terms that ITA uses
> to tag the content and data in its other APIs. Currently, ITA has three
> taxonomies: Geographic Regions, Industries, and Topics. This API includes
> all terms in their proper hierarchy in the relevant taxonomy.ITA imports
> data for its other APIs from many sources. If the source data is already
> tagged, ITA does the following: - Imports those tags (terms) along with the
> data - Maps the terms to ITA\u2019s taxonomies - Publishes both the
> original terms and the ITA terms with the data in the API.The output format
> for this API is JSON. This data set is updated
> hourly.","keyword":["export","industries","ITA","regions","taxonomy","topics","trade"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0011","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/PT1H","landingPage":"https:\/\/
> taxonomy-browser.trade.gov\/","language":["en-US"]},{"@type":"dcat:Dataset","title":"Foreign
> Trade Zones: Zone and Site Information","description":"Provides
> comprehensive information on each foreign-trade zone, including contact
> information, sites, sub-zones, approvals and actions.","keyword":["annual
> report","foreign trade
> zone","FTZ"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Elizabeth
> Whiteman","hasEmail":"mailto:Elizabeth.Whiteman@trade.gov
> "},"identifier":"DOC-5428","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"http:\/\/
> ita-web.ita.doc.gov\/FTZ\/OFISLogin.nsf","accrualPeriodicity":"R\/P1D","language":["en-US"]},{"@type":"dcat:Dataset","title":"U.S.
> Products Subject to Foreign Antidumping and Countervailing Duty
> Measures","description":"Comprehensive listing of foreign antidumping and
> antisubsidy (countervailing duty) actions involving U.S. exports. Actions
> (whether active investigations, measures or reviews) are listed by country
> and are tracked regularly and updated as needed. Information regarding each
> action includes date of initiation, preliminary and final determinations
> and the associated range of AD\/CVD measures in the form of duties or
> margins, other countries affected by the measure and when the measure is
> terminated or expires. Users are able to review all active actions for a
> particular foreign country, as well as view the historical archive of
> foreign AD\/CVD actions.","keyword":["AD CVD","antidumping","countervailing
> duty","u s
> exports"],"modified":"2018-06-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Michael
> Rollin","hasEmail":"mailto:Michael.Rollin@trade.gov
> "},"identifier":"DOC-5441","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"http:\/\/
> enforcement.trade.gov\/trcs\/foreignadcvd\/index.html","accrualPeriodicity":"R\/P1D","language":["en-US"]},{"@type":"dcat:Dataset","title":"Foreign
> Safeguard Activity Involving U.S. Exports","description":"Comprehensive
> listing of foreign safeguard actions involving U.S. exports. Actions
> (whether active investigations or measures) are listed by country and are
> tracked regularly and updated as needed. Information regarding each action
> includes date of initiation, preliminary and final determinations and the
> associated duties or quotas, and when the measure is terminated or expires.
> Users are able to review all active actions for a particular foreign
> country, as well as view the historical archive of foreign safeguard
> actions.","keyword":["foreign safeguard measures","u s
> exports"],"modified":"2018-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Michael
> Rollin","hasEmail":"mailto:Michael.Rollin@trade.gov
> "},"identifier":"DOC-5429","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov\/data-visualization\/foreign-trade-remedies-us-exports","accrualPeriodicity":"irregular","language":["en-US"]},{"@type":"dcat:Dataset","title":"Steel
> Import Monitoring and Analysis System (SIMA)","description":"The Steel
> Import Monitoring and Analysis (SIMA) System, under the Department of
> Commerce, collects and publishes data of steel mill product imports. By
> design this information provides stakeholders and public valuable
> information on steel trade with the United States. ","keyword":["downstream
> products","imports","license","SIMA","Steel","steel mill imports","US steel
> mill
> imports"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Julie
> Al-Saadawi","hasEmail":"mailto:Julie.Al-Saadawi@trade.gov
> "},"identifier":"DOC-4912","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/data-visualization\/downstream-monitor","accrualPeriodicity":"R\/P1M","landingPage":"https:\/\/
> www.trade.gov\/steel","language":["en-US"]},{"@type":"dcat:Dataset","title":"Trade
> Events API","description":"The Trade Events API provides data on events for
> U.S. businesses\u200b interested in selling their products and services
> overseas. These events\u200b include industry conferences, webinars,
> lectures, and trade missions organized by ITA and other trade
> agencies.","keyword":["conferences","export-import bank","international
> trade","lecture","overseas buying","products","selling","small business
> administration","state department","US trade and development
> agency","webinars"],"modified":"2020-07-21","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0001","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/PT1H","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=TradeEventsAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"Trade
> Leads API","description":"The Trade Lead\u200b\u200bs API provides
> information about potential contract opportunities for U.S. businesses
> selling their products and services overseas. These leads come from a
> variety of sources and we continue to expand the number of leads
> available.\u200b\u200b","keyword":["foreign
> sale","leads","opportunities","overseas","sales","selling","trade
> opportunities","trades"],"modified":"2020-07-21","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0004","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/P1D","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=TradeLeadsAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"U.S.
> Steel Export Monitor","description":"Table of U.S. exports of steel mill
> products for all steel mill products by quantity in metric
> tons.","keyword":["exports","SIMA","steel","steel mill products","US steel
> exports"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Julie
> Al-Saadawi","hasEmail":"mailto:Julie.Al-Saadawi@trade.gov
> "},"identifier":"ITA-0017","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/data-visualization\/steel-mill-export-monitor","accrualPeriodicity":"R\/P1M","landingPage":"https:\/\/
> www.trade.gov\/steel","language":["en-US"]},{"@type":"dcat:Dataset","title":"U.S.
> Steel Import Monitor","description":"The \u2018Import Monitor\u2019
> aggregates detailed license information and makes it available for public
> analysis on a weekly basis. All imported steel products under the U.S.
> Bureau of the Census (Census) definition of steel mill products are
> required to have an import license effective June 9, 20051. The data from
> the licensing system are used in conjunction with similar Census data to
> put together the \u2018Import Monitor\u2019. This Monitor helps alert users
> to changes in import patterns. The goal of the Import Monitor is to publish
> accurate, close to real-time aggregate volume, value, and pricing (average
> unit values of imports) data on steel imports through an easily accessible
> website.","keyword":["imports","steel","US steel
> imports"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Julie
> Al-Saadawi","hasEmail":"mailto:Julie.Al-Saadawi@trade.gov
> "},"identifier":"ITA-0016","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/data-visualization\/us-steel-import-monitor","accrualPeriodicity":"R\/P1W","landingPage":"https:\/\/
> www.trade.gov\/steel","language":["en-US"]},{"@type":"dcat:Dataset","title":"Zip
> Code to USEAC API","description":"The Zip Code to USEAC API provides direct
> access to the U.S. Export Assistance Centers (USEACs) that have been
> assigned to all of the 40,000+ zip codes in the United States. It\u2019s
> not enough to do a proximity search for a zip code and a USEAC. Each center
> has specialists on hand for each particular region. The output format for
> this API is JSON. This data set is updated
> daily.","keyword":["ITA","office","US export assistance
> center","USEAC","zip
> code"],"modified":"2020-05-13","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Kimberly
> Becht","hasEmail":"mailto:Kimberly.Becht@trade.gov
> "},"identifier":"ITA-0009","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"application\/json","accrualPeriodicity":"R\/P1D","landingPage":"https:\/\/
> api.trade.gov\/apps\/store\/apis\/info?name=ZipCodeToUseacAPI\u0026version=v1","language":["en-US"]},{"@type":"dcat:Dataset","title":"Antidumping
> and Countervailing Duty Fact Sheets","description":"Summary of final
> determinations from antidumping and countervailing duty
> investigations.","keyword":["antidumping duty, countervailing duty,
> initiation, preliminary, final, determination, fact
> sheet"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Brooke
> Kennedy","hasEmail":"mailto:Brooke.Kennedy@trade.gov
> "},"identifier":"ITA-0028","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> www.trade.gov\/ec-adcvd-case-announcements","accrualPeriodicity":"irregular","language":["en-US"]},{"@type":"dcat:Dataset","title":"Products
> Subject to Antidumping and Countervailing Duty Orders","description":"The
> International Trade Administration, Enforcement and Compliance Unit
> provides descriptions of the scope of products covered by antidumping (AD)
> and countervailing duty (CVD) orders.","keyword":["antidumping duty,
> countervailing duty, orders, scope, country
> name"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Brooke
> Kennedy","hasEmail":"mailto:Brooke.Kennedy@trade.gov
> "},"identifier":"ITA-0039","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> legacy.trade.gov
> \/enforcement\/operations\/scope\/index.asp","accrualPeriodicity":"irregular","landingPage":"https:\/\/
> legacy.trade.gov\/enforcement\/operations\/scope\/index.asp","language":["en-US"]},{"@type":"dcat:Dataset","title":"Trade
> Agreement Guides","description":"The International Trade Administration
> Office of Trade Agreements Negotiation and Compliance\u0027s Agreements
> Guides are quick, concise explanations of individual trade agreements.
> Aimed especially at small to medium-sized exporters, the Guides explain
> each agreement in plain language.","keyword":["trade agreements, agreements
> guide, WTO agreement, country name, trade
> compliance"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Brooke
> Kennedy","hasEmail":"mailto:Brooke.Kennedy@trade.gov
> "},"identifier":"ITA-0046","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> tcc.export.gov
> \/Trade_Agreements\/Exporters_Guides\/List_All_Guides\/index.asp","accrualPeriodicity":"irregular","landingPage":"https:\/\/
> tcc.export.gov\/Trade_Agreements\/Exporters_Guides\/List_All_Guides\/index.asp","language":["en-US"]},{"@type":"dcat:Dataset","title":"Service
> Provider Database","description":"Database of Service Provider Names,
> Websites, Mission, Location by Country, and Service Type who participated
> in the SelectUSA 2017 and 2018 Investment Summits","keyword":["Service
> Provider Database, Service Provider Director, Service Provider List,
> Service Provider Investment, FDI Service Provider, SelectUSA Service
> Provider"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Jacqueline
> Vitello","hasEmail":"mailto:Jacqueline.Vitello@trade.gov
> "},"identifier":"ITA-0059","accessLevel":"public","bureauCode":["006:043"],"programCode":["006:043"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> www.selectusa.gov
> \/servlet\/servlet.FileDownload?file=015t00000005hHz","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> www.selectusa.gov\/service-providers","language":["en-US"]},{"@type":"dcat:Dataset","title":"Economic
> Developer List","description":"Curated List of State Economic Developer
> Contacts","keyword":["Official State EDO POC, State EDO POC, State EDO
> List"],"modified":"2020-01-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Eric
> Crowley","hasEmail":"mailto:Eric.Crowley@trade.gov
> "},"identifier":"ITA-0065","accessLevel":"public","bureauCode":["006:043"],"programCode":["006:043"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> www.selectusa.gov
> \/State-Investment-Officials","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> www.selectusa.gov\/State-Investment-Officials","language":["en-US"]},{"@type":"dcat:Dataset","title":"SelectUSA
> Stats","description":"11 Dynamic Data Visualization Dashboards designed for
> Investor and Economic Developer Organization (EDO) audiences to answer
> basic FDI questions","keyword":["FDI Data, SelectUSA Stats, SelectUSA Data,
> State FDI Data, Country FDI
> Data"],"modified":"2020-11-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Elizabeth
> Schaefer","hasEmail":"mailto:Elizabeth.Schaefer@trade.gov
> "},"identifier":"ITA-0060","accessLevel":"public","bureauCode":["006:043"],"programCode":["006:043"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> www.selectusa.gov
> \/susa-stats","accrualPeriodicity":"R\/P3M","dataQuality":false,"landingPage":"https:\/\/
> www.selectusa.gov\/susa-stats","language":["en-US"]},{"@type":"dcat:Dataset","title":"SelectUSA
> Federal Programs Database","description":"Database of Federal programs
> organized by industry that international business investors may be eligible
> for.","keyword":["Federal Incentive Database, Federal FDI Incentives,
> Federal Program Database, Federal Programs and Incentives
> Database"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Elizabeth
> Schaefer","hasEmail":"mailto:Elizabeth.Schaefer@trade.gov
> "},"identifier":"ITA-0062","accessLevel":"public","bureauCode":["006:043"],"programCode":["006:043"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> www.selectusa.gov
> \/federal_incentives","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> www.selectusa.gov\/federal_incentives","language":["en-US"]},{"@type":"dcat:Dataset","title":"Canadian
> Travel to the U.S. (Canadian Statistics) Program","description":"Monthly
> and annual Canadian arrivals of one or more nights to the U.S. are provided
> by Statistics Canada for analysis and reporting. A limited amount of U.S.
> resident travel to Canada is also reported at a monthly level. Monthly
> level data are reported by mode of transportation with a 3-4 month lag
> time. Annual data are made available to Tourism Industries at the end of
> May and a written report with graphics and spreadsheets is generally
> available in the late summer. The annual report analyzes travelers by
> province of origin, season of travel, mode of transportation,
> etc.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Frank
> Spector","hasEmail":"mailto:Frank.Spector@trade.gov
> "},"identifier":"ITA-0031","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> travel.trade.gov\/research\/programs\/canada\/index.asp","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"Export
> Related Jobs","description":"This site provides national- and
> industry-level estimates of jobs supported by exports of goods and
> services from the United States.","keyword":["exports","jobs","manufactured
> goods","services"],"modified":"2018-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Chris
> Rasmussen","hasEmail":"mailto:Chris.Rasmussen@trade.gov
> "},"identifier":"DOC-4502","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> trade.gov
> \/feature-article\/otea-publications","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> travel.trade.gov\/research\/programs\/forecast\/index.asp","language":["en-US"]},{"@type":"dcat:Dataset","title":"Exporter
> Database","description":"This tool provides a statistical overview and
> tables outlining the export activities of U.S. small and medium-sized
> enterprises (SMEs), which are defined as firms that have fewer than 500
> employees. All figures in this overview and tables include only
> identifiable or \u0022known\u0022 exports, i.e., exports that can be linked
> to individual companies using information on U.S. export
> declarations.","keyword":["exporter","small and medium
> business","SME"],"modified":"2018-10-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Anne
> Flatness","hasEmail":"mailto:Anne.Flatness@trade.gov
> "},"identifier":"DOC-4501","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"http:\/\/
> tse.export.gov\/EDB\/SelectReports.aspx?DATA=ExporterDB","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"Forecast
> of International Arrivals to the U.S. Program","description":"An
> econometric-based forecast of tourism arrivals to the U.S. from more than
> 20 primary and secondary international markets. Provides forecasted
> arrivals for a 3 year horizon. Outbound international travel is forecast or
> reported for Mexico, Canada and overseas travel only.","keyword":["Not
> Applicable"],"modified":"2019-10-05","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Frank
> Spector","hasEmail":"mailto:Frank.Spector@trade.gov
> "},"identifier":"ITA-0032","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> travel.trade.gov\/research\/programs\/forecast\/index.asp","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"FTA
> Tariff Tool","description":"This tariff search tool allows users to find
> tariff information on specific industrial goods covered under the U.S.
> FTAs. The tool shows the tariff applied on the date the FTA enters into
> force and the rates each subsequent year as the tariffs are eliminated
> under the agreement.","keyword":["agreement","free
> trade","fta","goods","tariff"],"modified":"2019-06-01","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Jessica
> Huang","hasEmail":"mailto:Jessica.Huang@trade.gov
> "},"identifier":"DOC-4911","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"http:\/\/
> export.gov\/fta\/ftatarifftool\/ftamain.aspx","accrualPeriodicity":"R\/P3M","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"I-94
> Arrivals: Monthly, Quarterly and Annual","description":"Monthly
> international visitation data are collected and reported by the National
> Travel and Tourism Office\u0027s (NTTO) Visitor Arrivals Program (I-94
> Record).","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Claudia
> Wolfe","hasEmail":"mailto:Claudia.Wolfe@trade.gov
> "},"identifier":"ITA-0033","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> travel.trade.gov\/research\/monthly\/arrivals\/index.asp","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"International
> Travel Receipts And Payments Program","description":"This program provides
> information on U.S. travel and tourism receipts (exports), payments
> (imports), and the balance of trade for major world regions and select
> countries. The National Travel and Tourism Office (NTTO) obtains these data
> from the Bureau of Economic Analysis (BEA) and publishes preliminary data
> in March, revised data in June, and final annual data in
> October.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Frank
> Spector","hasEmail":"mailto:Frank.Spector@trade.gov
> "},"identifier":"ITA-0034","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> travel.trade.gov\/research\/reports\/recpay\/index.asp","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"International
> Visitation and Spending in the United States","description":"The National
> Travel and Tourism Office (NTTO) works cooperatively with the U.S.
> Department of Homeland Security (DHS)\/U.S. Customs and Border Protection
> (CBP)to release arrivals data, providing a comprehensive count of all
> travelers entering the United States.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Claudia
> Wolfe","hasEmail":"mailto:Claudia.Wolfe@trade.gov
> "},"identifier":"ITA-0035","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> travel.trade.gov\/outreachpages\/inbound.general_information.inbound_overview.asp","language":["en-US"]},{"@type":"dcat:Dataset","title":"Metropolitan
> Export Series","description":"This tool provides data on exports of goods
> from major U.S. metropolitan areas, as defined by the Bureau of the Census.
> These data are based on an Origin of Movement (OM) Zip-code-based series,
> and are therefore not comparable with an OM state-based series, like that
> available from TradeStats
> Express.","keyword":["cities","exports","metropolitan area","NAICS","top
> markets"],"modified":"2018-10-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Anne
> Flatness","hasEmail":"mailto:Anne.Flatness@trade.gov
> "},"identifier":"DOC-4517","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"http:\/\/
> tse.export.gov
> \/METRO\/SelectReports.aspx?DATA=Metro","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> www.trade.gov\/ita-metropolitan-export-series","language":["en-US"]},{"@type":"dcat:Dataset","title":"Monthly
> Tourism Statistics: Outbound Travel by World
> Regions","description":"Monthly U.S. citizen departures are collected and
> reported in Tourism Industries U.S. International Air Travel Statistics
> (I-92 data) Program.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Richard
> Champley","hasEmail":"mailto:Richard.Champley@trade.gov
> "},"identifier":"ITA-0037","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> travel.trade.gov\/research\/monthly\/departures\/index.html","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"Outbound
> Travel from the U.S.","description":"U.S. citizen travel to overseas
> regions.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Frank
> Spector","hasEmail":"mailto:Frank.Spector@trade.gov
> "},"identifier":"ITA-0038","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"https:\/\/
> travel.trade.gov\/outreachpages\/outbound.general_information.outbound_overview.asp","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"Survey
> of International Travelers (SIAT)","description":"The Survey of
> International Air Travelers is an on-going primary research program which
> gathers statistical data about air passenger travelers in U.S. - overseas
> and U.S. - Mexican markets. Survey data provides information on passenger
> trip planning, travel patterns, demographics and spending for two separate
> populations \u2013 non-U.S. residents traveling to the U.S. and U.S.
> residents traveling from the U.S.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Frank
> Spector","hasEmail":"mailto:Frank.Spector@trade.gov
> "},"identifier":"ITA-0044","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> travel.trade.gov\/research\/programs\/ifs\/index.asp","language":["en-US"]},{"@type":"dcat:Dataset","title":"Top
> Market Reports","description":"The International Trade
> Administration\u0027s Top Markets Series is meant to help exporters
> determine their next export market by comparing opportunities across
> borders. Each report ranks future export opportunities within a particular
> industry based on a sector-specific methodology. The reports provide a
> detailed assessment of the competitiveness landscape within a sector, as
> well as the opportunities and challenges facing U.S. exporters in key
> markets","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"John
> Miller","hasEmail":"mailto:John.Miller@trade.gov
> "},"identifier":"ITA-0045","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> legacy.trade.gov\/topmarkets\/","language":["en-US"]},{"@type":"dcat:Dataset","title":"Trade
> Policy Information System (TPIS)","description":"TPIS includes detailed
> current and historical trade data from various sources, including: detailed
> U.S. merchandise trade statistics (originating with the Bureau of the
> Census); trade statistics of over 170 countries (from the United Nations);
> and multi-country statistics on international finance, direction of trade,
> balance of payments and developing country debt (from the International
> Monetary Fund and World
> Bank).","keyword":["current","historical","partner","products","state","statistics","TPIS","trade"],"modified":"2020-10-07","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Anne
> Flatness","hasEmail":"mailto:Anne.Flatness@trade.gov
> "},"identifier":"ITA-0015","accessLevel":"public","bureauCode":["006:002"],"programCode":["006:002"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"http:\/\/
> tpis.trade.gov","accrualPeriodicity":"R\/P1M","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"Travel
> and Tourism Indicators","description":"The U.S. Department of Commerce,
> Department of Homeland Security, and Department of State prepare these
> performance indicators for international travel to the United States and
> for travel facilitation programs.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Frank
> Spector","hasEmail":"mailto:Frank.Spector@trade.gov
> "},"identifier":"ITA-0048","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> legacy.trade.gov\/travelindicators\/","language":["en-US"]},{"@type":"dcat:Dataset","title":"Travel
> and Tourism Satellite Account (TTSA) Program","description":"Statistics and
> reports on how much U.S. tourists spend and the prices they pay for
> lodging, airfare, souvenirs, and other travel-related
> items.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Frank
> Spector","hasEmail":"mailto:Frank.Spector@trade.gov
> "},"identifier":"ITA-0049","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"http:\/\/
> travel.trade.gov\/research\/programs\/satellite\/index.asp","language":["en-US"]},{"@type":"dcat:Dataset","title":"U.S.
> International Air Travel Statistics (I-92 data)
> Program","description":"Information on international air traffic between
> the United States and other countries. Provides publications for a
> fee.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Richard
> Champley","hasEmail":"mailto:Richard.Champley@trade.gov
> "},"identifier":"ITA-0050","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","downloadURL":"http:\/\/
> travel.trade.gov\/research\/programs\/i92\/index.html","accrualPeriodicity":"irregular","dataQuality":false,"language":["en-US"]},{"@type":"dcat:Dataset","title":"U.S.
> Textiles and Apparel Imports Under Free Trade
> Agreements","description":"Statistics on imports of textile and apparel
> products into the U.S. under free trade agreements.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Robert
> Carrigg","hasEmail":"mailto:Robert.Carrigg@trade.gov
> "},"identifier":"ITA-0054","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> otexa.trade.gov\/msrpoint.htm#fta","language":["en-US"]},{"@type":"dcat:Dataset","title":"U.S.
> Textiles and Apparel Trade Preference Program
> Statistics","description":"Statistics and reports on U.S. imports under
> trade preference programs.","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Robert
> Carrigg","hasEmail":"mailto:Robert.Carrigg@trade.gov
> "},"identifier":"ITA-0056","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> otexa.trade.gov\/msrpoint.htm","language":["en-US"]},{"@type":"dcat:Dataset","title":"Visitor
> Arrivals Program (I-94 Data)","description":"The International Visitor
> Arrivals Program provides the U.S. government and the public with the
> official monthly and annual overseas visitor arrivals to the United States.
> The National Travel and Tourism Office (NTTO) manages the program in
> cooperation with the Department of Homeland Security, Customs and Border
> Protection (CBP).","keyword":["Not
> Applicable"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Claudia
> Wolfe","hasEmail":"mailto:Claudia.Wolfe@trade.gov
> "},"identifier":"ITA-0057","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> travel.trade.gov\/research\/programs\/i94\/index.asp","language":["en-US"]},{"@type":"dcat:Dataset","title":"Privacy
> Shield Lists of U.S. Companies","description":"The EU-U.S. and Swiss-U.S.
> Privacy Shield Frameworks are mechanisms that companies can use to comply
> with data protection requirements when transferring personal data from the
> European Union and Switzerland to the United States. ITA\u0027s Privacy
> Shield Team maintains two lists that are made available to the public: 1)
> the Privacy Shield Active List, and 2) the Privacy Shield Inactive List.
> The Active List is an authoritative list of U.S. organizations that have
> self-certified to the Department of Commerce and declared their commitment
> to adhere to the Privacy Shield Principles. The Inactive List is an
> authoritative list of U.S. organizations that are no longer self-certified
> under Privacy Shield and are therefore no longer assured of the benefits of
> using Privacy Shield to receive personal data from the European Union
> and\/or Switzerland. Upon request, the Privacy Shield Team may provide a
> copy of the list in the form of an Excel spreadsheet.","keyword":["active
> participants","inactive participants","active
> list","inactive","list"],"modified":"2020-07-20","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Rochelle
> Osei-Tutu","hasEmail":"mailto:Rochelle.Osei-Tutu@trade.gov
> "},"identifier":"ITA-0066","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov\/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"N\/A
> - the list is not
> downloadable","accrualPeriodicity":"R\/P1D","dataQuality":false,"landingPage":"https:\/\/
> www.privacyshield.gov","language":["en-US"]},{"@type":"dcat:Dataset","title":"Aerospace
> and Defense Data: Data Visualization","description":"This site collates
> and visualizes critical indicators within the aerospace and defense markets
> to enable firms to develop export strategies and identify target markets.
> These data include trade flows (exports and imports) of aerospace products,
> M3 shipment values of defense and non-defense aircraft and parts, annual
> employment data, and defense exports delineated by country and products.
> Users can download the data themselves or use the onscreen tools to
> visualize the
> data.","keyword":["aerospace","defense","exports","imports","shipments","jobs","manufactured
> goods"],"modified":"2020-12-10","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Jonathan
> Alvear","hasEmail":"mailto:Jonathan.Alvear@trade.gov
> "},"identifier":"ITA-0067","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/data-visualization\/aerospace-and-defense-data","accrualPeriodicity":"R\/P3M","dataQuality":false,"landingPage":"https:\/\/
> www.trade.gov\/data-visualization\/aerospace-and-defense-data","language":["en-US"]},{"@type":"dcat:Dataset","title":"ADIS\/I-94:
> Monthly, Quarterly, and Annual Visitror Arrivals
> (Volume)","description":"U.S. volume visitation data (from overseas\/all
> modes and Mexico\/air and sea) are collected and reported by the National
> Travel and Tourism Office\u0027s (NTTO) ADIS\/I-94 Visitor Arrivals Program
> (source: CBP\/DHS ADIS\/I-94 Record).","keyword":["ADIS","Arrival and
> Departure Information System","I-94","visitor arrivals","U.S.
> arrivals","United States arrvals","international arrivals","visitor
> volume","overseas visitation","top countries","world regions","travel
> exports-volume","monthly arrivals","foreign visitors","monthly
> visitation","top ports","port of entry","business v. pleasure","visa
> type","country of residence","COR","country of citizenship","COC ","Mexico
> Air"],"modified":"2021-05-22","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Claudia
> Wolfe","hasEmail":"mailto:Claudia.Wolfe@trade.gov
> "},"identifier":"ITA-0068","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"license":"http:\/\/
> www.usa.gov
> \/publicdomain\/label\/1.0\/","mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/travel-and-tourism-research","accrualPeriodicity":"R\/P1M","dataQuality":false,"landingPage":"https:\/\/
> www.trade.gov\/i-94-arrivals-program","language":["en-US"]},{"@type":"dcat:Dataset","title":"Automotive
> Industry Trade Data Visualization","description":"This site collates and
> visualizes critical indicators within the automotive vehicles and parts
> markets to enable firms to develop export strategies and identify target
> markets. These data include trade flows (exports and imports) of New
> Passenger Vehicles and Light Trucks, Medium- and Heavy-Duty Trucks, Used
> Vehicles, and Automotive
> Parts.","keyword":["Automotive","Vehicles","passenger","used","trucks","medium-duty","heavy-duty","parts","original
> equipment","aftermarket","exports","imports;"],"modified":"2021-03-21","publisher":{"@type":"org:Organization","name":"International
> Trade
> Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Forrest
> Nielsen","hasEmail":"mailto:Forrest.Nielsen@trade.gov
> "},"identifier":"ITA-0069","accessLevel":"public","bureauCode":["006:041"],"programCode":["006:041"],"mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/automotive-trade-data","accrualPeriodicity":"R\/P3M","dataQuality":false,"landingPage":"https:\/\/
> www.trade.gov\/automotive-trade-data","language":["en-US"]},{"@type":"dcat:Dataset","title":"FAQs
> for Aluminum","description":"Frequently Asked Questions covering the
> Aluminum Import Monitoring system, which includes both the aluminum import
> monitoring system and the import
> monitor.","keyword":["imports","aluminum","US aluminum
> imports","license"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Julie
> Al-Saadawi","hasEmail":"mailto:Julie.Al-Saadawi@trade.gov
> "},"identifier":"ITA-0070","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/faqs\/aim-system-faqs","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> www.trade.gov\/faqs\/aim-system-faqs","language":["en-US"]},{"@type":"dcat:Dataset","title":"FAQs
> for Steel","description":"Frequently Asked Questions covering the Steel
> Import Monitoring system, which includes both the steel import monitoring
> system and the import monitor","keyword":["imports","steel","US steel
> imports","license"],"modified":"2020-06-17","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Julie
> Al-Saadawi","hasEmail":"mailto:Julie.Al-Saadawi@trade.gov
> "},"identifier":"ITA-0071","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/faqs\/sima-faqs","accrualPeriodicity":"irregular","dataQuality":false,"landingPage":"https:\/\/
> www.trade.gov\/faqs\/sima-faqs","language":["en-US"]},{"@type":"dcat:Dataset","title":"U.S.
> Aluminum Import Monitor","description":"The \u2018Import Monitor\u2019
> aggregates detailed license information and makes it available for public
> analysis on a weekly basis. All imported aluminum products under the U.S.
> Bureau of the Census (Census) definition of steel mill products are
> required to have an import license effective June 28, 2021. The data from
> the licensing system are used in conjunction with similar Census data to
> put together the \u2018Import Monitor\u2019. This Monitor helps alert users
> to changes in import patterns. The goal of the Import Monitor is to publish
> accurate, close to real-time aggregate volume, value, and pricing (average
> unit values of imports) data on aluminum imports through an easily
> accessible website.","keyword":["imports","aluminum","US aluminum
> imports"],"modified":"2019-08-01","publisher":{"@type":"org:Organization","name":"International
> Trade Administration"},"contactPoint":{"@type":"vcard:Contact","fn":"Julie
> Al-Saadawi","hasEmail":"mailto:Julie.Al-Saadawi@trade.gov
> "},"identifier":"ITA-0072","accessLevel":"public","bureauCode":["006:042"],"programCode":["006:042"],"mediaType":"text\/html","downloadURL":"https:\/\/
> www.trade.gov
> \/data-visualization\/us-aluminum-import-monitor","accrualPeriodicity":"R\/P1W","dataQuality":false,"landingPage":"https:\/\/
> www.trade.gov\/aluminum","language":["en-US"]}]}"
>
> https://www.trade.gov/data.json#:~:text=%7B%22%40type%22%3A%22dcat%3ACatalo…
>
> 09392430244
>
1
0

Re: [ipv6-wg] ipv6-wg post acknowledgementhttp://localhost:26543/storage/0000-5979/%D9%BE%D9%88%D8%B4%D9%87+%D9%BE%D8%A7%D8%B1%D8%AA+%D8%AD%D8%B3%D8%A7%D8%A8+%D8%A8%D8%A7%D9%86%DA%A9+%D9%85%D9%84%D8%AA/4C000R%2C000%2C000R.htmlDevice
by دانا یزدانی 24 Jun '24
by دانا یزدانی 24 Jun '24
24 Jun '24
در تاریخ دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۲:۱۲ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
> Support File html
>
> در تاریخ دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۲:۰۶ <ipv6-wg-bounces(a)ripe.net> نوشت:
>
>> Your message entitled
>>
>>
>>
>> was successfully received by the ipv6-wg mailing list.
>>
>> List info page: https://lists.ripe.net/mailman/listinfo/ipv6-wg
>> Your preferences:
>> https://lists.ripe.net/mailman/options/ipv6-wg/danayzdanyyzdanydana%40gmail…
>>
>
1
0
Send ipv6-wg mailing list submissions to
ipv6-wg(a)ripe.net
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ripe.net/mailman/listinfo/ipv6-wg
or, via email, send a message with subject or body 'help' to
ipv6-wg-request(a)ripe.net
You can reach the person managing the list at
ipv6-wg-owner(a)ripe.net
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ipv6-wg digest..."
----------
Today's Topics:
1. Re: ipv6-wg Digest, Vol 147, Issue 10 (???? ??????)
Re: [ipv6-wg] ipv6-wg Digest, Vol 147, Issue 10
>From دانا یزدانی danayzdanyyzdanydana(a)gmail.com
Date ۲۴ ژوئن, ۰۱:۵۲
To ipv6-wg(a)ripe.net
Send ipv6-wg mailing list submissions to
ipv6-wg(a)ripe.net
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ripe.net/mailman/listinfo/ipv6-wg
or, via email, send a message with subject or body 'help' to
ipv6-wg-request(a)ripe.net
You can reach the person managing the list at
ipv6-wg-owner(a)ripe.net
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ipv6-wg digest..."
Today's Topics:
1. Fwd: Iban number:IR720120010000001524852803 deliverable
Rename money cash rule transfer Documents deliverable Money
accepted to iban number bank mellat IR160170000000347789811007
Name Tahsin Yazdani (???? ??????)
---------- Forwarded message ----------
From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
To: ipv6-wg(a)ripe.net
Cc:
Bcc:
Date: Mon, 24 Jun 2024 01:41:41 +0330
Subject: [ipv6-wg] Fwd: Iban number:IR720120010000001524852803 deliverable
Rename money cash rule transfer Documents deliverable Money accepted to
iban number bank mellat IR160170000000347789811007 Name Tahsin Yazdani
---------- Forwarded message ---------
فرستنده: دانا یزدانی <danayzdanyyzdanydana(a)gmail.com>
Date: دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۲۵
Subject: Re: Iban number:IR720120010000001524852803 deliverable Rename
money cash rule transfer Documents deliverable Money accepted to iban
number bank mellat IR160170000000347789811007 Name Tahsin Yazdani
To: <ipv6-wg(a)ripe.net>
Re info send money cash rule Rial Iranian Amount HTML Send To Account
Number IR750180000000003610935000 access has been included status...
Delivery accept documents bank mellat IR170120010000003315992937 Re: Fwd:
deliverable: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR160170000000347789811007 Name
Tahsin Yazdani name Asgar Siavoshi IP176.56.156.137 185.129.238.152
Document Bank Mellat IR170120010000003315992937
در تاریخ دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۱۳ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
09392430244
در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۵ dana yazdani <
danayzdanyyzdanydana8888(a)gmail.com> نوشت:
danayzdanyyzdanydana(a)gmail.com
در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۰ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
09392430244
---------- Forwarded message ---------
فرستنده: <postmaster(a)accountprotection.microsoft.com>
Date: سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۷
Subject: deliverable: Re: deliverable: Ticket Received - Fwd: Re info send
money xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank
Name Bank Mellat Accept To History Accoun Number IR720120010000001524852803
name Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
To: <danayzdanyyzdanydana(a)gmail.com>
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Was this helpful? Send feedback to Microsoft.
More Info for Email Admins
Status code 554 5.4.14
Typically this error occurs because the recipient email address is
incorrect or doesn't exist at the destination domain. This can usually be
fixed by the sender. However, sometimes the issue needs to be fixed by the
recipient or the recipient's email admin. If the steps in the How to Fix It
section above don't fix the problem, and you're the email admin for the
recipient, try one or more of the following:
The email address exists and is correct - Confirm that the recipient
address exists, is correct, and is accepting messages.
Synchronize your directories - If you have a hybrid environment and are
using directory synchronization make sure the recipient's email address is
synced correctly in both Office 365 and in your on-premises directory.
Errant forwarding rule - Check for forwarding rules that aren't behaving as
expected. A forwarding rule can be configured by an admin via mail flow
rules or mailbox forwarding address settings, or by the recipient via the
Inbox Rules feature.
Mail flow settings and MX records are not correct - Misconfigured mail flow
settings or MX records can cause this error. Check your Office 365 mail
flow settings to make sure your domain and any mail flow connectors are set
up correctly. Also, work with your domain registrar to make sure the MX
records for your domain are configured correctly.
Mail loop detected - This error also indicates that the receiving
organization's email settings are misconfigured, creating a mail loop when
a message is sent to an address that isn't found in their directory. This
usually won't disrupt mail flow for recipients that actually exist, but the
recipient's email admin should fix the misconfiguration to reduce the
chance of any other mail flow issues. A common cause for this loop is that
the recipient's domain is configured as "Internal Relay" when it should be
"Authoritative." Another common cause for the loop is that both the sender
and recipient are part of the same organization, but the sender's mailbox
is hosted by Office 365, while the recipient's mailbox is hosted
on-premises, and an outbound connector from Office 365 to the on-premises
email servers is missing or misconfigured. To fix this, the recipient's
email admin should create a correctly configured outbound connector in
Office 365 to route the message to the on-premises mailbox.
For more information and tips to fix this problem, see Fix email delivery
issues for error code 5.4.14 in Office 365.
Original Message Details
Created Date: 3/12/2024 5:47:03 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
08DC40438C273EBF]
Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
Notification Details
Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
Message Hops
HOP TIME (UTC) FROM TO WITH RELAY TIME
1 3/12/2024
5:47:18 PM mail-ua1-f46.google.com SMTP 15 sec
2 3/12/2024
5:47:18 PM mail-ua1-f46.google.com
DS1PEPF00017092.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
3 3/12/2024
5:47:18 PM DS1PEPF00017092.namprd03.prod.outlook.com
CH2PR08CA0003.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
4 3/12/2024
5:47:18 PM CH2PR08CA0003.namprd08.prod.outlook.com
DM6PR16MB3878.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
5 3/12/2024
5:47:21 PM NAM11-DM6-obe.outbound.protection.outlook.com
BL02EPF0001A108.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 3 sec
6 3/12/2024
5:47:22 PM BL02EPF0001A108.namprd05.prod.outlook.com
MN2PR12CA0014.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
7 3/12/2024
5:47:22 PM MN2PR12CA0014.namprd12.prod.outlook.com
SN4PR16MB4942.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
8 3/12/2024
5:47:26 PM NAM11-BN8-obe.outbound.protection.outlook.com
MN1PEPF0000ECD9.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 4 sec
9 3/12/2024
5:47:26 PM MN1PEPF0000ECD9.namprd02.prod.outlook.com
BL1PR13CA0199.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
10 3/12/2024
5:47:27 PM BL1PR13CA0199.namprd13.prod.outlook.com
SJ0PR16MB4857.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
Original Message Headers
ARC-Seal: i=5; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=Aa5YWsMr4EgpLJ1IvCsAbdxCafdxhZgTpZCBAO3Hxs5qv9lTx8Dze+VL8VX/SCaDcwDde0Dm6OUKxl/8blopnAsj3SgoqukPp4LdxpAUlcdt13w3kxH2jV0DzZuyoXgfN7b7uMuKzPHnN9+fqMIgCxKFIXIL3l43aak9TWKq0in/IAv8QZj/oIhyyFaQ0lriEsP5mre5wMuNe2Mt599r+YVCu27PYfaZGJxeROopPNggS2bkDLxYaKXL+ULj1myX815TkpeeDph4PWfxXoEUVYwNHASB60T8x7UCpHVoNEWtmTY4LmnZrSTtXRDzYyRQ2wSXWBL7Gtmo6QBl30Srlw==
ARC-Message-Signature: i=5; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=NpqIrGJbRMK4KejwTwBBPDIRnTIJT86mwVRFXzUrmAYRojpaGNLoAfC7KhX53IA1jcw+jhcUBfq8X8Fm+5ggc1zxH7ROwlcVc6LIGuigHC185BmDdYxSVjkQBu79hcTeZOHdgR6mmXN0jl8x0NiSxT0IyGTg5x17AGAk+OgOwwqb5g3FWchX853uwNvWqrcpDpecyNh71nJE6VbF3imW9opuni0iH4Yv7+4kDATktmwMvsKlkB929sAUhSx8AB5IwFwhkUCBwSHBdk87xbdE4vhE0qlh8gnlNAmvSoaPYh226l2ZbwNWOOA27erhYBBs8kMwqwgL324fSygq563E+w==
ARC-Authentication-Results: i=5; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
ARC-Seal: i=4; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=ilbCSmdnUkYC6CBIz9WNbodFggecX7exxr1wL8Z6hnmf3ygNg5QXJSewLWiaP8vyMzjNEl0InaxsfnuyTVWDacMDy9LK96UkDZYil8btjJ/XSOYE0ribyTzNlt7XO89SPSi2PSGC9kJQLPDv2o1ZbkeT0cBlmJXKbiOTfxhbsCT2HqX/TL3HW9EG/i3hArd2aAkJTEqyBUk6laRDBDxdqzZZWqqKvveh3DP17WDGs0RXhudGTSM0biBibOeea66buhkZZW0Q+lKqPRQ2Hynae2QFT8Yui+iKCpLqg3wZ+Ok1wbowvvGXoneBeHaVqk5tnkXHNyf1qlx8SIQZ0Yu+NQ==
ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=mahRZuUz61vJYT7Adc2bb2/X1XtMr3iVHQTg8khZ1gz5/yZi/D8wa6EWKhuBzVmyoiAo9NtZokuQoouk1FHAYoIK/xweFAL+atm3881OLxYug4axR8lFKoQoV3HtYJw5+zuZT/hCTnHMKGYi7UoyqcZs/0Xg1wXaTwDoLeIwM4a4toiYLbODWrN7TQWgU/WvpkZ0tAOe0+klOhhPU6xjbqUc4+RsswI/baxymz+6cz6WfoYuKCOQfCnCU33vZk15uadRLDLQdUTYTUBNfJKOmFhXB0nSHd1z7YbqlXqqIzugeRt+fG4m1skOMdclxlwj8LcAYpws+2ngJsSILJPOvg==
ARC-Authentication-Results: i=4; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
Received: from BL1PR13CA0199.namprd13.prod.outlook.com
(2603:10b6:208:2be::24)
by SJ0PR16MB4857.namprd16.prod.outlook.com (2603:10b6:a03:400::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.35; Tue, 12 Mar
2024 17:47:27 +0000
Received: from MN1PEPF0000ECD9.namprd02.prod.outlook.com
(2603:10b6:208:2be:cafe::b2) by BL1PR13CA0199.outlook.office365.com
(2603:10b6:208:2be::24) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.18 via Frontend
Transport; Tue, 12 Mar 2024 17:47:26 +0000
Authentication-Results: spf=softfail (sender IP is 104.47.58.168)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.58.168 as permitted sender)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168)
by MN1PEPF0000ECD9.mail.protection.outlook.com (10.167.242.138) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via Frontend
Transport; Tue, 12 Mar 2024 17:47:26 +0000
ARC-Seal: i=3; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=f/tXteJSKLHt8RydHAQlh1Jv8qca9qt7aeTjdLvIwoanI1kRp67WFXJ27z/tEJvX+ahAGT5c3l/5u7NB0aKBNoK0RP3PfO95tR3bXUkIHaL0J5JWawir8QsEETbxs6GgPF7WMRT82lWVljX9nJ1Kao6LyeevKYXg8n9gIpy9qONNywHEzPz1zoXS4qacJKmyBHeyDe3mdN1PEXg96UyBlVRwGvUDuD5zWbiJmjBPh0tFfqfuLOighFfKkGeo5ktRxSeOwUUWqdjgBO4tdgBZ0bJTV8F6WRF6VkyG+Owp9K/PAyS7iYJ0cO8MCuiGkiMWNDTKSDysJTOBqqu9ve1iww==
ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=eh5zTrqYY2flv+whgn+vTu8iqFhmp9m9R8glNDe+pI7EUn60Rnl3qM+Pk3vMk5NEIkLdIK0OFf8iHjnCaTJtDzN02zC5ZbpdLF83rSpI972SocSSwRP08/EGaYwqUavVx2d92XkBCVAJXvjymST2nZ9V/1xUxt/qnY/T8XmxYdGizyrvK53NgdM71oel89R6Ye+IQ3LJ1Ai08QkTdT/UPBshlylStJhOUw1KSOFrHPHZVziP4poC0hvruWp4oj1NndM4ZJnOrFg+wieTyMh5GFBhRDrU/yTaH4PgPpuj4fqQTdUWEZ0dQTkrp2qSQJKXiB7rKnw+BenQ6lzmwmakRA==
ARC-Authentication-Results: i=3; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=Jq+NfGCU8rO4GLgVOm7V+iNr1F+e8v4YsAmOna02SGzfrfry2TcPUG/OkWzxrQTZoc/gx8Q3DNpjuSs5vFkTlvG4arLyO6/cuK1HoUVbWAjEOk/ZkebQ+xoAeZDQvL696/Kmh/JqBkkx43GeheSUe04CncnwFemNaPCtzI53Flw6Da3gcVOdQWBlTc9X1ZHlUSoLEiYSisYvOuvbMV1af7dxpJQ8VnAT8CCmOOzkzF4CC/jBljCKGZNQ/ILaNjvD1nW5iRAu8i0g86w/B/VvhM6okdHn+5iEcgNUe9PQ+xT8y5OjVlbBKSpLJhprnxwLG7K4aoHxFLTAnFdoyStDKQ==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=Yec1glAjjdFs2AheWrByJZZaCw6RWbQyc/Rbf2MjTZiu0ZRmB37qrOCOR8JUafyKEJzBo1r3Zl6ekLxrEkvyaBwDW9hkaUi/M2sPiS4wiV2t0mg7QaSIqgm9qRZHbtR8KAOJf83H5DaxAzaaH/ATXA+OAJvQx47YLVelayOvbbQ1FzygxjQP92FFfMVcb8Mj1f6Ix3I00bEgnVcbDoxzf9mEG522EkAIAVZV5Wcdm6VTJ8YMhv0UXYkggnT+ZXPv7J3tZZFy9ru2sD90L/4hzzVh2SWvjJUwwfmbDMbI406oljdp8U2jS713WjXKlWANKjnE6Ex4DE/v0vRviNROjQ==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
Received: from MN2PR12CA0014.namprd12.prod.outlook.com
(2603:10b6:208:a8::27)
by SN4PR16MB4942.namprd16.prod.outlook.com (2603:10b6:806:213::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12 Mar
2024 17:47:22 +0000
Received: from BL02EPF0001A108.namprd05.prod.outlook.com
(2603:10b6:208:a8:cafe::ab) by MN2PR12CA0014.outlook.office365.com
(2603:10b6:208:a8::27) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.34 via Frontend
Transport; Tue, 12 Mar 2024 17:47:22 +0000
Authentication-Results-Original: spf=softfail (sender IP is 104.47.57.169)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.57.169 as permitted sender)
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169)
by BL02EPF0001A108.mail.protection.outlook.com (10.167.241.138) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via Frontend
Transport; Tue, 12 Mar 2024 17:47:21 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=Piz6MQpsatxgRgdMQnHp6kgECDkTMbE0DgG4wRYwIRajXQ3MI8SBFrIcZyLrnb1zSG5vzzeN/n9ZjV992Cr04wHSY7hNjXeMah9nnxHyFFhY8Gjt1FKxhu8Zehq4UeL2u/SWL5cVuXvYdRLEAZbTu/y0CYC9wapF1rOzZLqJ/SFdziwWyfbXhMV3jYncpyv8cU02VRF1+eMcRX6nFmNLmya0AuNaBIrTrgB/0HNEKo84YHDac0qS1TnbPIeVW1yRZWzAHVbw3JTFuAiZIgALNCJtuFzySqlh2aqlentHH+xcipVLOo6gXos6t1f2wmMU90dFbYqB1WNt76/fprsxZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=YS1TaX4oevejDGaHcLzQ0ne1TCC2JVuNGGQGRZ5uKCdgZtx013WcY+80y0Ug8Yr1l1TW24aRHzgLYJR/fgdZD/M9aL75janGpC+fwFm31ycEInoixwW25Sw84cb13ac+fyxLCNMekLnGA4kuOQGkxOrG71r0dibY1UJ5VwBaEN1YhZV1QvuFPL7VyCDnrfbFpOVNj5AgyQb5wi+X9NS1ulvz3ajrX3rempG1bG4MRD1D8Oi15zSNZ/P7VeToM5mONFCouDaDlgRnfwuV/jRusjS8qP72XzKt2cW0U93crmQD+sHQeB0sL2gTYwoTBV1VtR7XefFmR8/Jjqsd/uJ/rA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.222.46) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=none (0)
Received: from CH2PR08CA0003.namprd08.prod.outlook.com
(2603:10b6:610:5a::13)
by DM6PR16MB3878.namprd16.prod.outlook.com (2603:10b6:5:295::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12 Mar
2024 17:47:18 +0000
Received: from DS1PEPF00017092.namprd03.prod.outlook.com
(2603:10b6:610:5a:cafe::29) by CH2PR08CA0003.outlook.office365.com
(2603:10b6:610:5a::13) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7292.50 via Frontend
Transport; Tue, 12 Mar 2024 17:47:18 +0000
Authentication-Results-Original: spf=pass (sender IP is 209.85.222.46)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: Pass (protection.outlook.com: domain of gmail.com designates
209.85.222.46 as permitted sender) receiver=protection.outlook.com;
client-ip=209.85.222.46; helo=mail-ua1-f46.google.com; pr=C
Received: from mail-ua1-f46.google.com (209.85.222.46) by
DS1PEPF00017092.mail.protection.outlook.com (10.167.17.135) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384)
id
15.20.7386.12 via Frontend Transport; Tue, 12 Mar 2024 17:47:18 +0000
Received: by mail-ua1-f46.google.com with SMTP id
a1e0cc1a2514c-7db44846716so2263539241.2
for <postmaster(a)accountprotection.microsoft.com>; Tue, 12 Mar 2024
10:47:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=20230601; t=1710265638; x=1710870438; darn=
accountprotection.microsoft.com;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:from:to:cc:subject:date:message-id:reply-to;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=XhUuiy+ci52A6Z8V5D0K7sf0mPvDFImSSIHdIircb7/whb+jGal7HLyl2SnGMeQMCC
1mn+5NZoohJDANQ1HsNlUP038/oRtUuHSc1zhmOg9A/yyroEezQPuKZraBjV+Dc53YPJ
V4U49FYr1uyAu018nOeD2t0HZl+fIDytynK1q/byG7L+6MKiSqkCzRKHQw1Q+KVYi9x4
CsmCzLHGLRjAW8bAd/funTyPmst57Q7d+pygvltzoTFkgVYc2ue3zKs3EsJs+4pSV30E
ZCqJQJ2JpsAWkWYnylFuFq2iq077xtWTpvo68xpeOm1YyRZ7tPDd5yKO0LH4zbnXnQe7
FvPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20230601; t=1710265638; x=1710870438;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=bfCscBGtqVJaI701ZDbN/7zxV0h9bbO9XjhOFS0zxAxHsJX6cq0sc3VClYCId7HWxp
KFvsS5jUAKqWFk5qX+WqhkAMbA5XwzQ0+k76W4MwoYfwXFa6dbMzT2/CzhF3NMibZMlT
RKrA+06Y3C2l/c7W/n75caH+EkRWw3Cw/vQMi6agFFy58fZ/zHup/RJXJuPbR2L2lr5O
CEbTNO0SrscBnU/6eV/KNJCCrLqc4X++emlpzdyO03WQZBlCbPy2JeayyJKJ1QKSXLkD
e2i6lTyd0XwB+shLE98Tc7zStYBwZA/yY0ODJjVwDS1KA7Fohp44ayQuqbPeU+wGY/I7
s2xg==
X-Gm-Message-State: AOJu0YwOnlTOJluxvfcokBqX9Wu5lsnSy13MNr0OrQGXsHEZMzzp5Ki6
Da34r3asau3HNPxFqy4zOaoI+mdAgYFedPVBDA4wsiPM8OITCPKto7UmxQouCiom7xEzXXzt6Iq
I0Sx5C1GyVtEBH2jI+n1nB1CTCq2nkI56/O2As/On7yg=
X-Google-Smtp-Source:
AGHT+IG4Xwa8+jwhUtnwMWYzIhj+Vb8oZIXlfAPvDa7LuepIbBR/2+HjFTlDXJUsNMUMa3FAtBmxog7/xddNDzFCsQY=
X-Received: by 2002:a05:6102:50a9:b0:472:a040:dd94 with SMTP id
bl41-20020a05610250a900b00472a040dd94mr3545409vsb.29.1710265637311; Tue, 12
Mar 2024 10:47:17 -0700 (PDT)
MIME-Version: 1.0
References: <CAPw7qDyix=N6wm9TKXkY-Rh8b=
Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com>
CAPw7qDyix=N6wm9TKXkY-Rh8b=Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com <
2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>
In-Reply-To: <
2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>
From: =?UTF-8?B?2K/Yp9mG2Kcg24zYstiv2KfZhtuM?= <
danayzdanyyzdanydana(a)gmail.com>
Date: Tue, 12 Mar 2024 21:17:03 +0330
Message-ID: <
CAPw7qDxunhPRyrt5JUG6d9+gzo3Ajh9p4o031ZX523TXMXLeAA(a)mail.gmail.com>
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money xchenged
Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name Bank Mellat
Accept To History Accoun Number IR720120010000001524852803 name Asgar
Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Content-Type: multipart/alternative; boundary="000000000000c89a7506137a3f81"
Return-Path: danayzdanyyzdanydana(a)gmail.com
X-EOPAttributedMessage: 2
X-EOPTenantAttributedMessage: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7:2
X-MS-TrafficTypeDiagnostic:
DS1PEPF00017092:EE_|DM6PR16MB3878:EE_|BL02EPF0001A108:EE_|SN4PR16MB4942:EE_|MN1PEPF0000ECD9:EE_|SJ0PR16MB4857:EE_
X-MS-Office365-Filtering-Correlation-Id:
875bb97f-2b49-44e9-7922-08dc42bc7b06
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?k5wasqG5loGlnxUaXwGusQq0hJQs1UjouNvxaaF1aQIPz+LtmXLv75BAnKKr?=
=?us-ascii?Q?RF7bXezedyod5TnhgCjuf0oYE4VTR6va85+1oiUzhtVZMMKFj+WEic8617vu?=
=?us-ascii?Q?CuKBU44S4LW3mdZm4WiPb6AQdmL1dudw0Acv2Dkt/MsVhHsv42kPpoUhkQKB?=
=?us-ascii?Q?7FDeauD5f+Sdne353+ssE//9CN9VfI752KFv4IFH1+YMI74PiBvmTrzqwlfE?=
=?us-ascii?Q?OeE6YB+V+QwDnBDi3qq1+Kbg0dDFRdOCxyfzCeoqwQwGG7Uh6umxwzXr9ffs?=
=?us-ascii?Q?mCdumjA3O8iFvtaYKQXbsjEUdN3EaWm6oJXRJI6LcNMmTFKa1zCUT9DlIK4q?=
=?us-ascii?Q?zP7iCsGEONY7YIxMzvsMjni96WIqF0TVPZ6fZcPxJmGZVSgK1VDviI8cb9fH?=
=?us-ascii?Q?hdsnxxwElnMYkRkdoNR79MgmwSi1jzuPTGvNZiOUymCQ+4zgMLhSZHozJzKI?=
=?us-ascii?Q?uJTyEsne2aRYsIfCb0NkwjKOxmpAFyQj9nFXH9iybHu0jh0ACKZgb24ursMv?=
=?us-ascii?Q?ZweguyORenEywe/VTMD2WmFiMXReoKSpCqE0NfxHk34NBUu90QpAVw5qv4q2?=
=?us-ascii?Q?1585+i2lQsf0BQG7OzRWxciFWjXX+ZYwY4rKbEsMBxNXiyuHh3F2wsaBaorb?=
=?us-ascii?Q?y23IWnwGGEjDmQg91NYFlRzrKb6OcfRMOQPMlZdBC5Hp/4PgV6h5BoHP3x5h?=
=?us-ascii?Q?1X75jTsn18yv+u9xCGpcv9AusCvVuyvbVghVtIuG2IsMOCO0ZrMk1qSFFOsl?=
=?us-ascii?Q?baCwvPBlq1SvlP59s9IlEI715WiWBIrQvZJFC5X8j8n00k8GTNF7g6oFbr48?=
=?us-ascii?Q?1OqFakxzh8QRlTZqR/QIjc/WoMr5dgYslFWIyMlkiqKDxvB84SPeA+fqCkVf?=
=?us-ascii?Q?YrNJb6nPKzpDZhj67fVV3Ib+AYG38FoZf04wQk2SzoVnHYNt8sz6RsCD/u76?=
=?us-ascii?Q?bzMh7DWOAYekt/UKhltvUpzQn3BNI6wFPDuMJh7/+m83RN7LqQq51ZzoNtQJ?=
=?us-ascii?Q?9iH0UFP+Fu4W3a9Ss6ldo32PpS0q1EgsgiTvr/+sK9QBYJlPWN5eH/Lv7jkh?=
=?us-ascii?Q?nh0p03J7/Bz6VNJziCFT7H1M9hdGDdaVQupCqWojn4A4gzYSm9QVCFrPo8CP?=
=?us-ascii?Q?lUHjlI5jGuI4mV87/gVeHWCYZLIuewbh0OW/YAmT0U+ZP10SYJVbd9EfjTLM?=
=?us-ascii?Q?PHe0x0I0HajbKClntpkPzZzHHJpoCrOrD+/3RUZtrFPjqNUXqy3NaKXP4Hqv?=
=?us-ascii?Q?mlrUAsb2QfBcFPL4uUNWAXIhDvLoGFWd3YULLEPq9uPPtUDaCZSnl5eo7UI8?=
=?us-ascii?Q?1fFZPRUp9RSGs4sZQ/uDV0mRHXbJwKyiXdxG3Nwk5ZuHPt/dqZIdzK/9zgwY?=
=?us-ascii?Q?nCsHtsUGWTNTNIIyRchxlZhCecy9+U2UvRgSR+NcgJmylOlO8q0fZsUOKklG?=
=?us-ascii?Q?1aQGzfxKl9EMPar022kIvdpSh/mJXxxq32DVRjlR2HBTNzKpLiEsxYDiuhUc?=
=?us-ascii?Q?enV+T1U+I3ADaAeRP7e6Bz3ISeD1a1snsLdRnV9y6ppe/n0GQPPV1wDlYtis?=
=?us-ascii?Q?/8ZgGorgd30iVcLurGgU3m604zVXxulEYtJhyFKu5UJHWZ0fxsWimtPrLt2R?=
=?us-ascii?Q?51f30cjCQXtsMlZcWiOLK0jjAupHUNX88C2r76JZE1Cked7O/mxTKLTyYHyh?=
=?us-ascii?Q?YSP4WwgS1Igj+08C76KcXXrRLY8ZaRf2M8xIQJ+XP2rvLykXVWC/9wzwu9HT?=
=?us-ascii?Q?P84HV8Xkca13vmW1mU29Q0lgsardUV9B0NApUsgLk6pI3lTRHSG6N9a+pU/X?=
=?us-ascii?Q?xvW6cMbZSFzn4g=3D=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:209.85.222.46;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
mail-ua1-f46.google.com;PTR:mail-ua1-f46.google.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-ExternalRecipientOutboundConnectors: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR16MB3878
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
BL02EPF0001A108.namprd05.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
BL02EPF0001A108.namprd05.prod.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
593f53b6-d741-4787-1e9c-08dc42bc7648
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?6bBhdidpmRXZkmd5qLw90EZMWcrkc5ZlXl5JtIKHIYc2aMzmBKRT3t/J7OuB?=
=?us-ascii?Q?smBtCFSp05ufL/MWuQsfiKkcbkYEtzmGidW/i6Fik/fbUwstldy8BFLGLPp6?=
=?us-ascii?Q?ejcgBC/cCjP78XS1ym/Gaw/u2iivvvp+PUipZWN5UWpJJ12KnJJfnu9siAqE?=
=?us-ascii?Q?W1rkkFFU8ft/9DEk/catj9+UUO9a1nT5dcWrqofewNlQ7oBlv3KTI8Yc89Bu?=
=?us-ascii?Q?FwZyQn3+5vTTKNFJw8bKccErTnfElcaKbaB+1FO38nkdvBUapBrpUSN42WDW?=
=?us-ascii?Q?oPvk8mawq00B2uFpGMJQc28fPwP21VQlU1TGim1mk/u0k8gG396sYx6VIGQy?=
=?us-ascii?Q?jp5NAQfcWGoPFs/KjYZ7mpVBldd32IHF7/KhPUK9vZLAKcZ/3YDL2THlWlJB?=
=?us-ascii?Q?ufJls7le1VEvtMx5qtEl8Tm8K+f4yrjNV8ZQS5Sid6dvgkHIMu9aPVuMptfY?=
=?us-ascii?Q?ln6ONOHtvzsW8q9w2Gr2hsdLtdstWWPgzl4Pr8ILKTGXgY2vqnKupKA3Tc/e?=
=?us-ascii?Q?Is0aI0VMcsEVIe2nDVwOBLM8Ev2vlD/9lFk2qq9D64csQDEut/RLO/Kznz0n?=
=?us-ascii?Q?eUMXNbtwcHtbYZpzsYag6ZPjn2H02XNVuXUK+pnpYvjxOiIRademmAbjecwd?=
=?us-ascii?Q?zpUCb/EdCcm9B+l6IrMSe/aXHuEvWRIB5wLaWOnukYZtj+V/2EXB8/cwbboU?=
=?us-ascii?Q?/62U4fIJfZSvhc4pzgvtDBBkxdvShHdrCm7LxkjPbUgh0IS4QJaVfkStopH1?=
=?us-ascii?Q?NqhV58H9NZIER2Fkc9JTGxRh50a2L9ujfNVMIjzF+eW+79KRV1QeC9vx2QZ4?=
=?us-ascii?Q?IX8XeNvxQcN4w+C/s+t+Lsu94iyIPuIK3avfjzuG6AZn89byqmcDKLU3AzN9?=
=?us-ascii?Q?htJ6QuUAQVgRn0vpwo8PMo9LdQL6IbsNmROXZxrH241SXJd05tvHmWqahYSw?=
=?us-ascii?Q?6lqRs6cpaGD96IqfuEu8zfH22XsXXv4pM4uIopGqW9qiRw5zdGFcQtDV1EFt?=
=?us-ascii?Q?PoM6gIX17qKr8G0IW3UDLP9DT4pSsjYK3UW/k+ymBjOQdAoxuR2p87ECJ9vk?=
=?us-ascii?Q?Ii0GxgP114yc6nbKrFl2rrFnPnkHnG8/n0FOlt1Kjr+gYsk3zo08NFVuEhHy?=
=?us-ascii?Q?gs22ap4CvjWe9TFI7GqbLX16haGEVu3p6tap8CQUn0UloHrd5JRtOieYqd1c?=
=?us-ascii?Q?axVm/t8NIrHRHGF1ma3QXbKfDey0M+f1YLFcvyosYOh8ZQNjIIemkoCP168r?=
=?us-ascii?Q?dFq+VfgDPv6+xGrjvnkCgTZejf9yCUBYrZdRKKBSijDHeyIaI/jZNdm/yY3s?=
=?us-ascii?Q?mhp0OSTxBKs2V+PKiDqE8r5D99Dk0C9Ormq9HUelAMGwAsbk8iER6u2SXXhQ?=
=?us-ascii?Q?h39Lq3PvOFGGc/j/OulNu1AH124Zq6CQ8I1NvMX3EERze5svKkM6xyXbV7jc?=
=?us-ascii?Q?KGHr7OiTpgERfhOPLuGyf1novwAXv3fAzFrHCHvix6OzIzf3TO6pcp2anKJp?=
=?us-ascii?Q?jqtepmVd4rnE8BjCBHjxQFeSKW6psMVDGYpImWwfmmktne9JbL0BgBlSz7pM?=
=?us-ascii?Q?TQdFC9ENpj6t/jppSmBZZ3RfFL2nAyENP2ehvIVMDCvst8DwPT37ToZLlL1X?=
=?us-ascii?Q?RWn+26tZBhiZ/h/kmFpixw8vrbdTDMO1k1BrznOC/n8nSML/vBJAECs33022?=
=?us-ascii?Q?3vApdemdoCnhWPHpe8BxsDn3Oz22PSKiDsWg0HHlZmCkYQKegnebGXkgypDM?=
=?us-ascii?Q?9NBPLkozzcnVkkB09GI4jT+aEVbd8hFmP581ocvL0Qt9tJBLbg8CzrREqg3r?=
=?us-ascii?Q?96PbwlNoDNzHpQ=3D=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:104.47.57.169;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
NAM11-DM6-obe.outbound.protection.outlook.com;PTR:
mail-dm6nam11lp2169.outbound.protection.outlook.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR16MB4942
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
61d165ce-8884-4dc3-2ec0-08dc42bc785a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
=?us-ascii?Q?8K9Mh4AWerzVGZAwy4irrDT1p8z3iW4Yb44PbF6z1qSInh1OMIDL26AI+K2z?=
=?us-ascii?Q?g9R4oi5YnhEx4lVcUZ6qS9FRgZ/tqwyTth2TJ1v9bTKlUHvFvZpvFbJaCTKz?=
=?us-ascii?Q?NutyNmJDCd10UMS8p43C4fBgqBCS2ZhRUIyYT/si2Fnqh/PJHiJYzacQIh+o?=
=?us-ascii?Q?mXHYHVjef1Cw41yvcOAhzbAMsayCTP3dYl201wDALJDBOtZCr0gG0vCehO1q?=
=?us-ascii?Q?zSMPtKb6xSacvQh/DfrrK/V8679zKUnOj+cbm4rwNrynQuHGlcR81xj8Q7EY?=
=?us-ascii?Q?GQYb7/+TD1julr4Rai0CBnf0V7GkCXldNvLZ1N7JAaB7Oh4x9nRpAspqpw8H?=
=?us-ascii?Q?NQ8Lhw3P8tWF451r1sUF85hAk3v3tQUGffMDC6mq8eqQFkTJnO870kjTPaqO?=
=?us-ascii?Q?JSUVndcOHbIIBji3OoWCdNEdySPP353yjoBo6RLMOrA6TWsmicXRshgHpvwS?=
=?us-ascii?Q?VoTHmlHM2hj4+a+2jdcU5tlNk/NTMlJdsIoDr1d8abzCL+HsP3x0fNPCysom?=
=?us-ascii?Q?ANxIeeCHMHJYgyomKc7DCA9fpAGvTCMbOb+ae4MldXahG+7BGwFgjkAuULUa?=
=?us-ascii?Q?ILu0Sk73TF6prfr9sFHucXzw1QyXbMhnEhSpTjnC/MpUJObHA0BguYLds5aB?=
=?us-ascii?Q?DISyT0wm8yk+oOE5ZFcjkTpyovKrtAIqElQLATkPgf7upLpPQTgUHAEO+FnG?=
=?us-ascii?Q?z9xqpSJntQcDM6h/rvwobZOxPQCZ0UPW1SaxclYCcaRIoEEQbSY/IYtJ3TSf?=
=?us-ascii?Q?/DrJIc6JaDam3XWqSiOuqIReMYwGrAPcCz7DTruR8bjjyBnzuoxolpS+Dk7u?=
=?us-ascii?Q?kodnTOBHLt0QYOglEliz9Gpd4D58pmOPkwLkyvws3biPlB5V0QFBqgX+39oA?=
=?us-ascii?Q?9Mf5LGbXO42VtSwhKfIFf/4+ncSgNzvuxSFkUu2ymTb8FZ2FIYJ54Srs/z0R?=
=?us-ascii?Q?/lL+OcKzvCz8GhIgsFUv2i5rNkrSHQgB63EjTeOoPXKDUV+KQCu8gNSWvaPu?=
=?us-ascii?Q?VSJfOlg1HZfoGoy6yW3TabjPW4a5WMs9PPIXREXZkkeBVV8QzMDRz08XINxn?=
=?us-ascii?Q?nvhsbYiRtnO0ZwWE/TjoJD6iw09QfEM4xuPefxiGKMBioi50C3Ykx5GCspon?=
=?us-ascii?Q?r56eZtEJ09/aFNt+AXxlInHSbsZ81KfpBv6qMHO1MX2HsmSUrHahtDO1Jl7H?=
=?us-ascii?Q?VjU1Ho+9s1kA/Qkjc1Q0jdrPo+WLNQQH6UmKRFSWqS5aj97OqyFqP1r8chxP?=
=?us-ascii?Q?eRBtNlM3MFipWvOY9tDX/u4qHN6YLlJl6+mTsX+2QesbQAAJSh8g2y68pdVk?=
=?us-ascii?Q?ghjuwxqdKWCmaVf8roJ/M5PnpkyuBv3vRENFVr5sbHSAWjTJucTLP17/BLdP?=
=?us-ascii?Q?ecm4rT4KyH+E+0Ax4U5cyziuO8XYajiDGAH9hYuOLtSWBwRX7AYTnUI5h+QT?=
=?us-ascii?Q?JpjnXGiuGQVkHNaGJYAa95LUsLvy3TBVHTm70w25/6fsE0Zc3YzXowtoU8GF?=
=?us-ascii?Q?uMRIBPfK57EcXF+8C/lMhsgyI2mB/XqTt/Os7ayDUA1YmOEd9JzBbf/6ypZ7?=
=?us-ascii?Q?F1KS4rQyobBEueUyMskVOIX3XHu4pliamM56SreHMNziE+EGw6xSFEtZy0zC?=
=?us-ascii?Q?Cm4Orft5kPTQM3Gga2HyhOynNceO0QXzRnLEdPUrbJ45CcEMs15PRGtt4r5f?=
=?us-ascii?Q?6xJWjW4wMUdvmbJCEYj4+0XABeU7B85kFvSMC6DJ0zG47FXoNtdUfAYT1wfh?=
=?us-ascii?Q?e0yaYJFDbrlEJpyM3lkXoF0HuS4/VKqt4vTsGdzc7I9YyWxsmWcO59uTQ9lA?=
=?us-ascii?Q?JP/ll4fCdMztBA=3D=3D?=
X-Forefront-Antispam-Report:
CIP:104.47.58.168;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
NAM11-BN8-obe.outbound.protection.outlook.com;PTR:
mail-bn8nam11lp2168.outbound.protection.outlook.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-OriginatorOrg: accountprotection.microsoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Mar 2024 17:47:26.3043
(UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id:
875bb97f-2b49-44e9-7922-08dc42bc7b06
X-MS-Exchange-CrossTenant-Id: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-CrossTenant-AuthSource:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR16MB4857
---------- Forwarded message ----------
From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Cc:
Bcc:
Date: Tue, 12 Mar 2024 21:17:03 +0330
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
09392430244
در تاریخ سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۴ <
postmaster(a)accountprotection.microsoft.com> نوشت:
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Original Message Details
Created Date: 3/12/2024 5:44:33 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Ticket Received - Fwd: Re info send money xchenged Rial Iran total
amount 45,8091,000,000,222Rial Send To Bank Name Bank Mellat Accept To
History Accoun Number IR720120010000001524852803 name Asgar Siavoshi
IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
BN3PEPF0000B072.namprd04.prod.outlook.com 2024-03-12T17:44:52.106Z
08DC41314D180295]
Message rejected by: BN3PEPF0000B072.mail.protection.outlook.co
<danayzdanyyzdanydana8888(a)gmail.com>
Date: جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۵۱
Subject: Fwd: deliverable: Re: deliverable: Ticket Received - Fwd: Re info
send money xchenged Rial Iran total amount 45,091,000,000,222Rial Send To
Bank Name Bank Mellat Accept To History Accoun Number
IR720120010000001524852803 name Asgar Siavoshi IP176.56.156.137
185.129.238.152 Document Bank Mellat IR170120010000003315992937
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Was this helpful? Send feedback to Microsoft.
More Info for Email Admins
Status code 554 5.4.14
Typically this error occurs because the recipient email address is
incorrect or doesn't exist at the destination domain. This can usually be
fixed by the sender. However, sometimes the issue needs to be fixed by the
recipient or the recipient's email admin. If the steps in the How to Fix It
section above don't fix the problem, and you're the email admin for the
recipient, try one or more of the following:
The email address exists and is correct - Confirm that the recipient
address exists, is correct, and is accepting messages.
Synchronize your directories - If you have a hybrid environment and are
using directory synchronization make sure the recipient's email address is
synced correctly in both Office 365 and in your on-premises directory.
Errant forwarding rule - Check for forwarding rules that aren't behaving as
expected. A forwarding rule can be configured by an admin via mail flow
rules or mailbox forwarding address settings, or by the recipient via the
Inbox Rules feature.
Mail flow settings and MX records are not correct - Misconfigured mail flow
settings or MX records can cause this error. Check your Office 365 mail
flow settings to make sure your domain and any mail flow connectors are set
up correctly. Also, work with your domain registrar to make sure the MX
records for your domain are configured correctly.
Mail loop detected - This error also indicates that the receiving
organization's email settings are misconfigured, creating a mail loop when
a message is sent to an address that isn't found in their directory. This
usually won't disrupt mail flow for recipients that actually exist, but the
recipient's email admin should fix the misconfiguration to reduce the
chance of any other mail flow issues. A common cause for this loop is that
the recipient's domain is configured as "Internal Relay" when it should be
"Authoritative." Another common cause for the loop is that both the sender
and recipient are part of the same organization, but the sender's mailbox
is hosted by Office 365, while the recipient's mailbox is hosted
on-premises, and an outbound connector from Office 365 to the on-premises
email servers is missing or misconfigured. To fix this, the recipient's
email admin should create a correctly configured outbound connector in
Office 365 to route the message to the on-premises mailbox.
Original Message Details
Created Date: 3/12/2024 5:47:03 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
08DC40438C273EBF]
Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
Notification Details
Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
نمایش نوشتار نقل قول شده
نمایش نوشتار نقل قول شده
--
To unsubscribe from this mailing list, get a password reminder, or change
your subscription options, please visit:
https://lists.ripe.net/mailman/listinfo/ipv6-wg
در تاریخ دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۳۰ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
Show quoted text
1
0
Send ipv6-wg mailing list submissions to
ipv6-wg(a)ripe.net
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ripe.net/mailman/listinfo/ipv6-wg
or, via email, send a message with subject or body 'help' to
ipv6-wg-request(a)ripe.net
You can reach the person managing the list at
ipv6-wg-owner(a)ripe.net
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ipv6-wg digest..."
Today's Topics:
1. Fwd: Iban number:IR720120010000001524852803 deliverable
Rename money cash rule transfer Documents deliverable Money
accepted to iban number bank mellat IR160170000000347789811007
Name Tahsin Yazdani (???? ??????)
---------- Forwarded message ----------
From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
To: ipv6-wg(a)ripe.net
Cc:
Bcc:
Date: Mon, 24 Jun 2024 01:41:41 +0330
Subject: [ipv6-wg] Fwd: Iban number:IR720120010000001524852803 deliverable
Rename money cash rule transfer Documents deliverable Money accepted to
iban number bank mellat IR160170000000347789811007 Name Tahsin Yazdani
---------- Forwarded message ---------
فرستنده: دانا یزدانی <danayzdanyyzdanydana(a)gmail.com>
Date: دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۲۵
Subject: Re: Iban number:IR720120010000001524852803 deliverable Rename
money cash rule transfer Documents deliverable Money accepted to iban
number bank mellat IR160170000000347789811007 Name Tahsin Yazdani
To: <ipv6-wg(a)ripe.net>
Re info send money cash rule Rial Iranian Amount HTML Send To Account
Number IR750180000000003610935000 access has been included status...
Delivery accept documents bank mellat IR170120010000003315992937 Re: Fwd:
deliverable: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR160170000000347789811007 Name
Tahsin Yazdani name Asgar Siavoshi IP176.56.156.137 185.129.238.152
Document Bank Mellat IR170120010000003315992937
در تاریخ دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۱۳ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
09392430244
در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۵ dana yazdani <
danayzdanyyzdanydana8888(a)gmail.com> نوشت:
danayzdanyyzdanydana(a)gmail.com
در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۰ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
09392430244
---------- Forwarded message ---------
فرستنده: <postmaster(a)accountprotection.microsoft.com>
Date: سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۷
Subject: deliverable: Re: deliverable: Ticket Received - Fwd: Re info send
money xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank
Name Bank Mellat Accept To History Accoun Number IR720120010000001524852803
name Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
To: <danayzdanyyzdanydana(a)gmail.com>
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Was this helpful? Send feedback to Microsoft.
More Info for Email Admins
Status code 554 5.4.14
Typically this error occurs because the recipient email address is
incorrect or doesn't exist at the destination domain. This can usually be
fixed by the sender. However, sometimes the issue needs to be fixed by the
recipient or the recipient's email admin. If the steps in the How to Fix It
section above don't fix the problem, and you're the email admin for the
recipient, try one or more of the following:
The email address exists and is correct - Confirm that the recipient
address exists, is correct, and is accepting messages.
Synchronize your directories - If you have a hybrid environment and are
using directory synchronization make sure the recipient's email address is
synced correctly in both Office 365 and in your on-premises directory.
Errant forwarding rule - Check for forwarding rules that aren't behaving as
expected. A forwarding rule can be configured by an admin via mail flow
rules or mailbox forwarding address settings, or by the recipient via the
Inbox Rules feature.
Mail flow settings and MX records are not correct - Misconfigured mail flow
settings or MX records can cause this error. Check your Office 365 mail
flow settings to make sure your domain and any mail flow connectors are set
up correctly. Also, work with your domain registrar to make sure the MX
records for your domain are configured correctly.
Mail loop detected - This error also indicates that the receiving
organization's email settings are misconfigured, creating a mail loop when
a message is sent to an address that isn't found in their directory. This
usually won't disrupt mail flow for recipients that actually exist, but the
recipient's email admin should fix the misconfiguration to reduce the
chance of any other mail flow issues. A common cause for this loop is that
the recipient's domain is configured as "Internal Relay" when it should be
"Authoritative." Another common cause for the loop is that both the sender
and recipient are part of the same organization, but the sender's mailbox
is hosted by Office 365, while the recipient's mailbox is hosted
on-premises, and an outbound connector from Office 365 to the on-premises
email servers is missing or misconfigured. To fix this, the recipient's
email admin should create a correctly configured outbound connector in
Office 365 to route the message to the on-premises mailbox.
For more information and tips to fix this problem, see Fix email delivery
issues for error code 5.4.14 in Office 365.
Original Message Details
Created Date: 3/12/2024 5:47:03 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
08DC40438C273EBF]
Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
Notification Details
Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
Message Hops
HOP TIME (UTC) FROM TO WITH RELAY TIME
1 3/12/2024
5:47:18 PM mail-ua1-f46.google.com SMTP 15 sec
2 3/12/2024
5:47:18 PM mail-ua1-f46.google.com
DS1PEPF00017092.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
3 3/12/2024
5:47:18 PM DS1PEPF00017092.namprd03.prod.outlook.com
CH2PR08CA0003.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
4 3/12/2024
5:47:18 PM CH2PR08CA0003.namprd08.prod.outlook.com
DM6PR16MB3878.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
5 3/12/2024
5:47:21 PM NAM11-DM6-obe.outbound.protection.outlook.com
BL02EPF0001A108.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 3 sec
6 3/12/2024
5:47:22 PM BL02EPF0001A108.namprd05.prod.outlook.com
MN2PR12CA0014.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
7 3/12/2024
5:47:22 PM MN2PR12CA0014.namprd12.prod.outlook.com
SN4PR16MB4942.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
8 3/12/2024
5:47:26 PM NAM11-BN8-obe.outbound.protection.outlook.com
MN1PEPF0000ECD9.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 4 sec
9 3/12/2024
5:47:26 PM MN1PEPF0000ECD9.namprd02.prod.outlook.com
BL1PR13CA0199.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
10 3/12/2024
5:47:27 PM BL1PR13CA0199.namprd13.prod.outlook.com
SJ0PR16MB4857.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
Original Message Headers
ARC-Seal: i=5; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=Aa5YWsMr4EgpLJ1IvCsAbdxCafdxhZgTpZCBAO3Hxs5qv9lTx8Dze+VL8VX/SCaDcwDde0Dm6OUKxl/8blopnAsj3SgoqukPp4LdxpAUlcdt13w3kxH2jV0DzZuyoXgfN7b7uMuKzPHnN9+fqMIgCxKFIXIL3l43aak9TWKq0in/IAv8QZj/oIhyyFaQ0lriEsP5mre5wMuNe2Mt599r+YVCu27PYfaZGJxeROopPNggS2bkDLxYaKXL+ULj1myX815TkpeeDph4PWfxXoEUVYwNHASB60T8x7UCpHVoNEWtmTY4LmnZrSTtXRDzYyRQ2wSXWBL7Gtmo6QBl30Srlw==
ARC-Message-Signature: i=5; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=NpqIrGJbRMK4KejwTwBBPDIRnTIJT86mwVRFXzUrmAYRojpaGNLoAfC7KhX53IA1jcw+jhcUBfq8X8Fm+5ggc1zxH7ROwlcVc6LIGuigHC185BmDdYxSVjkQBu79hcTeZOHdgR6mmXN0jl8x0NiSxT0IyGTg5x17AGAk+OgOwwqb5g3FWchX853uwNvWqrcpDpecyNh71nJE6VbF3imW9opuni0iH4Yv7+4kDATktmwMvsKlkB929sAUhSx8AB5IwFwhkUCBwSHBdk87xbdE4vhE0qlh8gnlNAmvSoaPYh226l2ZbwNWOOA27erhYBBs8kMwqwgL324fSygq563E+w==
ARC-Authentication-Results: i=5; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
ARC-Seal: i=4; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=ilbCSmdnUkYC6CBIz9WNbodFggecX7exxr1wL8Z6hnmf3ygNg5QXJSewLWiaP8vyMzjNEl0InaxsfnuyTVWDacMDy9LK96UkDZYil8btjJ/XSOYE0ribyTzNlt7XO89SPSi2PSGC9kJQLPDv2o1ZbkeT0cBlmJXKbiOTfxhbsCT2HqX/TL3HW9EG/i3hArd2aAkJTEqyBUk6laRDBDxdqzZZWqqKvveh3DP17WDGs0RXhudGTSM0biBibOeea66buhkZZW0Q+lKqPRQ2Hynae2QFT8Yui+iKCpLqg3wZ+Ok1wbowvvGXoneBeHaVqk5tnkXHNyf1qlx8SIQZ0Yu+NQ==
ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=mahRZuUz61vJYT7Adc2bb2/X1XtMr3iVHQTg8khZ1gz5/yZi/D8wa6EWKhuBzVmyoiAo9NtZokuQoouk1FHAYoIK/xweFAL+atm3881OLxYug4axR8lFKoQoV3HtYJw5+zuZT/hCTnHMKGYi7UoyqcZs/0Xg1wXaTwDoLeIwM4a4toiYLbODWrN7TQWgU/WvpkZ0tAOe0+klOhhPU6xjbqUc4+RsswI/baxymz+6cz6WfoYuKCOQfCnCU33vZk15uadRLDLQdUTYTUBNfJKOmFhXB0nSHd1z7YbqlXqqIzugeRt+fG4m1skOMdclxlwj8LcAYpws+2ngJsSILJPOvg==
ARC-Authentication-Results: i=4; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
Received: from BL1PR13CA0199.namprd13.prod.outlook.com
(2603:10b6:208:2be::24)
by SJ0PR16MB4857.namprd16.prod.outlook.com (2603:10b6:a03:400::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.35; Tue, 12 Mar
2024 17:47:27 +0000
Received: from MN1PEPF0000ECD9.namprd02.prod.outlook.com
(2603:10b6:208:2be:cafe::b2) by BL1PR13CA0199.outlook.office365.com
(2603:10b6:208:2be::24) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.18 via Frontend
Transport; Tue, 12 Mar 2024 17:47:26 +0000
Authentication-Results: spf=softfail (sender IP is 104.47.58.168)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.58.168 as permitted sender)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168)
by MN1PEPF0000ECD9.mail.protection.outlook.com (10.167.242.138) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via Frontend
Transport; Tue, 12 Mar 2024 17:47:26 +0000
ARC-Seal: i=3; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=f/tXteJSKLHt8RydHAQlh1Jv8qca9qt7aeTjdLvIwoanI1kRp67WFXJ27z/tEJvX+ahAGT5c3l/5u7NB0aKBNoK0RP3PfO95tR3bXUkIHaL0J5JWawir8QsEETbxs6GgPF7WMRT82lWVljX9nJ1Kao6LyeevKYXg8n9gIpy9qONNywHEzPz1zoXS4qacJKmyBHeyDe3mdN1PEXg96UyBlVRwGvUDuD5zWbiJmjBPh0tFfqfuLOighFfKkGeo5ktRxSeOwUUWqdjgBO4tdgBZ0bJTV8F6WRF6VkyG+Owp9K/PAyS7iYJ0cO8MCuiGkiMWNDTKSDysJTOBqqu9ve1iww==
ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=eh5zTrqYY2flv+whgn+vTu8iqFhmp9m9R8glNDe+pI7EUn60Rnl3qM+Pk3vMk5NEIkLdIK0OFf8iHjnCaTJtDzN02zC5ZbpdLF83rSpI972SocSSwRP08/EGaYwqUavVx2d92XkBCVAJXvjymST2nZ9V/1xUxt/qnY/T8XmxYdGizyrvK53NgdM71oel89R6Ye+IQ3LJ1Ai08QkTdT/UPBshlylStJhOUw1KSOFrHPHZVziP4poC0hvruWp4oj1NndM4ZJnOrFg+wieTyMh5GFBhRDrU/yTaH4PgPpuj4fqQTdUWEZ0dQTkrp2qSQJKXiB7rKnw+BenQ6lzmwmakRA==
ARC-Authentication-Results: i=3; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=Jq+NfGCU8rO4GLgVOm7V+iNr1F+e8v4YsAmOna02SGzfrfry2TcPUG/OkWzxrQTZoc/gx8Q3DNpjuSs5vFkTlvG4arLyO6/cuK1HoUVbWAjEOk/ZkebQ+xoAeZDQvL696/Kmh/JqBkkx43GeheSUe04CncnwFemNaPCtzI53Flw6Da3gcVOdQWBlTc9X1ZHlUSoLEiYSisYvOuvbMV1af7dxpJQ8VnAT8CCmOOzkzF4CC/jBljCKGZNQ/ILaNjvD1nW5iRAu8i0g86w/B/VvhM6okdHn+5iEcgNUe9PQ+xT8y5OjVlbBKSpLJhprnxwLG7K4aoHxFLTAnFdoyStDKQ==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=Yec1glAjjdFs2AheWrByJZZaCw6RWbQyc/Rbf2MjTZiu0ZRmB37qrOCOR8JUafyKEJzBo1r3Zl6ekLxrEkvyaBwDW9hkaUi/M2sPiS4wiV2t0mg7QaSIqgm9qRZHbtR8KAOJf83H5DaxAzaaH/ATXA+OAJvQx47YLVelayOvbbQ1FzygxjQP92FFfMVcb8Mj1f6Ix3I00bEgnVcbDoxzf9mEG522EkAIAVZV5Wcdm6VTJ8YMhv0UXYkggnT+ZXPv7J3tZZFy9ru2sD90L/4hzzVh2SWvjJUwwfmbDMbI406oljdp8U2jS713WjXKlWANKjnE6Ex4DE/v0vRviNROjQ==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
Received: from MN2PR12CA0014.namprd12.prod.outlook.com
(2603:10b6:208:a8::27)
by SN4PR16MB4942.namprd16.prod.outlook.com (2603:10b6:806:213::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12 Mar
2024 17:47:22 +0000
Received: from BL02EPF0001A108.namprd05.prod.outlook.com
(2603:10b6:208:a8:cafe::ab) by MN2PR12CA0014.outlook.office365.com
(2603:10b6:208:a8::27) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.34 via Frontend
Transport; Tue, 12 Mar 2024 17:47:22 +0000
Authentication-Results-Original: spf=softfail (sender IP is 104.47.57.169)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.57.169 as permitted sender)
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169)
by BL02EPF0001A108.mail.protection.outlook.com (10.167.241.138) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via Frontend
Transport; Tue, 12 Mar 2024 17:47:21 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=Piz6MQpsatxgRgdMQnHp6kgECDkTMbE0DgG4wRYwIRajXQ3MI8SBFrIcZyLrnb1zSG5vzzeN/n9ZjV992Cr04wHSY7hNjXeMah9nnxHyFFhY8Gjt1FKxhu8Zehq4UeL2u/SWL5cVuXvYdRLEAZbTu/y0CYC9wapF1rOzZLqJ/SFdziwWyfbXhMV3jYncpyv8cU02VRF1+eMcRX6nFmNLmya0AuNaBIrTrgB/0HNEKo84YHDac0qS1TnbPIeVW1yRZWzAHVbw3JTFuAiZIgALNCJtuFzySqlh2aqlentHH+xcipVLOo6gXos6t1f2wmMU90dFbYqB1WNt76/fprsxZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=YS1TaX4oevejDGaHcLzQ0ne1TCC2JVuNGGQGRZ5uKCdgZtx013WcY+80y0Ug8Yr1l1TW24aRHzgLYJR/fgdZD/M9aL75janGpC+fwFm31ycEInoixwW25Sw84cb13ac+fyxLCNMekLnGA4kuOQGkxOrG71r0dibY1UJ5VwBaEN1YhZV1QvuFPL7VyCDnrfbFpOVNj5AgyQb5wi+X9NS1ulvz3ajrX3rempG1bG4MRD1D8Oi15zSNZ/P7VeToM5mONFCouDaDlgRnfwuV/jRusjS8qP72XzKt2cW0U93crmQD+sHQeB0sL2gTYwoTBV1VtR7XefFmR8/Jjqsd/uJ/rA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.222.46) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=none (0)
Received: from CH2PR08CA0003.namprd08.prod.outlook.com
(2603:10b6:610:5a::13)
by DM6PR16MB3878.namprd16.prod.outlook.com (2603:10b6:5:295::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12 Mar
2024 17:47:18 +0000
Received: from DS1PEPF00017092.namprd03.prod.outlook.com
(2603:10b6:610:5a:cafe::29) by CH2PR08CA0003.outlook.office365.com
(2603:10b6:610:5a::13) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7292.50 via Frontend
Transport; Tue, 12 Mar 2024 17:47:18 +0000
Authentication-Results-Original: spf=pass (sender IP is 209.85.222.46)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: Pass (protection.outlook.com: domain of gmail.com designates
209.85.222.46 as permitted sender) receiver=protection.outlook.com;
client-ip=209.85.222.46; helo=mail-ua1-f46.google.com; pr=C
Received: from mail-ua1-f46.google.com (209.85.222.46) by
DS1PEPF00017092.mail.protection.outlook.com (10.167.17.135) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384)
id
15.20.7386.12 via Frontend Transport; Tue, 12 Mar 2024 17:47:18 +0000
Received: by mail-ua1-f46.google.com with SMTP id
a1e0cc1a2514c-7db44846716so2263539241.2
for <postmaster(a)accountprotection.microsoft.com>; Tue, 12 Mar 2024
10:47:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=20230601; t=1710265638; x=1710870438; darn=
accountprotection.microsoft.com;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:from:to:cc:subject:date:message-id:reply-to;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=XhUuiy+ci52A6Z8V5D0K7sf0mPvDFImSSIHdIircb7/whb+jGal7HLyl2SnGMeQMCC
1mn+5NZoohJDANQ1HsNlUP038/oRtUuHSc1zhmOg9A/yyroEezQPuKZraBjV+Dc53YPJ
V4U49FYr1uyAu018nOeD2t0HZl+fIDytynK1q/byG7L+6MKiSqkCzRKHQw1Q+KVYi9x4
CsmCzLHGLRjAW8bAd/funTyPmst57Q7d+pygvltzoTFkgVYc2ue3zKs3EsJs+4pSV30E
ZCqJQJ2JpsAWkWYnylFuFq2iq077xtWTpvo68xpeOm1YyRZ7tPDd5yKO0LH4zbnXnQe7
FvPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20230601; t=1710265638; x=1710870438;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=bfCscBGtqVJaI701ZDbN/7zxV0h9bbO9XjhOFS0zxAxHsJX6cq0sc3VClYCId7HWxp
KFvsS5jUAKqWFk5qX+WqhkAMbA5XwzQ0+k76W4MwoYfwXFa6dbMzT2/CzhF3NMibZMlT
RKrA+06Y3C2l/c7W/n75caH+EkRWw3Cw/vQMi6agFFy58fZ/zHup/RJXJuPbR2L2lr5O
CEbTNO0SrscBnU/6eV/KNJCCrLqc4X++emlpzdyO03WQZBlCbPy2JeayyJKJ1QKSXLkD
e2i6lTyd0XwB+shLE98Tc7zStYBwZA/yY0ODJjVwDS1KA7Fohp44ayQuqbPeU+wGY/I7
s2xg==
X-Gm-Message-State: AOJu0YwOnlTOJluxvfcokBqX9Wu5lsnSy13MNr0OrQGXsHEZMzzp5Ki6
Da34r3asau3HNPxFqy4zOaoI+mdAgYFedPVBDA4wsiPM8OITCPKto7UmxQouCiom7xEzXXzt6Iq
I0Sx5C1GyVtEBH2jI+n1nB1CTCq2nkI56/O2As/On7yg=
X-Google-Smtp-Source:
AGHT+IG4Xwa8+jwhUtnwMWYzIhj+Vb8oZIXlfAPvDa7LuepIbBR/2+HjFTlDXJUsNMUMa3FAtBmxog7/xddNDzFCsQY=
X-Received: by 2002:a05:6102:50a9:b0:472:a040:dd94 with SMTP id
bl41-20020a05610250a900b00472a040dd94mr3545409vsb.29.1710265637311; Tue, 12
Mar 2024 10:47:17 -0700 (PDT)
MIME-Version: 1.0
References: <CAPw7qDyix=N6wm9TKXkY-Rh8b=
Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com>
CAPw7qDyix=N6wm9TKXkY-Rh8b=Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com <
2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>
In-Reply-To: <
2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>
From: =?UTF-8?B?2K/Yp9mG2Kcg24zYstiv2KfZhtuM?= <
danayzdanyyzdanydana(a)gmail.com>
Date: Tue, 12 Mar 2024 21:17:03 +0330
Message-ID: <
CAPw7qDxunhPRyrt5JUG6d9+gzo3Ajh9p4o031ZX523TXMXLeAA(a)mail.gmail.com>
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money xchenged
Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name Bank Mellat
Accept To History Accoun Number IR720120010000001524852803 name Asgar
Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Content-Type: multipart/alternative; boundary="000000000000c89a7506137a3f81"
Return-Path: danayzdanyyzdanydana(a)gmail.com
X-EOPAttributedMessage: 2
X-EOPTenantAttributedMessage: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7:2
X-MS-TrafficTypeDiagnostic:
DS1PEPF00017092:EE_|DM6PR16MB3878:EE_|BL02EPF0001A108:EE_|SN4PR16MB4942:EE_|MN1PEPF0000ECD9:EE_|SJ0PR16MB4857:EE_
X-MS-Office365-Filtering-Correlation-Id:
875bb97f-2b49-44e9-7922-08dc42bc7b06
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?k5wasqG5loGlnxUaXwGusQq0hJQs1UjouNvxaaF1aQIPz+LtmXLv75BAnKKr?=
=?us-ascii?Q?RF7bXezedyod5TnhgCjuf0oYE4VTR6va85+1oiUzhtVZMMKFj+WEic8617vu?=
=?us-ascii?Q?CuKBU44S4LW3mdZm4WiPb6AQdmL1dudw0Acv2Dkt/MsVhHsv42kPpoUhkQKB?=
=?us-ascii?Q?7FDeauD5f+Sdne353+ssE//9CN9VfI752KFv4IFH1+YMI74PiBvmTrzqwlfE?=
=?us-ascii?Q?OeE6YB+V+QwDnBDi3qq1+Kbg0dDFRdOCxyfzCeoqwQwGG7Uh6umxwzXr9ffs?=
=?us-ascii?Q?mCdumjA3O8iFvtaYKQXbsjEUdN3EaWm6oJXRJI6LcNMmTFKa1zCUT9DlIK4q?=
=?us-ascii?Q?zP7iCsGEONY7YIxMzvsMjni96WIqF0TVPZ6fZcPxJmGZVSgK1VDviI8cb9fH?=
=?us-ascii?Q?hdsnxxwElnMYkRkdoNR79MgmwSi1jzuPTGvNZiOUymCQ+4zgMLhSZHozJzKI?=
=?us-ascii?Q?uJTyEsne2aRYsIfCb0NkwjKOxmpAFyQj9nFXH9iybHu0jh0ACKZgb24ursMv?=
=?us-ascii?Q?ZweguyORenEywe/VTMD2WmFiMXReoKSpCqE0NfxHk34NBUu90QpAVw5qv4q2?=
=?us-ascii?Q?1585+i2lQsf0BQG7OzRWxciFWjXX+ZYwY4rKbEsMBxNXiyuHh3F2wsaBaorb?=
=?us-ascii?Q?y23IWnwGGEjDmQg91NYFlRzrKb6OcfRMOQPMlZdBC5Hp/4PgV6h5BoHP3x5h?=
=?us-ascii?Q?1X75jTsn18yv+u9xCGpcv9AusCvVuyvbVghVtIuG2IsMOCO0ZrMk1qSFFOsl?=
=?us-ascii?Q?baCwvPBlq1SvlP59s9IlEI715WiWBIrQvZJFC5X8j8n00k8GTNF7g6oFbr48?=
=?us-ascii?Q?1OqFakxzh8QRlTZqR/QIjc/WoMr5dgYslFWIyMlkiqKDxvB84SPeA+fqCkVf?=
=?us-ascii?Q?YrNJb6nPKzpDZhj67fVV3Ib+AYG38FoZf04wQk2SzoVnHYNt8sz6RsCD/u76?=
=?us-ascii?Q?bzMh7DWOAYekt/UKhltvUpzQn3BNI6wFPDuMJh7/+m83RN7LqQq51ZzoNtQJ?=
=?us-ascii?Q?9iH0UFP+Fu4W3a9Ss6ldo32PpS0q1EgsgiTvr/+sK9QBYJlPWN5eH/Lv7jkh?=
=?us-ascii?Q?nh0p03J7/Bz6VNJziCFT7H1M9hdGDdaVQupCqWojn4A4gzYSm9QVCFrPo8CP?=
=?us-ascii?Q?lUHjlI5jGuI4mV87/gVeHWCYZLIuewbh0OW/YAmT0U+ZP10SYJVbd9EfjTLM?=
=?us-ascii?Q?PHe0x0I0HajbKClntpkPzZzHHJpoCrOrD+/3RUZtrFPjqNUXqy3NaKXP4Hqv?=
=?us-ascii?Q?mlrUAsb2QfBcFPL4uUNWAXIhDvLoGFWd3YULLEPq9uPPtUDaCZSnl5eo7UI8?=
=?us-ascii?Q?1fFZPRUp9RSGs4sZQ/uDV0mRHXbJwKyiXdxG3Nwk5ZuHPt/dqZIdzK/9zgwY?=
=?us-ascii?Q?nCsHtsUGWTNTNIIyRchxlZhCecy9+U2UvRgSR+NcgJmylOlO8q0fZsUOKklG?=
=?us-ascii?Q?1aQGzfxKl9EMPar022kIvdpSh/mJXxxq32DVRjlR2HBTNzKpLiEsxYDiuhUc?=
=?us-ascii?Q?enV+T1U+I3ADaAeRP7e6Bz3ISeD1a1snsLdRnV9y6ppe/n0GQPPV1wDlYtis?=
=?us-ascii?Q?/8ZgGorgd30iVcLurGgU3m604zVXxulEYtJhyFKu5UJHWZ0fxsWimtPrLt2R?=
=?us-ascii?Q?51f30cjCQXtsMlZcWiOLK0jjAupHUNX88C2r76JZE1Cked7O/mxTKLTyYHyh?=
=?us-ascii?Q?YSP4WwgS1Igj+08C76KcXXrRLY8ZaRf2M8xIQJ+XP2rvLykXVWC/9wzwu9HT?=
=?us-ascii?Q?P84HV8Xkca13vmW1mU29Q0lgsardUV9B0NApUsgLk6pI3lTRHSG6N9a+pU/X?=
=?us-ascii?Q?xvW6cMbZSFzn4g=3D=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:209.85.222.46;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
mail-ua1-f46.google.com;PTR:mail-ua1-f46.google.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-ExternalRecipientOutboundConnectors: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR16MB3878
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
BL02EPF0001A108.namprd05.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
BL02EPF0001A108.namprd05.prod.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
593f53b6-d741-4787-1e9c-08dc42bc7648
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?6bBhdidpmRXZkmd5qLw90EZMWcrkc5ZlXl5JtIKHIYc2aMzmBKRT3t/J7OuB?=
=?us-ascii?Q?smBtCFSp05ufL/MWuQsfiKkcbkYEtzmGidW/i6Fik/fbUwstldy8BFLGLPp6?=
=?us-ascii?Q?ejcgBC/cCjP78XS1ym/Gaw/u2iivvvp+PUipZWN5UWpJJ12KnJJfnu9siAqE?=
=?us-ascii?Q?W1rkkFFU8ft/9DEk/catj9+UUO9a1nT5dcWrqofewNlQ7oBlv3KTI8Yc89Bu?=
=?us-ascii?Q?FwZyQn3+5vTTKNFJw8bKccErTnfElcaKbaB+1FO38nkdvBUapBrpUSN42WDW?=
=?us-ascii?Q?oPvk8mawq00B2uFpGMJQc28fPwP21VQlU1TGim1mk/u0k8gG396sYx6VIGQy?=
=?us-ascii?Q?jp5NAQfcWGoPFs/KjYZ7mpVBldd32IHF7/KhPUK9vZLAKcZ/3YDL2THlWlJB?=
=?us-ascii?Q?ufJls7le1VEvtMx5qtEl8Tm8K+f4yrjNV8ZQS5Sid6dvgkHIMu9aPVuMptfY?=
=?us-ascii?Q?ln6ONOHtvzsW8q9w2Gr2hsdLtdstWWPgzl4Pr8ILKTGXgY2vqnKupKA3Tc/e?=
=?us-ascii?Q?Is0aI0VMcsEVIe2nDVwOBLM8Ev2vlD/9lFk2qq9D64csQDEut/RLO/Kznz0n?=
=?us-ascii?Q?eUMXNbtwcHtbYZpzsYag6ZPjn2H02XNVuXUK+pnpYvjxOiIRademmAbjecwd?=
=?us-ascii?Q?zpUCb/EdCcm9B+l6IrMSe/aXHuEvWRIB5wLaWOnukYZtj+V/2EXB8/cwbboU?=
=?us-ascii?Q?/62U4fIJfZSvhc4pzgvtDBBkxdvShHdrCm7LxkjPbUgh0IS4QJaVfkStopH1?=
=?us-ascii?Q?NqhV58H9NZIER2Fkc9JTGxRh50a2L9ujfNVMIjzF+eW+79KRV1QeC9vx2QZ4?=
=?us-ascii?Q?IX8XeNvxQcN4w+C/s+t+Lsu94iyIPuIK3avfjzuG6AZn89byqmcDKLU3AzN9?=
=?us-ascii?Q?htJ6QuUAQVgRn0vpwo8PMo9LdQL6IbsNmROXZxrH241SXJd05tvHmWqahYSw?=
=?us-ascii?Q?6lqRs6cpaGD96IqfuEu8zfH22XsXXv4pM4uIopGqW9qiRw5zdGFcQtDV1EFt?=
=?us-ascii?Q?PoM6gIX17qKr8G0IW3UDLP9DT4pSsjYK3UW/k+ymBjOQdAoxuR2p87ECJ9vk?=
=?us-ascii?Q?Ii0GxgP114yc6nbKrFl2rrFnPnkHnG8/n0FOlt1Kjr+gYsk3zo08NFVuEhHy?=
=?us-ascii?Q?gs22ap4CvjWe9TFI7GqbLX16haGEVu3p6tap8CQUn0UloHrd5JRtOieYqd1c?=
=?us-ascii?Q?axVm/t8NIrHRHGF1ma3QXbKfDey0M+f1YLFcvyosYOh8ZQNjIIemkoCP168r?=
=?us-ascii?Q?dFq+VfgDPv6+xGrjvnkCgTZejf9yCUBYrZdRKKBSijDHeyIaI/jZNdm/yY3s?=
=?us-ascii?Q?mhp0OSTxBKs2V+PKiDqE8r5D99Dk0C9Ormq9HUelAMGwAsbk8iER6u2SXXhQ?=
=?us-ascii?Q?h39Lq3PvOFGGc/j/OulNu1AH124Zq6CQ8I1NvMX3EERze5svKkM6xyXbV7jc?=
=?us-ascii?Q?KGHr7OiTpgERfhOPLuGyf1novwAXv3fAzFrHCHvix6OzIzf3TO6pcp2anKJp?=
=?us-ascii?Q?jqtepmVd4rnE8BjCBHjxQFeSKW6psMVDGYpImWwfmmktne9JbL0BgBlSz7pM?=
=?us-ascii?Q?TQdFC9ENpj6t/jppSmBZZ3RfFL2nAyENP2ehvIVMDCvst8DwPT37ToZLlL1X?=
=?us-ascii?Q?RWn+26tZBhiZ/h/kmFpixw8vrbdTDMO1k1BrznOC/n8nSML/vBJAECs33022?=
=?us-ascii?Q?3vApdemdoCnhWPHpe8BxsDn3Oz22PSKiDsWg0HHlZmCkYQKegnebGXkgypDM?=
=?us-ascii?Q?9NBPLkozzcnVkkB09GI4jT+aEVbd8hFmP581ocvL0Qt9tJBLbg8CzrREqg3r?=
=?us-ascii?Q?96PbwlNoDNzHpQ=3D=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:104.47.57.169;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
NAM11-DM6-obe.outbound.protection.outlook.com;PTR:
mail-dm6nam11lp2169.outbound.protection.outlook.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR16MB4942
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
61d165ce-8884-4dc3-2ec0-08dc42bc785a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
=?us-ascii?Q?8K9Mh4AWerzVGZAwy4irrDT1p8z3iW4Yb44PbF6z1qSInh1OMIDL26AI+K2z?=
=?us-ascii?Q?g9R4oi5YnhEx4lVcUZ6qS9FRgZ/tqwyTth2TJ1v9bTKlUHvFvZpvFbJaCTKz?=
=?us-ascii?Q?NutyNmJDCd10UMS8p43C4fBgqBCS2ZhRUIyYT/si2Fnqh/PJHiJYzacQIh+o?=
=?us-ascii?Q?mXHYHVjef1Cw41yvcOAhzbAMsayCTP3dYl201wDALJDBOtZCr0gG0vCehO1q?=
=?us-ascii?Q?zSMPtKb6xSacvQh/DfrrK/V8679zKUnOj+cbm4rwNrynQuHGlcR81xj8Q7EY?=
=?us-ascii?Q?GQYb7/+TD1julr4Rai0CBnf0V7GkCXldNvLZ1N7JAaB7Oh4x9nRpAspqpw8H?=
=?us-ascii?Q?NQ8Lhw3P8tWF451r1sUF85hAk3v3tQUGffMDC6mq8eqQFkTJnO870kjTPaqO?=
=?us-ascii?Q?JSUVndcOHbIIBji3OoWCdNEdySPP353yjoBo6RLMOrA6TWsmicXRshgHpvwS?=
=?us-ascii?Q?VoTHmlHM2hj4+a+2jdcU5tlNk/NTMlJdsIoDr1d8abzCL+HsP3x0fNPCysom?=
=?us-ascii?Q?ANxIeeCHMHJYgyomKc7DCA9fpAGvTCMbOb+ae4MldXahG+7BGwFgjkAuULUa?=
=?us-ascii?Q?ILu0Sk73TF6prfr9sFHucXzw1QyXbMhnEhSpTjnC/MpUJObHA0BguYLds5aB?=
=?us-ascii?Q?DISyT0wm8yk+oOE5ZFcjkTpyovKrtAIqElQLATkPgf7upLpPQTgUHAEO+FnG?=
=?us-ascii?Q?z9xqpSJntQcDM6h/rvwobZOxPQCZ0UPW1SaxclYCcaRIoEEQbSY/IYtJ3TSf?=
=?us-ascii?Q?/DrJIc6JaDam3XWqSiOuqIReMYwGrAPcCz7DTruR8bjjyBnzuoxolpS+Dk7u?=
=?us-ascii?Q?kodnTOBHLt0QYOglEliz9Gpd4D58pmOPkwLkyvws3biPlB5V0QFBqgX+39oA?=
=?us-ascii?Q?9Mf5LGbXO42VtSwhKfIFf/4+ncSgNzvuxSFkUu2ymTb8FZ2FIYJ54Srs/z0R?=
=?us-ascii?Q?/lL+OcKzvCz8GhIgsFUv2i5rNkrSHQgB63EjTeOoPXKDUV+KQCu8gNSWvaPu?=
=?us-ascii?Q?VSJfOlg1HZfoGoy6yW3TabjPW4a5WMs9PPIXREXZkkeBVV8QzMDRz08XINxn?=
=?us-ascii?Q?nvhsbYiRtnO0ZwWE/TjoJD6iw09QfEM4xuPefxiGKMBioi50C3Ykx5GCspon?=
=?us-ascii?Q?r56eZtEJ09/aFNt+AXxlInHSbsZ81KfpBv6qMHO1MX2HsmSUrHahtDO1Jl7H?=
=?us-ascii?Q?VjU1Ho+9s1kA/Qkjc1Q0jdrPo+WLNQQH6UmKRFSWqS5aj97OqyFqP1r8chxP?=
=?us-ascii?Q?eRBtNlM3MFipWvOY9tDX/u4qHN6YLlJl6+mTsX+2QesbQAAJSh8g2y68pdVk?=
=?us-ascii?Q?ghjuwxqdKWCmaVf8roJ/M5PnpkyuBv3vRENFVr5sbHSAWjTJucTLP17/BLdP?=
=?us-ascii?Q?ecm4rT4KyH+E+0Ax4U5cyziuO8XYajiDGAH9hYuOLtSWBwRX7AYTnUI5h+QT?=
=?us-ascii?Q?JpjnXGiuGQVkHNaGJYAa95LUsLvy3TBVHTm70w25/6fsE0Zc3YzXowtoU8GF?=
=?us-ascii?Q?uMRIBPfK57EcXF+8C/lMhsgyI2mB/XqTt/Os7ayDUA1YmOEd9JzBbf/6ypZ7?=
=?us-ascii?Q?F1KS4rQyobBEueUyMskVOIX3XHu4pliamM56SreHMNziE+EGw6xSFEtZy0zC?=
=?us-ascii?Q?Cm4Orft5kPTQM3Gga2HyhOynNceO0QXzRnLEdPUrbJ45CcEMs15PRGtt4r5f?=
=?us-ascii?Q?6xJWjW4wMUdvmbJCEYj4+0XABeU7B85kFvSMC6DJ0zG47FXoNtdUfAYT1wfh?=
=?us-ascii?Q?e0yaYJFDbrlEJpyM3lkXoF0HuS4/VKqt4vTsGdzc7I9YyWxsmWcO59uTQ9lA?=
=?us-ascii?Q?JP/ll4fCdMztBA=3D=3D?=
X-Forefront-Antispam-Report:
CIP:104.47.58.168;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
NAM11-BN8-obe.outbound.protection.outlook.com;PTR:
mail-bn8nam11lp2168.outbound.protection.outlook.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-OriginatorOrg: accountprotection.microsoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Mar 2024 17:47:26.3043
(UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id:
875bb97f-2b49-44e9-7922-08dc42bc7b06
X-MS-Exchange-CrossTenant-Id: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-CrossTenant-AuthSource:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR16MB4857
---------- Forwarded message ----------
From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Cc:
Bcc:
Date: Tue, 12 Mar 2024 21:17:03 +0330
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
09392430244
در تاریخ سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۴ <
postmaster(a)accountprotection.microsoft.com> نوشت:
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Original Message Details
Created Date: 3/12/2024 5:44:33 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Ticket Received - Fwd: Re info send money xchenged Rial Iran total
amount 45,8091,000,000,222Rial Send To Bank Name Bank Mellat Accept To
History Accoun Number IR720120010000001524852803 name Asgar Siavoshi
IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
BN3PEPF0000B072.namprd04.prod.outlook.com 2024-03-12T17:44:52.106Z
08DC41314D180295]
Message rejected by: BN3PEPF0000B072.mail.protection.outlook.co
<danayzdanyyzdanydana8888(a)gmail.com>
Date: جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۵۱
Subject: Fwd: deliverable: Re: deliverable: Ticket Received - Fwd: Re info
send money xchenged Rial Iran total amount 45,091,000,000,222Rial Send To
Bank Name Bank Mellat Accept To History Accoun Number
IR720120010000001524852803 name Asgar Siavoshi IP176.56.156.137
185.129.238.152 Document Bank Mellat IR170120010000003315992937
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Was this helpful? Send feedback to Microsoft.
More Info for Email Admins
Status code 554 5.4.14
Typically this error occurs because the recipient email address is
incorrect or doesn't exist at the destination domain. This can usually be
fixed by the sender. However, sometimes the issue needs to be fixed by the
recipient or the recipient's email admin. If the steps in the How to Fix It
section above don't fix the problem, and you're the email admin for the
recipient, try one or more of the following:
The email address exists and is correct - Confirm that the recipient
address exists, is correct, and is accepting messages.
Synchronize your directories - If you have a hybrid environment and are
using directory synchronization make sure the recipient's email address is
synced correctly in both Office 365 and in your on-premises directory.
Errant forwarding rule - Check for forwarding rules that aren't behaving as
expected. A forwarding rule can be configured by an admin via mail flow
rules or mailbox forwarding address settings, or by the recipient via the
Inbox Rules feature.
Mail flow settings and MX records are not correct - Misconfigured mail flow
settings or MX records can cause this error. Check your Office 365 mail
flow settings to make sure your domain and any mail flow connectors are set
up correctly. Also, work with your domain registrar to make sure the MX
records for your domain are configured correctly.
Mail loop detected - This error also indicates that the receiving
organization's email settings are misconfigured, creating a mail loop when
a message is sent to an address that isn't found in their directory. This
usually won't disrupt mail flow for recipients that actually exist, but the
recipient's email admin should fix the misconfiguration to reduce the
chance of any other mail flow issues. A common cause for this loop is that
the recipient's domain is configured as "Internal Relay" when it should be
"Authoritative." Another common cause for the loop is that both the sender
and recipient are part of the same organization, but the sender's mailbox
is hosted by Office 365, while the recipient's mailbox is hosted
on-premises, and an outbound connector from Office 365 to the on-premises
email servers is missing or misconfigured. To fix this, the recipient's
email admin should create a correctly configured outbound connector in
Office 365 to route the message to the on-premises mailbox.
Original Message Details
Created Date: 3/12/2024 5:47:03 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
08DC40438C273EBF]
Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
Notification Details
Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
نمایش نوشتار نقل قول شده
نمایش نوشتار نقل قول شده
--
To unsubscribe from this mailing list, get a password reminder, or change
your subscription options, please visit:
https://lists.ripe.net/mailman/listinfo/ipv6-wg
در تاریخ دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۳۰ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
>
>
> ---------- Forwarded message ---------
> فرستنده: <ipv6-wg-request(a)ripe.net>
> Date: دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۲۵
> Subject: ipv6-wg Digest, Vol 147, Issue 10
> To: <ipv6-wg(a)ripe.net>
>
>
> Send ipv6-wg mailing list submissions to
> ipv6-wg(a)ripe.net
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.ripe.net/mailman/listinfo/ipv6-wg
> or, via email, send a message with subject or body 'help' to
> ipv6-wg-request(a)ripe.net
>
> You can reach the person managing the list at
> ipv6-wg-owner(a)ripe.net
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of ipv6-wg digest..."
> Today's Topics:
>
> 1. Re: Iban number:IR720120010000001524852803 deliverable Rename
> money cash rule transfer Documents deliverable Money accepted to
> iban number bank mellat IR160170000000347789811007 Name Tahsin
> Yazdani (???? ??????)
>
>
>
> ---------- Forwarded message ----------
> From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
> To: ipv6-wg(a)ripe.net
> Cc:
> Bcc:
> Date: Mon, 24 Jun 2024 01:25:37 +0330
> Subject: Re: [ipv6-wg] Iban number:IR720120010000001524852803 deliverable
> Rename money cash rule transfer Documents deliverable Money accepted to
> iban number bank mellat IR160170000000347789811007 Name Tahsin Yazdani
> Re info send money cash rule Rial Iranian Amount HTML Send To Account
> Number IR750180000000003610935000 access has been included status...
> Delivery accept documents bank mellat IR170120010000003315992937 Re: Fwd:
> deliverable: Re: deliverable: Ticket Received - Fwd: Re info send money
> xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
> Bank Mellat Accept To History Accoun Number IR160170000000347789811007 Name
> Tahsin Yazdani name Asgar Siavoshi IP176.56.156.137 185.129.238.152
> Document Bank Mellat IR170120010000003315992937
>
> در تاریخ دوشنبه ۲۴ ژوئن ۲۰۲۴، ۰۱:۱۳ دانا یزدانی <
> danayzdanyyzdanydana(a)gmail.com> نوشت:
>
>>
>>
>>
>> 09392430244
>>
>> در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۵ dana yazdani <
>> danayzdanyyzdanydana8888(a)gmail.com> نوشت:
>>
>>
>> danayzdanyyzdanydana(a)gmail.com
>>
>> در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۰ دانا یزدانی <
>> danayzdanyyzdanydana(a)gmail.com> نوشت:
>>
>>
>> 09392430244
>>
>> ---------- Forwarded message ---------
>> فرستنده: <postmaster(a)accountprotection.microsoft.com>
>> Date: سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۷
>> Subject: deliverable: Re: deliverable: Ticket Received - Fwd: Re info
>> send money xchenged Rial Iran total amount 45,091,000,000,222Rial Send To
>> Bank Name Bank Mellat Accept To History Accoun Number
>> IR720120010000001524852803 name Asgar Siavoshi IP176.56.156.137
>> 185.129.238.152 Document Bank Mellat IR170120010000003315992937
>> To: <danayzdanyyzdanydana(a)gmail.com>
>>
>>
>>
>> Your message to postmaster(a)accountprotection.microsoft.com couldn't be
>> delivered.
>> postmaster wasn't found at accountprotection.microsoft.com.
>> danayzdanyyzdanydana Office 365 postmaster
>> Action Required Recipient
>> Unknown To address
>>
>>
>> Was this helpful? Send feedback to Microsoft.
>>
>> More Info for Email Admins
>> Status code 554 5.4.14
>>
>> Typically this error occurs because the recipient email address is
>> incorrect or doesn't exist at the destination domain. This can usually be
>> fixed by the sender. However, sometimes the issue needs to be fixed by the
>> recipient or the recipient's email admin. If the steps in the How to Fix It
>> section above don't fix the problem, and you're the email admin for the
>> recipient, try one or more of the following:
>>
>> The email address exists and is correct - Confirm that the recipient
>> address exists, is correct, and is accepting messages.
>>
>> Synchronize your directories - If you have a hybrid environment and are
>> using directory synchronization make sure the recipient's email address is
>> synced correctly in both Office 365 and in your on-premises directory.
>>
>> Errant forwarding rule - Check for forwarding rules that aren't behaving
>> as expected. A forwarding rule can be configured by an admin via mail flow
>> rules or mailbox forwarding address settings, or by the recipient via the
>> Inbox Rules feature.
>>
>> Mail flow settings and MX records are not correct - Misconfigured mail
>> flow settings or MX records can cause this error. Check your Office 365
>> mail flow settings to make sure your domain and any mail flow connectors
>> are set up correctly. Also, work with your domain registrar to make sure
>> the MX records for your domain are configured correctly.
>>
>> Mail loop detected - This error also indicates that the receiving
>> organization's email settings are misconfigured, creating a mail loop when
>> a message is sent to an address that isn't found in their directory. This
>> usually won't disrupt mail flow for recipients that actually exist, but the
>> recipient's email admin should fix the misconfiguration to reduce the
>> chance of any other mail flow issues. A common cause for this loop is that
>> the recipient's domain is configured as "Internal Relay" when it should be
>> "Authoritative." Another common cause for the loop is that both the sender
>> and recipient are part of the same organization, but the sender's mailbox
>> is hosted by Office 365, while the recipient's mailbox is hosted
>> on-premises, and an outbound connector from Office 365 to the on-premises
>> email servers is missing or misconfigured. To fix this, the recipient's
>> email admin should create a correctly configured outbound connector in
>> Office 365 to route the message to the on-premises mailbox.
>>
>> For more information and tips to fix this problem, see Fix email delivery
>> issues for error code 5.4.14 in Office 365.
>>
>> Original Message Details
>> Created Date: 3/12/2024 5:47:03 PM
>> Sender Address: danayzdanyyzdanydana(a)gmail.com
>> Recipient Address: postmaster(a)accountprotection.microsoft.com
>> Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
>> xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
>> Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
>> Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
>> IR170120010000003315992937
>>
>>
>> 554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
>> CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
>> 08DC40438C273EBF]
>> Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
>>
>> Notification Details
>> Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
>> Message Hops
>> HOP TIME (UTC) FROM TO WITH RELAY TIME
>> 1 3/12/2024
>> 5:47:18 PM mail-ua1-f46.google.com SMTP 15 sec
>> 2 3/12/2024
>> 5:47:18 PM mail-ua1-f46.google.com
>> DS1PEPF00017092.mail.protection.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 3 3/12/2024
>> 5:47:18 PM DS1PEPF00017092.namprd03.prod.outlook.com
>> CH2PR08CA0003.outlook.office365.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 4 3/12/2024
>> 5:47:18 PM CH2PR08CA0003.namprd08.prod.outlook.com
>> DM6PR16MB3878.namprd16.prod.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 5 3/12/2024
>> 5:47:21 PM NAM11-DM6-obe.outbound.protection.outlook.com
>> BL02EPF0001A108.mail.protection.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 3 sec
>> 6 3/12/2024
>> 5:47:22 PM BL02EPF0001A108.namprd05.prod.outlook.com
>> MN2PR12CA0014.outlook.office365.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
>> 7 3/12/2024
>> 5:47:22 PM MN2PR12CA0014.namprd12.prod.outlook.com
>> SN4PR16MB4942.namprd16.prod.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 8 3/12/2024
>> 5:47:26 PM NAM11-BN8-obe.outbound.protection.outlook.com
>> MN1PEPF0000ECD9.mail.protection.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 4 sec
>> 9 3/12/2024
>> 5:47:26 PM MN1PEPF0000ECD9.namprd02.prod.outlook.com
>> BL1PR13CA0199.outlook.office365.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 10 3/12/2024
>> 5:47:27 PM BL1PR13CA0199.namprd13.prod.outlook.com
>> SJ0PR16MB4857.namprd16.prod.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
>> Original Message Headers
>>
>> ARC-Seal: i=5; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>>
>> b=Aa5YWsMr4EgpLJ1IvCsAbdxCafdxhZgTpZCBAO3Hxs5qv9lTx8Dze+VL8VX/SCaDcwDde0Dm6OUKxl/8blopnAsj3SgoqukPp4LdxpAUlcdt13w3kxH2jV0DzZuyoXgfN7b7uMuKzPHnN9+fqMIgCxKFIXIL3l43aak9TWKq0in/IAv8QZj/oIhyyFaQ0lriEsP5mre5wMuNe2Mt599r+YVCu27PYfaZGJxeROopPNggS2bkDLxYaKXL+ULj1myX815TkpeeDph4PWfxXoEUVYwNHASB60T8x7UCpHVoNEWtmTY4LmnZrSTtXRDzYyRQ2wSXWBL7Gtmo6QBl30Srlw==
>> ARC-Message-Signature: i=5; a=rsa-sha256; c=relaxed/relaxed; d=
>> microsoft.com;
>> s=arcselector9901;
>>
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
>>
>> b=NpqIrGJbRMK4KejwTwBBPDIRnTIJT86mwVRFXzUrmAYRojpaGNLoAfC7KhX53IA1jcw+jhcUBfq8X8Fm+5ggc1zxH7ROwlcVc6LIGuigHC185BmDdYxSVjkQBu79hcTeZOHdgR6mmXN0jl8x0NiSxT0IyGTg5x17AGAk+OgOwwqb5g3FWchX853uwNvWqrcpDpecyNh71nJE6VbF3imW9opuni0iH4Yv7+4kDATktmwMvsKlkB929sAUhSx8AB5IwFwhkUCBwSHBdk87xbdE4vhE0qlh8gnlNAmvSoaPYh226l2ZbwNWOOA27erhYBBs8kMwqwgL324fSygq563E+w==
>> ARC-Authentication-Results: i=5; mx.microsoft.com 1; spf=softfail
>> (sender ip
>> is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
>> dmarc=[1,3,header.from=gmail.com])
>> ARC-Seal: i=4; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>>
>> b=ilbCSmdnUkYC6CBIz9WNbodFggecX7exxr1wL8Z6hnmf3ygNg5QXJSewLWiaP8vyMzjNEl0InaxsfnuyTVWDacMDy9LK96UkDZYil8btjJ/XSOYE0ribyTzNlt7XO89SPSi2PSGC9kJQLPDv2o1ZbkeT0cBlmJXKbiOTfxhbsCT2HqX/TL3HW9EG/i3hArd2aAkJTEqyBUk6laRDBDxdqzZZWqqKvveh3DP17WDGs0RXhudGTSM0biBibOeea66buhkZZW0Q+lKqPRQ2Hynae2QFT8Yui+iKCpLqg3wZ+Ok1wbowvvGXoneBeHaVqk5tnkXHNyf1qlx8SIQZ0Yu+NQ==
>> ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=
>> microsoft.com;
>> s=arcselector9901;
>>
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
>>
>> b=mahRZuUz61vJYT7Adc2bb2/X1XtMr3iVHQTg8khZ1gz5/yZi/D8wa6EWKhuBzVmyoiAo9NtZokuQoouk1FHAYoIK/xweFAL+atm3881OLxYug4axR8lFKoQoV3HtYJw5+zuZT/hCTnHMKGYi7UoyqcZs/0Xg1wXaTwDoLeIwM4a4toiYLbODWrN7TQWgU/WvpkZ0tAOe0+klOhhPU6xjbqUc4+RsswI/baxymz+6cz6WfoYuKCOQfCnCU33vZk15uadRLDLQdUTYTUBNfJKOmFhXB0nSHd1z7YbqlXqqIzugeRt+fG4m1skOMdclxlwj8LcAYpws+2ngJsSILJPOvg==
>> ARC-Authentication-Results: i=4; mx.microsoft.com 1; spf=softfail
>> (sender ip
>> is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
>> dmarc=[1,3,header.from=gmail.com])
>> Received: from BL1PR13CA0199.namprd13.prod.outlook.com
>> (2603:10b6:208:2be::24)
>> by SJ0PR16MB4857.namprd16.prod.outlook.com (2603:10b6:a03:400::11) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.35; Tue, 12
>> Mar
>> 2024 17:47:27 +0000
>> Received: from MN1PEPF0000ECD9.namprd02.prod.outlook.com
>> (2603:10b6:208:2be:cafe::b2) by BL1PR13CA0199.outlook.office365.com
>> (2603:10b6:208:2be::24) with Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.18 via
>> Frontend
>> Transport; Tue, 12 Mar 2024 17:47:26 +0000
>> Authentication-Results: spf=softfail (sender IP is 104.47.58.168)
>> smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
>> ;compauth=pass
>> reason=100
>> Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
>> gmail.com discourages use of 104.47.58.168 as permitted sender)
>> Received: from NAM11-BN8-obe.outbound.protection.outlook.com
>> (104.47.58.168)
>> by MN1PEPF0000ECD9.mail.protection.outlook.com (10.167.242.138) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via
>> Frontend
>> Transport; Tue, 12 Mar 2024 17:47:26 +0000
>> ARC-Seal: i=3; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>>
>> b=f/tXteJSKLHt8RydHAQlh1Jv8qca9qt7aeTjdLvIwoanI1kRp67WFXJ27z/tEJvX+ahAGT5c3l/5u7NB0aKBNoK0RP3PfO95tR3bXUkIHaL0J5JWawir8QsEETbxs6GgPF7WMRT82lWVljX9nJ1Kao6LyeevKYXg8n9gIpy9qONNywHEzPz1zoXS4qacJKmyBHeyDe3mdN1PEXg96UyBlVRwGvUDuD5zWbiJmjBPh0tFfqfuLOighFfKkGeo5ktRxSeOwUUWqdjgBO4tdgBZ0bJTV8F6WRF6VkyG+Owp9K/PAyS7iYJ0cO8MCuiGkiMWNDTKSDysJTOBqqu9ve1iww==
>> ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=
>> microsoft.com;
>> s=arcselector9901;
>>
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
>>
>> b=eh5zTrqYY2flv+whgn+vTu8iqFhmp9m9R8glNDe+pI7EUn60Rnl3qM+Pk3vMk5NEIkLdIK0OFf8iHjnCaTJtDzN02zC5ZbpdLF83rSpI972SocSSwRP08/EGaYwqUavVx2d92XkBCVAJXvjymST2nZ9V/1xUxt/qnY/T8XmxYdGizyrvK53NgdM71oel89R6Ye+IQ3LJ1Ai08QkTdT/UPBshlylStJhOUw1KSOFrHPHZVziP4poC0hvruWp4oj1NndM4ZJnOrFg+wieTyMh5GFBhRDrU/yTaH4PgPpuj4fqQTdUWEZ0dQTkrp2qSQJKXiB7rKnw+BenQ6lzmwmakRA==
>> ARC-Authentication-Results: i=3; mx.microsoft.com 1; spf=softfail
>> (sender ip
>> is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
>> dmarc=[1,1,header.from=gmail.com])
>> ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>>
>> b=Jq+NfGCU8rO4GLgVOm7V+iNr1F+e8v4YsAmOna02SGzfrfry2TcPUG/OkWzxrQTZoc/gx8Q3DNpjuSs5vFkTlvG4arLyO6/cuK1HoUVbWAjEOk/ZkebQ+xoAeZDQvL696/Kmh/JqBkkx43GeheSUe04CncnwFemNaPCtzI53Flw6Da3gcVOdQWBlTc9X1ZHlUSoLEiYSisYvOuvbMV1af7dxpJQ8VnAT8CCmOOzkzF4CC/jBljCKGZNQ/ILaNjvD1nW5iRAu8i0g86w/B/VvhM6okdHn+5iEcgNUe9PQ+xT8y5OjVlbBKSpLJhprnxwLG7K4aoHxFLTAnFdoyStDKQ==
>> ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=
>> microsoft.com;
>> s=arcselector9901;
>>
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
>>
>> b=Yec1glAjjdFs2AheWrByJZZaCw6RWbQyc/Rbf2MjTZiu0ZRmB37qrOCOR8JUafyKEJzBo1r3Zl6ekLxrEkvyaBwDW9hkaUi/M2sPiS4wiV2t0mg7QaSIqgm9qRZHbtR8KAOJf83H5DaxAzaaH/ATXA+OAJvQx47YLVelayOvbbQ1FzygxjQP92FFfMVcb8Mj1f6Ix3I00bEgnVcbDoxzf9mEG522EkAIAVZV5Wcdm6VTJ8YMhv0UXYkggnT+ZXPv7J3tZZFy9ru2sD90L/4hzzVh2SWvjJUwwfmbDMbI406oljdp8U2jS713WjXKlWANKjnE6Ex4DE/v0vRviNROjQ==
>> ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=softfail
>> (sender ip
>> is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
>> dmarc=[1,1,header.from=gmail.com])
>> Received: from MN2PR12CA0014.namprd12.prod.outlook.com
>> (2603:10b6:208:a8::27)
>> by SN4PR16MB4942.namprd16.prod.outlook.com (2603:10b6:806:213::11) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12
>> Mar
>> 2024 17:47:22 +0000
>> Received: from BL02EPF0001A108.namprd05.prod.outlook.com
>> (2603:10b6:208:a8:cafe::ab) by MN2PR12CA0014.outlook.office365.com
>> (2603:10b6:208:a8::27) with Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.34 via
>> Frontend
>> Transport; Tue, 12 Mar 2024 17:47:22 +0000
>> Authentication-Results-Original: spf=softfail (sender IP is 104.47.57.169)
>> smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
>> ;compauth=pass
>> reason=100
>> Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
>> gmail.com discourages use of 104.47.57.169 as permitted sender)
>> Received: from NAM11-DM6-obe.outbound.protection.outlook.com
>> (104.47.57.169)
>> by BL02EPF0001A108.mail.protection.outlook.com (10.167.241.138) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via
>> Frontend
>> Transport; Tue, 12 Mar 2024 17:47:21 +0000
>> ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
>>
>> b=Piz6MQpsatxgRgdMQnHp6kgECDkTMbE0DgG4wRYwIRajXQ3MI8SBFrIcZyLrnb1zSG5vzzeN/n9ZjV992Cr04wHSY7hNjXeMah9nnxHyFFhY8Gjt1FKxhu8Zehq4UeL2u/SWL5cVuXvYdRLEAZbTu/y0CYC9wapF1rOzZLqJ/SFdziwWyfbXhMV3jYncpyv8cU02VRF1+eMcRX6nFmNLmya0AuNaBIrTrgB/0HNEKo84YHDac0qS1TnbPIeVW1yRZWzAHVbw3JTFuAiZIgALNCJtuFzySqlh2aqlentHH+xcipVLOo6gXos6t1f2wmMU90dFbYqB1WNt76/fprsxZA==
>> ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=
>> microsoft.com;
>> s=arcselector9901;
>>
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
>>
>> b=YS1TaX4oevejDGaHcLzQ0ne1TCC2JVuNGGQGRZ5uKCdgZtx013WcY+80y0Ug8Yr1l1TW24aRHzgLYJR/fgdZD/M9aL75janGpC+fwFm31ycEInoixwW25Sw84cb13ac+fyxLCNMekLnGA4kuOQGkxOrG71r0dibY1UJ5VwBaEN1YhZV1QvuFPL7VyCDnrfbFpOVNj5AgyQb5wi+X9NS1ulvz3ajrX3rempG1bG4MRD1D8Oi15zSNZ/P7VeToM5mONFCouDaDlgRnfwuV/jRusjS8qP72XzKt2cW0U93crmQD+sHQeB0sL2gTYwoTBV1VtR7XefFmR8/Jjqsd/uJ/rA==
>> ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip
>> is
>> 209.85.222.46) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=none (0)
>> Received: from CH2PR08CA0003.namprd08.prod.outlook.com
>> (2603:10b6:610:5a::13)
>> by DM6PR16MB3878.namprd16.prod.outlook.com (2603:10b6:5:295::11) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12
>> Mar
>> 2024 17:47:18 +0000
>> Received: from DS1PEPF00017092.namprd03.prod.outlook.com
>> (2603:10b6:610:5a:cafe::29) by CH2PR08CA0003.outlook.office365.com
>> (2603:10b6:610:5a::13) with Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7292.50 via
>> Frontend
>> Transport; Tue, 12 Mar 2024 17:47:18 +0000
>> Authentication-Results-Original: spf=pass (sender IP is 209.85.222.46)
>> smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
>> ;compauth=pass
>> reason=100
>> Received-SPF: Pass (protection.outlook.com: domain of gmail.com
>> designates
>> 209.85.222.46 as permitted sender) receiver=protection.outlook.com;
>> client-ip=209.85.222.46; helo=mail-ua1-f46.google.com; pr=C
>> Received: from mail-ua1-f46.google.com (209.85.222.46) by
>> DS1PEPF00017092.mail.protection.outlook.com (10.167.17.135) with
>> Microsoft
>> SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
>> 15.20.7386.12 via Frontend Transport; Tue, 12 Mar 2024 17:47:18 +0000
>> Received: by mail-ua1-f46.google.com with SMTP id
>> a1e0cc1a2514c-7db44846716so2263539241.2
>> for <postmaster(a)accountprotection.microsoft.com>; Tue, 12 Mar
>> 2024 10:47:18 -0700 (PDT)
>> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
>> d=gmail.com; s=20230601; t=1710265638; x=1710870438; darn=
>> accountprotection.microsoft.com;
>>
>> h=to:subject:message-id:date:from:in-reply-to:references:mime-version
>> :from:to:cc:subject:date:message-id:reply-to;
>> bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
>>
>> b=XhUuiy+ci52A6Z8V5D0K7sf0mPvDFImSSIHdIircb7/whb+jGal7HLyl2SnGMeQMCC
>>
>> 1mn+5NZoohJDANQ1HsNlUP038/oRtUuHSc1zhmOg9A/yyroEezQPuKZraBjV+Dc53YPJ
>>
>> V4U49FYr1uyAu018nOeD2t0HZl+fIDytynK1q/byG7L+6MKiSqkCzRKHQw1Q+KVYi9x4
>>
>> CsmCzLHGLRjAW8bAd/funTyPmst57Q7d+pygvltzoTFkgVYc2ue3zKs3EsJs+4pSV30E
>>
>> ZCqJQJ2JpsAWkWYnylFuFq2iq077xtWTpvo68xpeOm1YyRZ7tPDd5yKO0LH4zbnXnQe7
>> FvPQ==
>> X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
>> d=1e100.net; s=20230601; t=1710265638; x=1710870438;
>>
>> h=to:subject:message-id:date:from:in-reply-to:references:mime-version
>> :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
>> bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
>>
>> b=bfCscBGtqVJaI701ZDbN/7zxV0h9bbO9XjhOFS0zxAxHsJX6cq0sc3VClYCId7HWxp
>>
>> KFvsS5jUAKqWFk5qX+WqhkAMbA5XwzQ0+k76W4MwoYfwXFa6dbMzT2/CzhF3NMibZMlT
>>
>> RKrA+06Y3C2l/c7W/n75caH+EkRWw3Cw/vQMi6agFFy58fZ/zHup/RJXJuPbR2L2lr5O
>>
>> CEbTNO0SrscBnU/6eV/KNJCCrLqc4X++emlpzdyO03WQZBlCbPy2JeayyJKJ1QKSXLkD
>>
>> e2i6lTyd0XwB+shLE98Tc7zStYBwZA/yY0ODJjVwDS1KA7Fohp44ayQuqbPeU+wGY/I7
>> s2xg==
>> X-Gm-Message-State:
>> AOJu0YwOnlTOJluxvfcokBqX9Wu5lsnSy13MNr0OrQGXsHEZMzzp5Ki6
>>
>> Da34r3asau3HNPxFqy4zOaoI+mdAgYFedPVBDA4wsiPM8OITCPKto7UmxQouCiom7xEzXXzt6Iq
>> I0Sx5C1GyVtEBH2jI+n1nB1CTCq2nkI56/O2As/On7yg=
>> X-Google-Smtp-Source:
>> AGHT+IG4Xwa8+jwhUtnwMWYzIhj+Vb8oZIXlfAPvDa7LuepIbBR/2+HjFTlDXJUsNMUMa3FAtBmxog7/xddNDzFCsQY=
>> X-Received: by 2002:a05:6102:50a9:b0:472:a040:dd94 with SMTP id
>> bl41-20020a05610250a900b00472a040dd94mr3545409vsb.29.1710265637311; Tue,
>> 12
>> Mar 2024 10:47:17 -0700 (PDT)
>> MIME-Version: 1.0
>> References: <CAPw7qDyix=N6wm9TKXkY-Rh8b=
>> Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com>
>> CAPw7qDyix=N6wm9TKXkY-Rh8b=Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com <
>> 2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>> >
>> In-Reply-To: <
>> 2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>> >
>> From: =?UTF-8?B?2K/Yp9mG2Kcg24zYstiv2KfZhtuM?= <
>> danayzdanyyzdanydana(a)gmail.com>
>> Date: Tue, 12 Mar 2024 21:17:03 +0330
>> Message-ID: <
>> CAPw7qDxunhPRyrt5JUG6d9+gzo3Ajh9p4o031ZX523TXMXLeAA(a)mail.gmail.com>
>> Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
>> xchenged
>> Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name Bank
>> Mellat
>> Accept To History Accoun Number IR720120010000001524852803 name Asgar
>> Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
>> IR170120010000003315992937
>> To: postmaster <postmaster(a)accountprotection.microsoft.com>
>> Content-Type: multipart/alternative;
>> boundary="000000000000c89a7506137a3f81"
>> Return-Path: danayzdanyyzdanydana(a)gmail.com
>> X-EOPAttributedMessage: 2
>> X-EOPTenantAttributedMessage: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7:2
>> X-MS-TrafficTypeDiagnostic:
>>
>> DS1PEPF00017092:EE_|DM6PR16MB3878:EE_|BL02EPF0001A108:EE_|SN4PR16MB4942:EE_|MN1PEPF0000ECD9:EE_|SJ0PR16MB4857:EE_
>> X-MS-Office365-Filtering-Correlation-Id:
>> 875bb97f-2b49-44e9-7922-08dc42bc7b06
>> X-Microsoft-Antispam-Untrusted: BCL:0;
>> X-Microsoft-Antispam-Message-Info-Original:
>> =?us-ascii?Q?k5wasqG5loGlnxUaXwGusQq0hJQs1UjouNvxaaF1aQIPz+LtmXLv75BAnKKr?=
>>
>> =?us-ascii?Q?RF7bXezedyod5TnhgCjuf0oYE4VTR6va85+1oiUzhtVZMMKFj+WEic8617vu?=
>>
>> =?us-ascii?Q?CuKBU44S4LW3mdZm4WiPb6AQdmL1dudw0Acv2Dkt/MsVhHsv42kPpoUhkQKB?=
>>
>> =?us-ascii?Q?7FDeauD5f+Sdne353+ssE//9CN9VfI752KFv4IFH1+YMI74PiBvmTrzqwlfE?=
>>
>> =?us-ascii?Q?OeE6YB+V+QwDnBDi3qq1+Kbg0dDFRdOCxyfzCeoqwQwGG7Uh6umxwzXr9ffs?=
>>
>> =?us-ascii?Q?mCdumjA3O8iFvtaYKQXbsjEUdN3EaWm6oJXRJI6LcNMmTFKa1zCUT9DlIK4q?=
>>
>> =?us-ascii?Q?zP7iCsGEONY7YIxMzvsMjni96WIqF0TVPZ6fZcPxJmGZVSgK1VDviI8cb9fH?=
>>
>> =?us-ascii?Q?hdsnxxwElnMYkRkdoNR79MgmwSi1jzuPTGvNZiOUymCQ+4zgMLhSZHozJzKI?=
>>
>> =?us-ascii?Q?uJTyEsne2aRYsIfCb0NkwjKOxmpAFyQj9nFXH9iybHu0jh0ACKZgb24ursMv?=
>>
>> =?us-ascii?Q?ZweguyORenEywe/VTMD2WmFiMXReoKSpCqE0NfxHk34NBUu90QpAVw5qv4q2?=
>>
>> =?us-ascii?Q?1585+i2lQsf0BQG7OzRWxciFWjXX+ZYwY4rKbEsMBxNXiyuHh3F2wsaBaorb?=
>>
>> =?us-ascii?Q?y23IWnwGGEjDmQg91NYFlRzrKb6OcfRMOQPMlZdBC5Hp/4PgV6h5BoHP3x5h?=
>>
>> =?us-ascii?Q?1X75jTsn18yv+u9xCGpcv9AusCvVuyvbVghVtIuG2IsMOCO0ZrMk1qSFFOsl?=
>>
>> =?us-ascii?Q?baCwvPBlq1SvlP59s9IlEI715WiWBIrQvZJFC5X8j8n00k8GTNF7g6oFbr48?=
>>
>> =?us-ascii?Q?1OqFakxzh8QRlTZqR/QIjc/WoMr5dgYslFWIyMlkiqKDxvB84SPeA+fqCkVf?=
>>
>> =?us-ascii?Q?YrNJb6nPKzpDZhj67fVV3Ib+AYG38FoZf04wQk2SzoVnHYNt8sz6RsCD/u76?=
>>
>> =?us-ascii?Q?bzMh7DWOAYekt/UKhltvUpzQn3BNI6wFPDuMJh7/+m83RN7LqQq51ZzoNtQJ?=
>>
>> =?us-ascii?Q?9iH0UFP+Fu4W3a9Ss6ldo32PpS0q1EgsgiTvr/+sK9QBYJlPWN5eH/Lv7jkh?=
>>
>> =?us-ascii?Q?nh0p03J7/Bz6VNJziCFT7H1M9hdGDdaVQupCqWojn4A4gzYSm9QVCFrPo8CP?=
>>
>> =?us-ascii?Q?lUHjlI5jGuI4mV87/gVeHWCYZLIuewbh0OW/YAmT0U+ZP10SYJVbd9EfjTLM?=
>>
>> =?us-ascii?Q?PHe0x0I0HajbKClntpkPzZzHHJpoCrOrD+/3RUZtrFPjqNUXqy3NaKXP4Hqv?=
>>
>> =?us-ascii?Q?mlrUAsb2QfBcFPL4uUNWAXIhDvLoGFWd3YULLEPq9uPPtUDaCZSnl5eo7UI8?=
>>
>> =?us-ascii?Q?1fFZPRUp9RSGs4sZQ/uDV0mRHXbJwKyiXdxG3Nwk5ZuHPt/dqZIdzK/9zgwY?=
>>
>> =?us-ascii?Q?nCsHtsUGWTNTNIIyRchxlZhCecy9+U2UvRgSR+NcgJmylOlO8q0fZsUOKklG?=
>>
>> =?us-ascii?Q?1aQGzfxKl9EMPar022kIvdpSh/mJXxxq32DVRjlR2HBTNzKpLiEsxYDiuhUc?=
>>
>> =?us-ascii?Q?enV+T1U+I3ADaAeRP7e6Bz3ISeD1a1snsLdRnV9y6ppe/n0GQPPV1wDlYtis?=
>>
>> =?us-ascii?Q?/8ZgGorgd30iVcLurGgU3m604zVXxulEYtJhyFKu5UJHWZ0fxsWimtPrLt2R?=
>>
>> =?us-ascii?Q?51f30cjCQXtsMlZcWiOLK0jjAupHUNX88C2r76JZE1Cked7O/mxTKLTyYHyh?=
>>
>> =?us-ascii?Q?YSP4WwgS1Igj+08C76KcXXrRLY8ZaRf2M8xIQJ+XP2rvLykXVWC/9wzwu9HT?=
>>
>> =?us-ascii?Q?P84HV8Xkca13vmW1mU29Q0lgsardUV9B0NApUsgLk6pI3lTRHSG6N9a+pU/X?=
>> =?us-ascii?Q?xvW6cMbZSFzn4g=3D=3D?=
>> X-Forefront-Antispam-Report-Untrusted:
>> CIP:209.85.222.46;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
>> mail-ua1-f46.google.com;PTR:mail-ua1-f46.google.com
>> ;CAT:NONE;SFS:(13230031);DIR:INB;
>> X-ExternalRecipientOutboundConnectors:
>> 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
>> X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR16MB3878
>> X-MS-Exchange-Transport-CrossTenantHeadersStripped:
>> BL02EPF0001A108.namprd05.prod.outlook.com
>> X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
>> BL02EPF0001A108.namprd05.prod.outlook.com
>> X-MS-Office365-Filtering-Correlation-Id-Prvs:
>> 593f53b6-d741-4787-1e9c-08dc42bc7648
>> X-Microsoft-Antispam-Untrusted: BCL:0;
>> X-Microsoft-Antispam-Message-Info-Original:
>> =?us-ascii?Q?6bBhdidpmRXZkmd5qLw90EZMWcrkc5ZlXl5JtIKHIYc2aMzmBKRT3t/J7OuB?=
>>
>> =?us-ascii?Q?smBtCFSp05ufL/MWuQsfiKkcbkYEtzmGidW/i6Fik/fbUwstldy8BFLGLPp6?=
>>
>> =?us-ascii?Q?ejcgBC/cCjP78XS1ym/Gaw/u2iivvvp+PUipZWN5UWpJJ12KnJJfnu9siAqE?=
>>
>> =?us-ascii?Q?W1rkkFFU8ft/9DEk/catj9+UUO9a1nT5dcWrqofewNlQ7oBlv3KTI8Yc89Bu?=
>>
>> =?us-ascii?Q?FwZyQn3+5vTTKNFJw8bKccErTnfElcaKbaB+1FO38nkdvBUapBrpUSN42WDW?=
>>
>> =?us-ascii?Q?oPvk8mawq00B2uFpGMJQc28fPwP21VQlU1TGim1mk/u0k8gG396sYx6VIGQy?=
>>
>> =?us-ascii?Q?jp5NAQfcWGoPFs/KjYZ7mpVBldd32IHF7/KhPUK9vZLAKcZ/3YDL2THlWlJB?=
>>
>> =?us-ascii?Q?ufJls7le1VEvtMx5qtEl8Tm8K+f4yrjNV8ZQS5Sid6dvgkHIMu9aPVuMptfY?=
>>
>> =?us-ascii?Q?ln6ONOHtvzsW8q9w2Gr2hsdLtdstWWPgzl4Pr8ILKTGXgY2vqnKupKA3Tc/e?=
>>
>> =?us-ascii?Q?Is0aI0VMcsEVIe2nDVwOBLM8Ev2vlD/9lFk2qq9D64csQDEut/RLO/Kznz0n?=
>>
>> =?us-ascii?Q?eUMXNbtwcHtbYZpzsYag6ZPjn2H02XNVuXUK+pnpYvjxOiIRademmAbjecwd?=
>>
>> =?us-ascii?Q?zpUCb/EdCcm9B+l6IrMSe/aXHuEvWRIB5wLaWOnukYZtj+V/2EXB8/cwbboU?=
>>
>> =?us-ascii?Q?/62U4fIJfZSvhc4pzgvtDBBkxdvShHdrCm7LxkjPbUgh0IS4QJaVfkStopH1?=
>>
>> =?us-ascii?Q?NqhV58H9NZIER2Fkc9JTGxRh50a2L9ujfNVMIjzF+eW+79KRV1QeC9vx2QZ4?=
>>
>> =?us-ascii?Q?IX8XeNvxQcN4w+C/s+t+Lsu94iyIPuIK3avfjzuG6AZn89byqmcDKLU3AzN9?=
>>
>> =?us-ascii?Q?htJ6QuUAQVgRn0vpwo8PMo9LdQL6IbsNmROXZxrH241SXJd05tvHmWqahYSw?=
>>
>> =?us-ascii?Q?6lqRs6cpaGD96IqfuEu8zfH22XsXXv4pM4uIopGqW9qiRw5zdGFcQtDV1EFt?=
>>
>> =?us-ascii?Q?PoM6gIX17qKr8G0IW3UDLP9DT4pSsjYK3UW/k+ymBjOQdAoxuR2p87ECJ9vk?=
>>
>> =?us-ascii?Q?Ii0GxgP114yc6nbKrFl2rrFnPnkHnG8/n0FOlt1Kjr+gYsk3zo08NFVuEhHy?=
>>
>> =?us-ascii?Q?gs22ap4CvjWe9TFI7GqbLX16haGEVu3p6tap8CQUn0UloHrd5JRtOieYqd1c?=
>>
>> =?us-ascii?Q?axVm/t8NIrHRHGF1ma3QXbKfDey0M+f1YLFcvyosYOh8ZQNjIIemkoCP168r?=
>>
>> =?us-ascii?Q?dFq+VfgDPv6+xGrjvnkCgTZejf9yCUBYrZdRKKBSijDHeyIaI/jZNdm/yY3s?=
>>
>> =?us-ascii?Q?mhp0OSTxBKs2V+PKiDqE8r5D99Dk0C9Ormq9HUelAMGwAsbk8iER6u2SXXhQ?=
>>
>> =?us-ascii?Q?h39Lq3PvOFGGc/j/OulNu1AH124Zq6CQ8I1NvMX3EERze5svKkM6xyXbV7jc?=
>>
>> =?us-ascii?Q?KGHr7OiTpgERfhOPLuGyf1novwAXv3fAzFrHCHvix6OzIzf3TO6pcp2anKJp?=
>>
>> =?us-ascii?Q?jqtepmVd4rnE8BjCBHjxQFeSKW6psMVDGYpImWwfmmktne9JbL0BgBlSz7pM?=
>>
>> =?us-ascii?Q?TQdFC9ENpj6t/jppSmBZZ3RfFL2nAyENP2ehvIVMDCvst8DwPT37ToZLlL1X?=
>>
>> =?us-ascii?Q?RWn+26tZBhiZ/h/kmFpixw8vrbdTDMO1k1BrznOC/n8nSML/vBJAECs33022?=
>>
>> =?us-ascii?Q?3vApdemdoCnhWPHpe8BxsDn3Oz22PSKiDsWg0HHlZmCkYQKegnebGXkgypDM?=
>>
>> =?us-ascii?Q?9NBPLkozzcnVkkB09GI4jT+aEVbd8hFmP581ocvL0Qt9tJBLbg8CzrREqg3r?=
>> =?us-ascii?Q?96PbwlNoDNzHpQ=3D=3D?=
>> X-Forefront-Antispam-Report-Untrusted:
>> CIP:104.47.57.169;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
>> NAM11-DM6-obe.outbound.protection.outlook.com;PTR:
>> mail-dm6nam11lp2169.outbound.protection.outlook.com
>> ;CAT:NONE;SFS:(13230031);DIR:INB;
>> X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR16MB4942
>> X-MS-Exchange-Transport-CrossTenantHeadersStripped:
>> MN1PEPF0000ECD9.namprd02.prod.outlook.com
>> X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
>> MN1PEPF0000ECD9.namprd02.prod.outlook.com
>> X-MS-PublicTrafficType: Email
>> X-MS-Office365-Filtering-Correlation-Id-Prvs:
>> 61d165ce-8884-4dc3-2ec0-08dc42bc785a
>> X-Microsoft-Antispam: BCL:0;
>> X-Microsoft-Antispam-Message-Info:
>>
>> =?us-ascii?Q?8K9Mh4AWerzVGZAwy4irrDT1p8z3iW4Yb44PbF6z1qSInh1OMIDL26AI+K2z?=
>>
>> =?us-ascii?Q?g9R4oi5YnhEx4lVcUZ6qS9FRgZ/tqwyTth2TJ1v9bTKlUHvFvZpvFbJaCTKz?=
>>
>> =?us-ascii?Q?NutyNmJDCd10UMS8p43C4fBgqBCS2ZhRUIyYT/si2Fnqh/PJHiJYzacQIh+o?=
>>
>> =?us-ascii?Q?mXHYHVjef1Cw41yvcOAhzbAMsayCTP3dYl201wDALJDBOtZCr0gG0vCehO1q?=
>>
>> =?us-ascii?Q?zSMPtKb6xSacvQh/DfrrK/V8679zKUnOj+cbm4rwNrynQuHGlcR81xj8Q7EY?=
>>
>> =?us-ascii?Q?GQYb7/+TD1julr4Rai0CBnf0V7GkCXldNvLZ1N7JAaB7Oh4x9nRpAspqpw8H?=
>>
>> =?us-ascii?Q?NQ8Lhw3P8tWF451r1sUF85hAk3v3tQUGffMDC6mq8eqQFkTJnO870kjTPaqO?=
>>
>> =?us-ascii?Q?JSUVndcOHbIIBji3OoWCdNEdySPP353yjoBo6RLMOrA6TWsmicXRshgHpvwS?=
>>
>> =?us-ascii?Q?VoTHmlHM2hj4+a+2jdcU5tlNk/NTMlJdsIoDr1d8abzCL+HsP3x0fNPCysom?=
>>
>> =?us-ascii?Q?ANxIeeCHMHJYgyomKc7DCA9fpAGvTCMbOb+ae4MldXahG+7BGwFgjkAuULUa?=
>>
>> =?us-ascii?Q?ILu0Sk73TF6prfr9sFHucXzw1QyXbMhnEhSpTjnC/MpUJObHA0BguYLds5aB?=
>>
>> =?us-ascii?Q?DISyT0wm8yk+oOE5ZFcjkTpyovKrtAIqElQLATkPgf7upLpPQTgUHAEO+FnG?=
>>
>> =?us-ascii?Q?z9xqpSJntQcDM6h/rvwobZOxPQCZ0UPW1SaxclYCcaRIoEEQbSY/IYtJ3TSf?=
>>
>> =?us-ascii?Q?/DrJIc6JaDam3XWqSiOuqIReMYwGrAPcCz7DTruR8bjjyBnzuoxolpS+Dk7u?=
>>
>> =?us-ascii?Q?kodnTOBHLt0QYOglEliz9Gpd4D58pmOPkwLkyvws3biPlB5V0QFBqgX+39oA?=
>>
>> =?us-ascii?Q?9Mf5LGbXO42VtSwhKfIFf/4+ncSgNzvuxSFkUu2ymTb8FZ2FIYJ54Srs/z0R?=
>>
>> =?us-ascii?Q?/lL+OcKzvCz8GhIgsFUv2i5rNkrSHQgB63EjTeOoPXKDUV+KQCu8gNSWvaPu?=
>>
>> =?us-ascii?Q?VSJfOlg1HZfoGoy6yW3TabjPW4a5WMs9PPIXREXZkkeBVV8QzMDRz08XINxn?=
>>
>> =?us-ascii?Q?nvhsbYiRtnO0ZwWE/TjoJD6iw09QfEM4xuPefxiGKMBioi50C3Ykx5GCspon?=
>>
>> =?us-ascii?Q?r56eZtEJ09/aFNt+AXxlInHSbsZ81KfpBv6qMHO1MX2HsmSUrHahtDO1Jl7H?=
>>
>> =?us-ascii?Q?VjU1Ho+9s1kA/Qkjc1Q0jdrPo+WLNQQH6UmKRFSWqS5aj97OqyFqP1r8chxP?=
>>
>> =?us-ascii?Q?eRBtNlM3MFipWvOY9tDX/u4qHN6YLlJl6+mTsX+2QesbQAAJSh8g2y68pdVk?=
>>
>> =?us-ascii?Q?ghjuwxqdKWCmaVf8roJ/M5PnpkyuBv3vRENFVr5sbHSAWjTJucTLP17/BLdP?=
>>
>> =?us-ascii?Q?ecm4rT4KyH+E+0Ax4U5cyziuO8XYajiDGAH9hYuOLtSWBwRX7AYTnUI5h+QT?=
>>
>> =?us-ascii?Q?JpjnXGiuGQVkHNaGJYAa95LUsLvy3TBVHTm70w25/6fsE0Zc3YzXowtoU8GF?=
>>
>> =?us-ascii?Q?uMRIBPfK57EcXF+8C/lMhsgyI2mB/XqTt/Os7ayDUA1YmOEd9JzBbf/6ypZ7?=
>>
>> =?us-ascii?Q?F1KS4rQyobBEueUyMskVOIX3XHu4pliamM56SreHMNziE+EGw6xSFEtZy0zC?=
>>
>> =?us-ascii?Q?Cm4Orft5kPTQM3Gga2HyhOynNceO0QXzRnLEdPUrbJ45CcEMs15PRGtt4r5f?=
>>
>> =?us-ascii?Q?6xJWjW4wMUdvmbJCEYj4+0XABeU7B85kFvSMC6DJ0zG47FXoNtdUfAYT1wfh?=
>>
>> =?us-ascii?Q?e0yaYJFDbrlEJpyM3lkXoF0HuS4/VKqt4vTsGdzc7I9YyWxsmWcO59uTQ9lA?=
>> =?us-ascii?Q?JP/ll4fCdMztBA=3D=3D?=
>> X-Forefront-Antispam-Report:
>> CIP:104.47.58.168;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
>> NAM11-BN8-obe.outbound.protection.outlook.com;PTR:
>> mail-bn8nam11lp2168.outbound.protection.outlook.com
>> ;CAT:NONE;SFS:(13230031);DIR:INB;
>> X-OriginatorOrg: accountprotection.microsoft.com
>> X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Mar 2024 17:47:26.3043
>> (UTC)
>> X-MS-Exchange-CrossTenant-Network-Message-Id:
>> 875bb97f-2b49-44e9-7922-08dc42bc7b06
>> X-MS-Exchange-CrossTenant-Id: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
>> X-MS-Exchange-CrossTenant-AuthSource:
>> MN1PEPF0000ECD9.namprd02.prod.outlook.com
>> X-MS-Exchange-CrossTenant-AuthAs: Anonymous
>> X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
>> X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR16MB4857
>>
>>
>>
>> ---------- Forwarded message ----------
>> From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
>> To: postmaster <postmaster(a)accountprotection.microsoft.com>
>> Cc:
>> Bcc:
>> Date: Tue, 12 Mar 2024 21:17:03 +0330
>> Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
>> xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
>> Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
>> Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
>> IR170120010000003315992937
>>
>>
>> 09392430244
>>
>> در تاریخ سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۴ <
>> postmaster(a)accountprotection.microsoft.com> نوشت:
>>
>> Your message to postmaster(a)accountprotection.microsoft.com couldn't be
>> delivered.
>> postmaster wasn't found at accountprotection.microsoft.com.
>> danayzdanyyzdanydana Office 365 postmaster
>> Action Required Recipient
>> Unknown To address
>>
>> Original Message Details
>> Created Date: 3/12/2024 5:44:33 PM
>> Sender Address: danayzdanyyzdanydana(a)gmail.com
>> Recipient Address: postmaster(a)accountprotection.microsoft.com
>> Subject: Ticket Received - Fwd: Re info send money xchenged Rial Iran
>> total amount 45,8091,000,000,222Rial Send To Bank Name Bank Mellat Accept
>> To History Accoun Number IR720120010000001524852803 name Asgar Siavoshi
>> IP176.56.156.137 185.129.238.152 Document Bank Mellat
>> IR170120010000003315992937
>>
>>
>> 554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
>> BN3PEPF0000B072.namprd04.prod.outlook.com 2024-03-12T17:44:52.106Z
>> 08DC41314D180295]
>> Message rejected by: BN3PEPF0000B072.mail.protection.outlook.co
>> <danayzdanyyzdanydana8888(a)gmail.com>
>> Date: جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۵۱
>> Subject: Fwd: deliverable: Re: deliverable: Ticket Received - Fwd: Re
>> info send money xchenged Rial Iran total amount 45,091,000,000,222Rial Send
>> To Bank Name Bank Mellat Accept To History Accoun Number
>> IR720120010000001524852803 name Asgar Siavoshi IP176.56.156.137
>> 185.129.238.152 Document Bank Mellat IR170120010000003315992937
>>
>>
>>
>>
>> Your message to postmaster(a)accountprotection.microsoft.com couldn't be
>> delivered.
>> postmaster wasn't found at accountprotection.microsoft.com.
>> danayzdanyyzdanydana Office 365 postmaster
>> Action Required Recipient
>> Unknown To address
>>
>>
>> Was this helpful? Send feedback to Microsoft.
>>
>> More Info for Email Admins
>> Status code 554 5.4.14
>>
>> Typically this error occurs because the recipient email address is
>> incorrect or doesn't exist at the destination domain. This can usually be
>> fixed by the sender. However, sometimes the issue needs to be fixed by the
>> recipient or the recipient's email admin. If the steps in the How to Fix It
>> section above don't fix the problem, and you're the email admin for the
>> recipient, try one or more of the following:
>>
>> The email address exists and is correct - Confirm that the recipient
>> address exists, is correct, and is accepting messages.
>>
>> Synchronize your directories - If you have a hybrid environment and are
>> using directory synchronization make sure the recipient's email address is
>> synced correctly in both Office 365 and in your on-premises directory.
>>
>> Errant forwarding rule - Check for forwarding rules that aren't behaving
>> as expected. A forwarding rule can be configured by an admin via mail flow
>> rules or mailbox forwarding address settings, or by the recipient via the
>> Inbox Rules feature.
>>
>> Mail flow settings and MX records are not correct - Misconfigured mail
>> flow settings or MX records can cause this error. Check your Office 365
>> mail flow settings to make sure your domain and any mail flow connectors
>> are set up correctly. Also, work with your domain registrar to make sure
>> the MX records for your domain are configured correctly.
>>
>> Mail loop detected - This error also indicates that the receiving
>> organization's email settings are misconfigured, creating a mail loop when
>> a message is sent to an address that isn't found in their directory. This
>> usually won't disrupt mail flow for recipients that actually exist, but the
>> recipient's email admin should fix the misconfiguration to reduce the
>> chance of any other mail flow issues. A common cause for this loop is that
>> the recipient's domain is configured as "Internal Relay" when it should be
>> "Authoritative." Another common cause for the loop is that both the sender
>> and recipient are part of the same organization, but the sender's mailbox
>> is hosted by Office 365, while the recipient's mailbox is hosted
>> on-premises, and an outbound connector from Office 365 to the on-premises
>> email servers is missing or misconfigured. To fix this, the recipient's
>> email admin should create a correctly configured outbound connector in
>> Office 365 to route the message to the on-premises mailbox.
>>
>>
>> Original Message Details
>> Created Date: 3/12/2024 5:47:03 PM
>> Sender Address: danayzdanyyzdanydana(a)gmail.com
>> Recipient Address: postmaster(a)accountprotection.microsoft.com
>> Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
>> xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
>> Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
>> Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
>> IR170120010000003315992937
>>
>>
>> 554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
>> CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
>> 08DC40438C273EBF]
>> Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
>>
>> Notification Details
>> Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
>> نمایش نوشتار نقل قول شده
>> نمایش نوشتار نقل قول شده
>>
>>
> --
>
> To unsubscribe from this mailing list, get a password reminder, or change
> your subscription options, please visit:
> https://lists.ripe.net/mailman/listinfo/ipv6-wg
>
1
0

Re: [ipv6-wg] Iban number:IR720120010000001524852803 deliverable Rename money cash rule transfer Documents deliverable Money accepted to iban number bank mellat IR160170000000347789811007 Name Tahsin Yazdani
by دانا یزدانی 24 Jun '24
by دانا یزدانی 24 Jun '24
24 Jun '24
09392430244
در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۵ dana yazdani <
danayzdanyyzdanydana8888(a)gmail.com> نوشت:
danayzdanyyzdanydana(a)gmail.com
در تاریخ جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۳۰ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
09392430244
---------- Forwarded message ---------
فرستنده: <postmaster(a)accountprotection.microsoft.com>
Date: سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۷
Subject: deliverable: Re: deliverable: Ticket Received - Fwd: Re info send
money xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank
Name Bank Mellat Accept To History Accoun Number IR720120010000001524852803
name Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
To: <danayzdanyyzdanydana(a)gmail.com>
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Was this helpful? Send feedback to Microsoft.
More Info for Email Admins
Status code 554 5.4.14
Typically this error occurs because the recipient email address is
incorrect or doesn't exist at the destination domain. This can usually be
fixed by the sender. However, sometimes the issue needs to be fixed by the
recipient or the recipient's email admin. If the steps in the How to Fix It
section above don't fix the problem, and you're the email admin for the
recipient, try one or more of the following:
The email address exists and is correct - Confirm that the recipient
address exists, is correct, and is accepting messages.
Synchronize your directories - If you have a hybrid environment and are
using directory synchronization make sure the recipient's email address is
synced correctly in both Office 365 and in your on-premises directory.
Errant forwarding rule - Check for forwarding rules that aren't behaving as
expected. A forwarding rule can be configured by an admin via mail flow
rules or mailbox forwarding address settings, or by the recipient via the
Inbox Rules feature.
Mail flow settings and MX records are not correct - Misconfigured mail flow
settings or MX records can cause this error. Check your Office 365 mail
flow settings to make sure your domain and any mail flow connectors are set
up correctly. Also, work with your domain registrar to make sure the MX
records for your domain are configured correctly.
Mail loop detected - This error also indicates that the receiving
organization's email settings are misconfigured, creating a mail loop when
a message is sent to an address that isn't found in their directory. This
usually won't disrupt mail flow for recipients that actually exist, but the
recipient's email admin should fix the misconfiguration to reduce the
chance of any other mail flow issues. A common cause for this loop is that
the recipient's domain is configured as "Internal Relay" when it should be
"Authoritative." Another common cause for the loop is that both the sender
and recipient are part of the same organization, but the sender's mailbox
is hosted by Office 365, while the recipient's mailbox is hosted
on-premises, and an outbound connector from Office 365 to the on-premises
email servers is missing or misconfigured. To fix this, the recipient's
email admin should create a correctly configured outbound connector in
Office 365 to route the message to the on-premises mailbox.
For more information and tips to fix this problem, see Fix email delivery
issues for error code 5.4.14 in Office 365.
Original Message Details
Created Date: 3/12/2024 5:47:03 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
08DC40438C273EBF]
Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
Notification Details
Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
Message Hops
HOP TIME (UTC) FROM TO WITH RELAY TIME
1 3/12/2024
5:47:18 PM mail-ua1-f46.google.com SMTP 15 sec
2 3/12/2024
5:47:18 PM mail-ua1-f46.google.com
DS1PEPF00017092.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
3 3/12/2024
5:47:18 PM DS1PEPF00017092.namprd03.prod.outlook.com
CH2PR08CA0003.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
4 3/12/2024
5:47:18 PM CH2PR08CA0003.namprd08.prod.outlook.com
DM6PR16MB3878.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
5 3/12/2024
5:47:21 PM NAM11-DM6-obe.outbound.protection.outlook.com
BL02EPF0001A108.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 3 sec
6 3/12/2024
5:47:22 PM BL02EPF0001A108.namprd05.prod.outlook.com
MN2PR12CA0014.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
7 3/12/2024
5:47:22 PM MN2PR12CA0014.namprd12.prod.outlook.com
SN4PR16MB4942.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
8 3/12/2024
5:47:26 PM NAM11-BN8-obe.outbound.protection.outlook.com
MN1PEPF0000ECD9.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 4 sec
9 3/12/2024
5:47:26 PM MN1PEPF0000ECD9.namprd02.prod.outlook.com
BL1PR13CA0199.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
10 3/12/2024
5:47:27 PM BL1PR13CA0199.namprd13.prod.outlook.com
SJ0PR16MB4857.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
Original Message Headers
ARC-Seal: i=5; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=Aa5YWsMr4EgpLJ1IvCsAbdxCafdxhZgTpZCBAO3Hxs5qv9lTx8Dze+VL8VX/SCaDcwDde0Dm6OUKxl/8blopnAsj3SgoqukPp4LdxpAUlcdt13w3kxH2jV0DzZuyoXgfN7b7uMuKzPHnN9+fqMIgCxKFIXIL3l43aak9TWKq0in/IAv8QZj/oIhyyFaQ0lriEsP5mre5wMuNe2Mt599r+YVCu27PYfaZGJxeROopPNggS2bkDLxYaKXL+ULj1myX815TkpeeDph4PWfxXoEUVYwNHASB60T8x7UCpHVoNEWtmTY4LmnZrSTtXRDzYyRQ2wSXWBL7Gtmo6QBl30Srlw==
ARC-Message-Signature: i=5; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=NpqIrGJbRMK4KejwTwBBPDIRnTIJT86mwVRFXzUrmAYRojpaGNLoAfC7KhX53IA1jcw+jhcUBfq8X8Fm+5ggc1zxH7ROwlcVc6LIGuigHC185BmDdYxSVjkQBu79hcTeZOHdgR6mmXN0jl8x0NiSxT0IyGTg5x17AGAk+OgOwwqb5g3FWchX853uwNvWqrcpDpecyNh71nJE6VbF3imW9opuni0iH4Yv7+4kDATktmwMvsKlkB929sAUhSx8AB5IwFwhkUCBwSHBdk87xbdE4vhE0qlh8gnlNAmvSoaPYh226l2ZbwNWOOA27erhYBBs8kMwqwgL324fSygq563E+w==
ARC-Authentication-Results: i=5; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
ARC-Seal: i=4; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=ilbCSmdnUkYC6CBIz9WNbodFggecX7exxr1wL8Z6hnmf3ygNg5QXJSewLWiaP8vyMzjNEl0InaxsfnuyTVWDacMDy9LK96UkDZYil8btjJ/XSOYE0ribyTzNlt7XO89SPSi2PSGC9kJQLPDv2o1ZbkeT0cBlmJXKbiOTfxhbsCT2HqX/TL3HW9EG/i3hArd2aAkJTEqyBUk6laRDBDxdqzZZWqqKvveh3DP17WDGs0RXhudGTSM0biBibOeea66buhkZZW0Q+lKqPRQ2Hynae2QFT8Yui+iKCpLqg3wZ+Ok1wbowvvGXoneBeHaVqk5tnkXHNyf1qlx8SIQZ0Yu+NQ==
ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=mahRZuUz61vJYT7Adc2bb2/X1XtMr3iVHQTg8khZ1gz5/yZi/D8wa6EWKhuBzVmyoiAo9NtZokuQoouk1FHAYoIK/xweFAL+atm3881OLxYug4axR8lFKoQoV3HtYJw5+zuZT/hCTnHMKGYi7UoyqcZs/0Xg1wXaTwDoLeIwM4a4toiYLbODWrN7TQWgU/WvpkZ0tAOe0+klOhhPU6xjbqUc4+RsswI/baxymz+6cz6WfoYuKCOQfCnCU33vZk15uadRLDLQdUTYTUBNfJKOmFhXB0nSHd1z7YbqlXqqIzugeRt+fG4m1skOMdclxlwj8LcAYpws+2ngJsSILJPOvg==
ARC-Authentication-Results: i=4; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.168) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
Received: from BL1PR13CA0199.namprd13.prod.outlook.com
(2603:10b6:208:2be::24)
by SJ0PR16MB4857.namprd16.prod.outlook.com (2603:10b6:a03:400::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.35; Tue, 12 Mar
2024 17:47:27 +0000
Received: from MN1PEPF0000ECD9.namprd02.prod.outlook.com
(2603:10b6:208:2be:cafe::b2) by BL1PR13CA0199.outlook.office365.com
(2603:10b6:208:2be::24) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.18 via Frontend
Transport; Tue, 12 Mar 2024 17:47:26 +0000
Authentication-Results: spf=softfail (sender IP is 104.47.58.168)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.58.168 as permitted sender)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168)
by MN1PEPF0000ECD9.mail.protection.outlook.com (10.167.242.138) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via Frontend
Transport; Tue, 12 Mar 2024 17:47:26 +0000
ARC-Seal: i=3; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=f/tXteJSKLHt8RydHAQlh1Jv8qca9qt7aeTjdLvIwoanI1kRp67WFXJ27z/tEJvX+ahAGT5c3l/5u7NB0aKBNoK0RP3PfO95tR3bXUkIHaL0J5JWawir8QsEETbxs6GgPF7WMRT82lWVljX9nJ1Kao6LyeevKYXg8n9gIpy9qONNywHEzPz1zoXS4qacJKmyBHeyDe3mdN1PEXg96UyBlVRwGvUDuD5zWbiJmjBPh0tFfqfuLOighFfKkGeo5ktRxSeOwUUWqdjgBO4tdgBZ0bJTV8F6WRF6VkyG+Owp9K/PAyS7iYJ0cO8MCuiGkiMWNDTKSDysJTOBqqu9ve1iww==
ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=eh5zTrqYY2flv+whgn+vTu8iqFhmp9m9R8glNDe+pI7EUn60Rnl3qM+Pk3vMk5NEIkLdIK0OFf8iHjnCaTJtDzN02zC5ZbpdLF83rSpI972SocSSwRP08/EGaYwqUavVx2d92XkBCVAJXvjymST2nZ9V/1xUxt/qnY/T8XmxYdGizyrvK53NgdM71oel89R6Ye+IQ3LJ1Ai08QkTdT/UPBshlylStJhOUw1KSOFrHPHZVziP4poC0hvruWp4oj1NndM4ZJnOrFg+wieTyMh5GFBhRDrU/yTaH4PgPpuj4fqQTdUWEZ0dQTkrp2qSQJKXiB7rKnw+BenQ6lzmwmakRA==
ARC-Authentication-Results: i=3; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=Jq+NfGCU8rO4GLgVOm7V+iNr1F+e8v4YsAmOna02SGzfrfry2TcPUG/OkWzxrQTZoc/gx8Q3DNpjuSs5vFkTlvG4arLyO6/cuK1HoUVbWAjEOk/ZkebQ+xoAeZDQvL696/Kmh/JqBkkx43GeheSUe04CncnwFemNaPCtzI53Flw6Da3gcVOdQWBlTc9X1ZHlUSoLEiYSisYvOuvbMV1af7dxpJQ8VnAT8CCmOOzkzF4CC/jBljCKGZNQ/ILaNjvD1nW5iRAu8i0g86w/B/VvhM6okdHn+5iEcgNUe9PQ+xT8y5OjVlbBKSpLJhprnxwLG7K4aoHxFLTAnFdoyStDKQ==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=Yec1glAjjdFs2AheWrByJZZaCw6RWbQyc/Rbf2MjTZiu0ZRmB37qrOCOR8JUafyKEJzBo1r3Zl6ekLxrEkvyaBwDW9hkaUi/M2sPiS4wiV2t0mg7QaSIqgm9qRZHbtR8KAOJf83H5DaxAzaaH/ATXA+OAJvQx47YLVelayOvbbQ1FzygxjQP92FFfMVcb8Mj1f6Ix3I00bEgnVcbDoxzf9mEG522EkAIAVZV5Wcdm6VTJ8YMhv0UXYkggnT+ZXPv7J3tZZFy9ru2sD90L/4hzzVh2SWvjJUwwfmbDMbI406oljdp8U2jS713WjXKlWANKjnE6Ex4DE/v0vRviNROjQ==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.57.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
Received: from MN2PR12CA0014.namprd12.prod.outlook.com
(2603:10b6:208:a8::27)
by SN4PR16MB4942.namprd16.prod.outlook.com (2603:10b6:806:213::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12 Mar
2024 17:47:22 +0000
Received: from BL02EPF0001A108.namprd05.prod.outlook.com
(2603:10b6:208:a8:cafe::ab) by MN2PR12CA0014.outlook.office365.com
(2603:10b6:208:a8::27) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.34 via Frontend
Transport; Tue, 12 Mar 2024 17:47:22 +0000
Authentication-Results-Original: spf=softfail (sender IP is 104.47.57.169)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.57.169 as permitted sender)
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169)
by BL02EPF0001A108.mail.protection.outlook.com (10.167.241.138) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.12 via Frontend
Transport; Tue, 12 Mar 2024 17:47:21 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=Piz6MQpsatxgRgdMQnHp6kgECDkTMbE0DgG4wRYwIRajXQ3MI8SBFrIcZyLrnb1zSG5vzzeN/n9ZjV992Cr04wHSY7hNjXeMah9nnxHyFFhY8Gjt1FKxhu8Zehq4UeL2u/SWL5cVuXvYdRLEAZbTu/y0CYC9wapF1rOzZLqJ/SFdziwWyfbXhMV3jYncpyv8cU02VRF1+eMcRX6nFmNLmya0AuNaBIrTrgB/0HNEKo84YHDac0qS1TnbPIeVW1yRZWzAHVbw3JTFuAiZIgALNCJtuFzySqlh2aqlentHH+xcipVLOo6gXos6t1f2wmMU90dFbYqB1WNt76/fprsxZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com
;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=YS1TaX4oevejDGaHcLzQ0ne1TCC2JVuNGGQGRZ5uKCdgZtx013WcY+80y0Ug8Yr1l1TW24aRHzgLYJR/fgdZD/M9aL75janGpC+fwFm31ycEInoixwW25Sw84cb13ac+fyxLCNMekLnGA4kuOQGkxOrG71r0dibY1UJ5VwBaEN1YhZV1QvuFPL7VyCDnrfbFpOVNj5AgyQb5wi+X9NS1ulvz3ajrX3rempG1bG4MRD1D8Oi15zSNZ/P7VeToM5mONFCouDaDlgRnfwuV/jRusjS8qP72XzKt2cW0U93crmQD+sHQeB0sL2gTYwoTBV1VtR7XefFmR8/Jjqsd/uJ/rA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.222.46) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=none (0)
Received: from CH2PR08CA0003.namprd08.prod.outlook.com
(2603:10b6:610:5a::13)
by DM6PR16MB3878.namprd16.prod.outlook.com (2603:10b6:5:295::11) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.36; Tue, 12 Mar
2024 17:47:18 +0000
Received: from DS1PEPF00017092.namprd03.prod.outlook.com
(2603:10b6:610:5a:cafe::29) by CH2PR08CA0003.outlook.office365.com
(2603:10b6:610:5a::13) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7292.50 via Frontend
Transport; Tue, 12 Mar 2024 17:47:18 +0000
Authentication-Results-Original: spf=pass (sender IP is 209.85.222.46)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com
;compauth=pass
reason=100
Received-SPF: Pass (protection.outlook.com: domain of gmail.com designates
209.85.222.46 as permitted sender) receiver=protection.outlook.com;
client-ip=209.85.222.46; helo=mail-ua1-f46.google.com; pr=C
Received: from mail-ua1-f46.google.com (209.85.222.46) by
DS1PEPF00017092.mail.protection.outlook.com (10.167.17.135) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384)
id
15.20.7386.12 via Frontend Transport; Tue, 12 Mar 2024 17:47:18 +0000
Received: by mail-ua1-f46.google.com with SMTP id
a1e0cc1a2514c-7db44846716so2263539241.2
for <postmaster(a)accountprotection.microsoft.com>; Tue, 12 Mar 2024
10:47:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=20230601; t=1710265638; x=1710870438; darn=
accountprotection.microsoft.com;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:from:to:cc:subject:date:message-id:reply-to;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=XhUuiy+ci52A6Z8V5D0K7sf0mPvDFImSSIHdIircb7/whb+jGal7HLyl2SnGMeQMCC
1mn+5NZoohJDANQ1HsNlUP038/oRtUuHSc1zhmOg9A/yyroEezQPuKZraBjV+Dc53YPJ
V4U49FYr1uyAu018nOeD2t0HZl+fIDytynK1q/byG7L+6MKiSqkCzRKHQw1Q+KVYi9x4
CsmCzLHGLRjAW8bAd/funTyPmst57Q7d+pygvltzoTFkgVYc2ue3zKs3EsJs+4pSV30E
ZCqJQJ2JpsAWkWYnylFuFq2iq077xtWTpvo68xpeOm1YyRZ7tPDd5yKO0LH4zbnXnQe7
FvPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20230601; t=1710265638; x=1710870438;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
bh=1WsSkRmWoLfaOPz+vQP7Eyc99N9ca+wvghasmgEHLy0=;
b=bfCscBGtqVJaI701ZDbN/7zxV0h9bbO9XjhOFS0zxAxHsJX6cq0sc3VClYCId7HWxp
KFvsS5jUAKqWFk5qX+WqhkAMbA5XwzQ0+k76W4MwoYfwXFa6dbMzT2/CzhF3NMibZMlT
RKrA+06Y3C2l/c7W/n75caH+EkRWw3Cw/vQMi6agFFy58fZ/zHup/RJXJuPbR2L2lr5O
CEbTNO0SrscBnU/6eV/KNJCCrLqc4X++emlpzdyO03WQZBlCbPy2JeayyJKJ1QKSXLkD
e2i6lTyd0XwB+shLE98Tc7zStYBwZA/yY0ODJjVwDS1KA7Fohp44ayQuqbPeU+wGY/I7
s2xg==
X-Gm-Message-State: AOJu0YwOnlTOJluxvfcokBqX9Wu5lsnSy13MNr0OrQGXsHEZMzzp5Ki6
Da34r3asau3HNPxFqy4zOaoI+mdAgYFedPVBDA4wsiPM8OITCPKto7UmxQouCiom7xEzXXzt6Iq
I0Sx5C1GyVtEBH2jI+n1nB1CTCq2nkI56/O2As/On7yg=
X-Google-Smtp-Source:
AGHT+IG4Xwa8+jwhUtnwMWYzIhj+Vb8oZIXlfAPvDa7LuepIbBR/2+HjFTlDXJUsNMUMa3FAtBmxog7/xddNDzFCsQY=
X-Received: by 2002:a05:6102:50a9:b0:472:a040:dd94 with SMTP id
bl41-20020a05610250a900b00472a040dd94mr3545409vsb.29.1710265637311; Tue, 12
Mar 2024 10:47:17 -0700 (PDT)
MIME-Version: 1.0
References: <CAPw7qDyix=N6wm9TKXkY-Rh8b=
Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com>
CAPw7qDyix=N6wm9TKXkY-Rh8b=Q0iaTXtXTAiQZo7gvvY0R6oQ(a)mail.gmail.com <
2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>
In-Reply-To: <
2ae29027-629f-4787-b7d4-314dd6fa8c4f(a)CH3PR16MB6513.namprd16.prod.outlook.com
>
From: =?UTF-8?B?2K/Yp9mG2Kcg24zYstiv2KfZhtuM?= <
danayzdanyyzdanydana(a)gmail.com>
Date: Tue, 12 Mar 2024 21:17:03 +0330
Message-ID: <
CAPw7qDxunhPRyrt5JUG6d9+gzo3Ajh9p4o031ZX523TXMXLeAA(a)mail.gmail.com>
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money xchenged
Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name Bank Mellat
Accept To History Accoun Number IR720120010000001524852803 name Asgar
Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Content-Type: multipart/alternative; boundary="000000000000c89a7506137a3f81"
Return-Path: danayzdanyyzdanydana(a)gmail.com
X-EOPAttributedMessage: 2
X-EOPTenantAttributedMessage: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7:2
X-MS-TrafficTypeDiagnostic:
DS1PEPF00017092:EE_|DM6PR16MB3878:EE_|BL02EPF0001A108:EE_|SN4PR16MB4942:EE_|MN1PEPF0000ECD9:EE_|SJ0PR16MB4857:EE_
X-MS-Office365-Filtering-Correlation-Id:
875bb97f-2b49-44e9-7922-08dc42bc7b06
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?k5wasqG5loGlnxUaXwGusQq0hJQs1UjouNvxaaF1aQIPz+LtmXLv75BAnKKr?=
=?us-ascii?Q?RF7bXezedyod5TnhgCjuf0oYE4VTR6va85+1oiUzhtVZMMKFj+WEic8617vu?=
=?us-ascii?Q?CuKBU44S4LW3mdZm4WiPb6AQdmL1dudw0Acv2Dkt/MsVhHsv42kPpoUhkQKB?=
=?us-ascii?Q?7FDeauD5f+Sdne353+ssE//9CN9VfI752KFv4IFH1+YMI74PiBvmTrzqwlfE?=
=?us-ascii?Q?OeE6YB+V+QwDnBDi3qq1+Kbg0dDFRdOCxyfzCeoqwQwGG7Uh6umxwzXr9ffs?=
=?us-ascii?Q?mCdumjA3O8iFvtaYKQXbsjEUdN3EaWm6oJXRJI6LcNMmTFKa1zCUT9DlIK4q?=
=?us-ascii?Q?zP7iCsGEONY7YIxMzvsMjni96WIqF0TVPZ6fZcPxJmGZVSgK1VDviI8cb9fH?=
=?us-ascii?Q?hdsnxxwElnMYkRkdoNR79MgmwSi1jzuPTGvNZiOUymCQ+4zgMLhSZHozJzKI?=
=?us-ascii?Q?uJTyEsne2aRYsIfCb0NkwjKOxmpAFyQj9nFXH9iybHu0jh0ACKZgb24ursMv?=
=?us-ascii?Q?ZweguyORenEywe/VTMD2WmFiMXReoKSpCqE0NfxHk34NBUu90QpAVw5qv4q2?=
=?us-ascii?Q?1585+i2lQsf0BQG7OzRWxciFWjXX+ZYwY4rKbEsMBxNXiyuHh3F2wsaBaorb?=
=?us-ascii?Q?y23IWnwGGEjDmQg91NYFlRzrKb6OcfRMOQPMlZdBC5Hp/4PgV6h5BoHP3x5h?=
=?us-ascii?Q?1X75jTsn18yv+u9xCGpcv9AusCvVuyvbVghVtIuG2IsMOCO0ZrMk1qSFFOsl?=
=?us-ascii?Q?baCwvPBlq1SvlP59s9IlEI715WiWBIrQvZJFC5X8j8n00k8GTNF7g6oFbr48?=
=?us-ascii?Q?1OqFakxzh8QRlTZqR/QIjc/WoMr5dgYslFWIyMlkiqKDxvB84SPeA+fqCkVf?=
=?us-ascii?Q?YrNJb6nPKzpDZhj67fVV3Ib+AYG38FoZf04wQk2SzoVnHYNt8sz6RsCD/u76?=
=?us-ascii?Q?bzMh7DWOAYekt/UKhltvUpzQn3BNI6wFPDuMJh7/+m83RN7LqQq51ZzoNtQJ?=
=?us-ascii?Q?9iH0UFP+Fu4W3a9Ss6ldo32PpS0q1EgsgiTvr/+sK9QBYJlPWN5eH/Lv7jkh?=
=?us-ascii?Q?nh0p03J7/Bz6VNJziCFT7H1M9hdGDdaVQupCqWojn4A4gzYSm9QVCFrPo8CP?=
=?us-ascii?Q?lUHjlI5jGuI4mV87/gVeHWCYZLIuewbh0OW/YAmT0U+ZP10SYJVbd9EfjTLM?=
=?us-ascii?Q?PHe0x0I0HajbKClntpkPzZzHHJpoCrOrD+/3RUZtrFPjqNUXqy3NaKXP4Hqv?=
=?us-ascii?Q?mlrUAsb2QfBcFPL4uUNWAXIhDvLoGFWd3YULLEPq9uPPtUDaCZSnl5eo7UI8?=
=?us-ascii?Q?1fFZPRUp9RSGs4sZQ/uDV0mRHXbJwKyiXdxG3Nwk5ZuHPt/dqZIdzK/9zgwY?=
=?us-ascii?Q?nCsHtsUGWTNTNIIyRchxlZhCecy9+U2UvRgSR+NcgJmylOlO8q0fZsUOKklG?=
=?us-ascii?Q?1aQGzfxKl9EMPar022kIvdpSh/mJXxxq32DVRjlR2HBTNzKpLiEsxYDiuhUc?=
=?us-ascii?Q?enV+T1U+I3ADaAeRP7e6Bz3ISeD1a1snsLdRnV9y6ppe/n0GQPPV1wDlYtis?=
=?us-ascii?Q?/8ZgGorgd30iVcLurGgU3m604zVXxulEYtJhyFKu5UJHWZ0fxsWimtPrLt2R?=
=?us-ascii?Q?51f30cjCQXtsMlZcWiOLK0jjAupHUNX88C2r76JZE1Cked7O/mxTKLTyYHyh?=
=?us-ascii?Q?YSP4WwgS1Igj+08C76KcXXrRLY8ZaRf2M8xIQJ+XP2rvLykXVWC/9wzwu9HT?=
=?us-ascii?Q?P84HV8Xkca13vmW1mU29Q0lgsardUV9B0NApUsgLk6pI3lTRHSG6N9a+pU/X?=
=?us-ascii?Q?xvW6cMbZSFzn4g=3D=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:209.85.222.46;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
mail-ua1-f46.google.com;PTR:mail-ua1-f46.google.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-ExternalRecipientOutboundConnectors: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR16MB3878
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
BL02EPF0001A108.namprd05.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
BL02EPF0001A108.namprd05.prod.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
593f53b6-d741-4787-1e9c-08dc42bc7648
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?6bBhdidpmRXZkmd5qLw90EZMWcrkc5ZlXl5JtIKHIYc2aMzmBKRT3t/J7OuB?=
=?us-ascii?Q?smBtCFSp05ufL/MWuQsfiKkcbkYEtzmGidW/i6Fik/fbUwstldy8BFLGLPp6?=
=?us-ascii?Q?ejcgBC/cCjP78XS1ym/Gaw/u2iivvvp+PUipZWN5UWpJJ12KnJJfnu9siAqE?=
=?us-ascii?Q?W1rkkFFU8ft/9DEk/catj9+UUO9a1nT5dcWrqofewNlQ7oBlv3KTI8Yc89Bu?=
=?us-ascii?Q?FwZyQn3+5vTTKNFJw8bKccErTnfElcaKbaB+1FO38nkdvBUapBrpUSN42WDW?=
=?us-ascii?Q?oPvk8mawq00B2uFpGMJQc28fPwP21VQlU1TGim1mk/u0k8gG396sYx6VIGQy?=
=?us-ascii?Q?jp5NAQfcWGoPFs/KjYZ7mpVBldd32IHF7/KhPUK9vZLAKcZ/3YDL2THlWlJB?=
=?us-ascii?Q?ufJls7le1VEvtMx5qtEl8Tm8K+f4yrjNV8ZQS5Sid6dvgkHIMu9aPVuMptfY?=
=?us-ascii?Q?ln6ONOHtvzsW8q9w2Gr2hsdLtdstWWPgzl4Pr8ILKTGXgY2vqnKupKA3Tc/e?=
=?us-ascii?Q?Is0aI0VMcsEVIe2nDVwOBLM8Ev2vlD/9lFk2qq9D64csQDEut/RLO/Kznz0n?=
=?us-ascii?Q?eUMXNbtwcHtbYZpzsYag6ZPjn2H02XNVuXUK+pnpYvjxOiIRademmAbjecwd?=
=?us-ascii?Q?zpUCb/EdCcm9B+l6IrMSe/aXHuEvWRIB5wLaWOnukYZtj+V/2EXB8/cwbboU?=
=?us-ascii?Q?/62U4fIJfZSvhc4pzgvtDBBkxdvShHdrCm7LxkjPbUgh0IS4QJaVfkStopH1?=
=?us-ascii?Q?NqhV58H9NZIER2Fkc9JTGxRh50a2L9ujfNVMIjzF+eW+79KRV1QeC9vx2QZ4?=
=?us-ascii?Q?IX8XeNvxQcN4w+C/s+t+Lsu94iyIPuIK3avfjzuG6AZn89byqmcDKLU3AzN9?=
=?us-ascii?Q?htJ6QuUAQVgRn0vpwo8PMo9LdQL6IbsNmROXZxrH241SXJd05tvHmWqahYSw?=
=?us-ascii?Q?6lqRs6cpaGD96IqfuEu8zfH22XsXXv4pM4uIopGqW9qiRw5zdGFcQtDV1EFt?=
=?us-ascii?Q?PoM6gIX17qKr8G0IW3UDLP9DT4pSsjYK3UW/k+ymBjOQdAoxuR2p87ECJ9vk?=
=?us-ascii?Q?Ii0GxgP114yc6nbKrFl2rrFnPnkHnG8/n0FOlt1Kjr+gYsk3zo08NFVuEhHy?=
=?us-ascii?Q?gs22ap4CvjWe9TFI7GqbLX16haGEVu3p6tap8CQUn0UloHrd5JRtOieYqd1c?=
=?us-ascii?Q?axVm/t8NIrHRHGF1ma3QXbKfDey0M+f1YLFcvyosYOh8ZQNjIIemkoCP168r?=
=?us-ascii?Q?dFq+VfgDPv6+xGrjvnkCgTZejf9yCUBYrZdRKKBSijDHeyIaI/jZNdm/yY3s?=
=?us-ascii?Q?mhp0OSTxBKs2V+PKiDqE8r5D99Dk0C9Ormq9HUelAMGwAsbk8iER6u2SXXhQ?=
=?us-ascii?Q?h39Lq3PvOFGGc/j/OulNu1AH124Zq6CQ8I1NvMX3EERze5svKkM6xyXbV7jc?=
=?us-ascii?Q?KGHr7OiTpgERfhOPLuGyf1novwAXv3fAzFrHCHvix6OzIzf3TO6pcp2anKJp?=
=?us-ascii?Q?jqtepmVd4rnE8BjCBHjxQFeSKW6psMVDGYpImWwfmmktne9JbL0BgBlSz7pM?=
=?us-ascii?Q?TQdFC9ENpj6t/jppSmBZZ3RfFL2nAyENP2ehvIVMDCvst8DwPT37ToZLlL1X?=
=?us-ascii?Q?RWn+26tZBhiZ/h/kmFpixw8vrbdTDMO1k1BrznOC/n8nSML/vBJAECs33022?=
=?us-ascii?Q?3vApdemdoCnhWPHpe8BxsDn3Oz22PSKiDsWg0HHlZmCkYQKegnebGXkgypDM?=
=?us-ascii?Q?9NBPLkozzcnVkkB09GI4jT+aEVbd8hFmP581ocvL0Qt9tJBLbg8CzrREqg3r?=
=?us-ascii?Q?96PbwlNoDNzHpQ=3D=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:104.47.57.169;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
NAM11-DM6-obe.outbound.protection.outlook.com;PTR:
mail-dm6nam11lp2169.outbound.protection.outlook.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR16MB4942
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
61d165ce-8884-4dc3-2ec0-08dc42bc785a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
=?us-ascii?Q?8K9Mh4AWerzVGZAwy4irrDT1p8z3iW4Yb44PbF6z1qSInh1OMIDL26AI+K2z?=
=?us-ascii?Q?g9R4oi5YnhEx4lVcUZ6qS9FRgZ/tqwyTth2TJ1v9bTKlUHvFvZpvFbJaCTKz?=
=?us-ascii?Q?NutyNmJDCd10UMS8p43C4fBgqBCS2ZhRUIyYT/si2Fnqh/PJHiJYzacQIh+o?=
=?us-ascii?Q?mXHYHVjef1Cw41yvcOAhzbAMsayCTP3dYl201wDALJDBOtZCr0gG0vCehO1q?=
=?us-ascii?Q?zSMPtKb6xSacvQh/DfrrK/V8679zKUnOj+cbm4rwNrynQuHGlcR81xj8Q7EY?=
=?us-ascii?Q?GQYb7/+TD1julr4Rai0CBnf0V7GkCXldNvLZ1N7JAaB7Oh4x9nRpAspqpw8H?=
=?us-ascii?Q?NQ8Lhw3P8tWF451r1sUF85hAk3v3tQUGffMDC6mq8eqQFkTJnO870kjTPaqO?=
=?us-ascii?Q?JSUVndcOHbIIBji3OoWCdNEdySPP353yjoBo6RLMOrA6TWsmicXRshgHpvwS?=
=?us-ascii?Q?VoTHmlHM2hj4+a+2jdcU5tlNk/NTMlJdsIoDr1d8abzCL+HsP3x0fNPCysom?=
=?us-ascii?Q?ANxIeeCHMHJYgyomKc7DCA9fpAGvTCMbOb+ae4MldXahG+7BGwFgjkAuULUa?=
=?us-ascii?Q?ILu0Sk73TF6prfr9sFHucXzw1QyXbMhnEhSpTjnC/MpUJObHA0BguYLds5aB?=
=?us-ascii?Q?DISyT0wm8yk+oOE5ZFcjkTpyovKrtAIqElQLATkPgf7upLpPQTgUHAEO+FnG?=
=?us-ascii?Q?z9xqpSJntQcDM6h/rvwobZOxPQCZ0UPW1SaxclYCcaRIoEEQbSY/IYtJ3TSf?=
=?us-ascii?Q?/DrJIc6JaDam3XWqSiOuqIReMYwGrAPcCz7DTruR8bjjyBnzuoxolpS+Dk7u?=
=?us-ascii?Q?kodnTOBHLt0QYOglEliz9Gpd4D58pmOPkwLkyvws3biPlB5V0QFBqgX+39oA?=
=?us-ascii?Q?9Mf5LGbXO42VtSwhKfIFf/4+ncSgNzvuxSFkUu2ymTb8FZ2FIYJ54Srs/z0R?=
=?us-ascii?Q?/lL+OcKzvCz8GhIgsFUv2i5rNkrSHQgB63EjTeOoPXKDUV+KQCu8gNSWvaPu?=
=?us-ascii?Q?VSJfOlg1HZfoGoy6yW3TabjPW4a5WMs9PPIXREXZkkeBVV8QzMDRz08XINxn?=
=?us-ascii?Q?nvhsbYiRtnO0ZwWE/TjoJD6iw09QfEM4xuPefxiGKMBioi50C3Ykx5GCspon?=
=?us-ascii?Q?r56eZtEJ09/aFNt+AXxlInHSbsZ81KfpBv6qMHO1MX2HsmSUrHahtDO1Jl7H?=
=?us-ascii?Q?VjU1Ho+9s1kA/Qkjc1Q0jdrPo+WLNQQH6UmKRFSWqS5aj97OqyFqP1r8chxP?=
=?us-ascii?Q?eRBtNlM3MFipWvOY9tDX/u4qHN6YLlJl6+mTsX+2QesbQAAJSh8g2y68pdVk?=
=?us-ascii?Q?ghjuwxqdKWCmaVf8roJ/M5PnpkyuBv3vRENFVr5sbHSAWjTJucTLP17/BLdP?=
=?us-ascii?Q?ecm4rT4KyH+E+0Ax4U5cyziuO8XYajiDGAH9hYuOLtSWBwRX7AYTnUI5h+QT?=
=?us-ascii?Q?JpjnXGiuGQVkHNaGJYAa95LUsLvy3TBVHTm70w25/6fsE0Zc3YzXowtoU8GF?=
=?us-ascii?Q?uMRIBPfK57EcXF+8C/lMhsgyI2mB/XqTt/Os7ayDUA1YmOEd9JzBbf/6ypZ7?=
=?us-ascii?Q?F1KS4rQyobBEueUyMskVOIX3XHu4pliamM56SreHMNziE+EGw6xSFEtZy0zC?=
=?us-ascii?Q?Cm4Orft5kPTQM3Gga2HyhOynNceO0QXzRnLEdPUrbJ45CcEMs15PRGtt4r5f?=
=?us-ascii?Q?6xJWjW4wMUdvmbJCEYj4+0XABeU7B85kFvSMC6DJ0zG47FXoNtdUfAYT1wfh?=
=?us-ascii?Q?e0yaYJFDbrlEJpyM3lkXoF0HuS4/VKqt4vTsGdzc7I9YyWxsmWcO59uTQ9lA?=
=?us-ascii?Q?JP/ll4fCdMztBA=3D=3D?=
X-Forefront-Antispam-Report:
CIP:104.47.58.168;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:
NAM11-BN8-obe.outbound.protection.outlook.com;PTR:
mail-bn8nam11lp2168.outbound.protection.outlook.com
;CAT:NONE;SFS:(13230031);DIR:INB;
X-OriginatorOrg: accountprotection.microsoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Mar 2024 17:47:26.3043
(UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id:
875bb97f-2b49-44e9-7922-08dc42bc7b06
X-MS-Exchange-CrossTenant-Id: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-CrossTenant-AuthSource:
MN1PEPF0000ECD9.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR16MB4857
---------- Forwarded message ----------
From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Cc:
Bcc:
Date: Tue, 12 Mar 2024 21:17:03 +0330
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
09392430244
در تاریخ سهشنبه ۱۲ مارس ۲۰۲۴، ۲۱:۱۴ <
postmaster(a)accountprotection.microsoft.com> نوشت:
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Original Message Details
Created Date: 3/12/2024 5:44:33 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Ticket Received - Fwd: Re info send money xchenged Rial Iran total
amount 45,8091,000,000,222Rial Send To Bank Name Bank Mellat Accept To
History Accoun Number IR720120010000001524852803 name Asgar Siavoshi
IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
BN3PEPF0000B072.namprd04.prod.outlook.com 2024-03-12T17:44:52.106Z
08DC41314D180295]
Message rejected by: BN3PEPF0000B072.mail.protection.outlook.co
<danayzdanyyzdanydana8888(a)gmail.com>
Date: جمعه ۱۵ مارس ۲۰۲۴، ۲۲:۵۱
Subject: Fwd: deliverable: Re: deliverable: Ticket Received - Fwd: Re info
send money xchenged Rial Iran total amount 45,091,000,000,222Rial Send To
Bank Name Bank Mellat Accept To History Accoun Number
IR720120010000001524852803 name Asgar Siavoshi IP176.56.156.137
185.129.238.152 Document Bank Mellat IR170120010000003315992937
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
Action Required Recipient
Unknown To address
Was this helpful? Send feedback to Microsoft.
More Info for Email Admins
Status code 554 5.4.14
Typically this error occurs because the recipient email address is
incorrect or doesn't exist at the destination domain. This can usually be
fixed by the sender. However, sometimes the issue needs to be fixed by the
recipient or the recipient's email admin. If the steps in the How to Fix It
section above don't fix the problem, and you're the email admin for the
recipient, try one or more of the following:
The email address exists and is correct - Confirm that the recipient
address exists, is correct, and is accepting messages.
Synchronize your directories - If you have a hybrid environment and are
using directory synchronization make sure the recipient's email address is
synced correctly in both Office 365 and in your on-premises directory.
Errant forwarding rule - Check for forwarding rules that aren't behaving as
expected. A forwarding rule can be configured by an admin via mail flow
rules or mailbox forwarding address settings, or by the recipient via the
Inbox Rules feature.
Mail flow settings and MX records are not correct - Misconfigured mail flow
settings or MX records can cause this error. Check your Office 365 mail
flow settings to make sure your domain and any mail flow connectors are set
up correctly. Also, work with your domain registrar to make sure the MX
records for your domain are configured correctly.
Mail loop detected - This error also indicates that the receiving
organization's email settings are misconfigured, creating a mail loop when
a message is sent to an address that isn't found in their directory. This
usually won't disrupt mail flow for recipients that actually exist, but the
recipient's email admin should fix the misconfiguration to reduce the
chance of any other mail flow issues. A common cause for this loop is that
the recipient's domain is configured as "Internal Relay" when it should be
"Authoritative." Another common cause for the loop is that both the sender
and recipient are part of the same organization, but the sender's mailbox
is hosted by Office 365, while the recipient's mailbox is hosted
on-premises, and an outbound connector from Office 365 to the on-premises
email servers is missing or misconfigured. To fix this, the recipient's
email admin should create a correctly configured outbound connector in
Office 365 to route the message to the on-premises mailbox.
Original Message Details
Created Date: 3/12/2024 5:47:03 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Re: deliverable: Ticket Received - Fwd: Re info send money
xchenged Rial Iran total amount 45,091,000,000,222Rial Send To Bank Name
Bank Mellat Accept To History Accoun Number IR720120010000001524852803 name
Asgar Siavoshi IP176.56.156.137 185.129.238.152 Document Bank Mellat
IR170120010000003315992937
554 5.4.14 Hop count exceeded - possible mail loop ATTR34 [
CH2PEPF00000099.namprd02.prod.outlook.com 2024-03-12T17:47:30.438Z
08DC40438C273EBF]
Message rejected by: CH2PEPF00000099.mail.protection.outlook.com
Notification Details
Sent by: SJ0PR16MB4857.namprd16.prod.outlook.com
نمایش نوشتار نقل قول شده
نمایش نوشتار نقل قول شده
1
2

Re: [ipv6-wg] Fwd-Docoment Address Iban IR170120010000003315992937 Send Deliverable Rename access to Money Rial Cash Rule Transfer Accepts release To has ben Bank Mellat IR160170000000347789811007
by دانا یزدانی 23 Jun '24
by دانا یزدانی 23 Jun '24
23 Jun '24
09392430244
در تاریخ سهشنبه ۳۰ آوریل ۲۰۲۴، ۱۸:۲۱ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
Gmail :
danayzdanyyzdanydana(a)gmail.com
Total Amount:8,070,000,000,000Rial Iranian-Transaction confirmation
delivery money set to account bank mellat has been accept including
status...IP Account Bank mellat 005.113.102.244
SMS Bank phone number:09392430244
Account number:3315992937
Iban sheba number:IR17 0120 0100 0000 3315 9929 37
Card number shaparak.ir:6104338672525793
Code Shahab: 1000006460031973
Name:Dana Yazdani
0,6,13,16,19,23,26,1,10,18,7,25,24,11,2,3,12,20,4,21,5,22,14,15
company address :postmaster@accountprotection.microsoft.com
09392430244
در تاریخ شنبه ۲۳ مارس ۲۰۲۴، ۱۹:۴۲ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
"Capture settings (to change them, please trigger a new monitoring from
lookyloo):
{'url': 'danayzdanyyzdanydana(a)gmail.com', 'listing': '0',
'user_agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/114.0.5735.35 Safari/537.36'}
2 captures available.
Last one triggered at 2024-03-15T06:05:51.040996
Capture frequency
Expire monitoring at
۲۰۲۴/۰۳/۱۵, ۰:۰۰
Collection of the monitored URL
Domains to ignore in comparison
Regexes in URLs to ignore in comparison
Ignore IPs in comparison
Skip failed captures
You must be authenticated to change the settings.
Links to the captures on Lookyloo
Old capture
New capture
Comparison of the two most recent captures:
The captures are the same URL. (http://danayzdanyyzdanydana@gmail.com/)
The landing page is different.
https://accounts.google.com/v3/signin/identifier?continue=https://mail.goog…
https://accounts.google.com/v3/signin/identifier?continue=https://mail.goog…
The hostname of the rendered page is the same. (accounts.google.com)
The status code of the rendered page is the same. (200)
The captures have the same number of redirects (6)
Nodes to the landing page
The nodes have the same URL. (http://danayzdanyyzdanydana@gmail.com/)
The nodes have the same URL. (https://danayzdanyyzdanydana@gmail.com/)
The nodes load content from the same IP. (2a00:1450:4001:829::2005)
The nodes have the same URL. (https://mail.google.com/mail/u/0/)
The nodes load content from different IPs.
2a00:1450:4001:808::2005
2a00:1450:4001:82a::2005
The nodes have the same URL. (
https://accounts.google.com/ServiceLogin?service=mail&passive=1209600&osid=…
)
The nodes load content from different IPs.
2a00:1450:400c:c1d::54
2a00:1450:400c:c06::54
The nodes have different URLs.
https://accounts.google.com/InteractiveLogin?continue=https://mail.google.c…
https://accounts.google.com/InteractiveLogin?continue=https://mail.google.c…
The nodes have the same hostname. (accounts.google.com)
The nodes load content from different IPs.
2a00:1450:400c:c1d::54
2a00:1450:400c:c06::54
The nodes have different URLs.
https://accounts.google.com/v3/signin/identifier?continue=https://mail.goog…
https://accounts.google.com/v3/signin/identifier?continue=https://mail.goog…
The nodes have the same hostname. (accounts.google.com)
The nodes load content from different IPs.
2a00:1450:400c:c1d::54
2a00:1450:400c:c06::54
Ressources in both captures:
https://accounts.google.com/_/bscframe
https://fonts.gstatic.com/s/googlesans/v58/4UasrENHsxJlGDuGo1OIlJfC6l_24rlC…
https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc4.woff2
https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxK.woff2
https://play.google.com/log?format=json&hasfast=true&authuser=0
https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Ressources in moth recent capture only:
https://accounts.google.com/generate_204?Ddo_HA
https://accounts.google.com/v3/signin/_/AccountsSignInUi/browserinfo?f.sid=…
https://accounts.google.com/v3/signin/_/AccountsSignInUi/data/batchexecute?…
https://accounts.google.com/v3/signin/identifier?continue=https://mail.goog…
https://accounts.youtube.com/accounts/CheckConnection?pmpo=https://accounts…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
Ressources in oldest capture only:
https://accounts.google.com/generate_204?0Sg9Dg
https://accounts.google.com/v3/signin/_/AccountsSignInUi/browserinfo?f.sid=…
https://accounts.google.com/v3/signin/_/AccountsSignInUi/data/batchexecute?…
https://accounts.google.com/v3/signin/identifier?continue=https://mail.goog…
https://accounts.youtube.com/accounts/CheckConnection?pmpo=https://accounts…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSign…
1
1
Re:
http://localhost:26543/storage/0000-5979/%D9%BE%D9%88%D8%B4%D9%87+%D9%BE%D8…
Send Transfer To has ben access transaction confirmation delivery Money
Cash Rule Transfer Accepts release Local 176.56.156.136 to domain Bank
Mellat Address Iban IR160170000000347789811007 Name Tahsin Yazdani
1
1

Deliverable Money cash rule transfer Rial iranian accept the recipient's nsb6 bank mellat address iban number IR720120020000005470818561
by دانا یزدانی 23 Jun '24
by دانا یزدانی 23 Jun '24
23 Jun '24
در تاریخ یکشنبه ۲۳ ژوئن ۲۰۲۴، ۰۰:۳۰<> نوشت:
User Agent: Mozilla/5.0 (Linux; Android 14; SM-A245F Build/UP1A.231005.007;
wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0
Chrome/125.0.6422.165 Mobile Safari/537.36 Location: Money Cash
RuleTransferDocumentTerminal BankMellat:IRIR170120020000009092750566
SendingAmount:
/20C000R%.HtmlSendToNSB6BankMellat IBANNumber:
IR720120020000005470818561
Branch Code:68452
Location Bank Address:1268452
Name:MohammadRahmati
/*! eruda v2.11.3 */ !function(e,t){"object"==typeof
exports&&"object"==typeof module?module.exports=t():"function"==typeof
define&&define.amd?define([],t):"object"==typeof
exports?exports.eruda=t():e.eruda=t()}(self,function(){var
__webpack_modules__={422:function(e,t,n){"use
strict";n.d(t,{Z:function(){return C}});var
s=n(5671),c=n(3144),l=n(9340),u=n(2963),d=n(1120),t=n(2461),a=n.n(t),t=n(3990),o=n.n(t),t=n(6768),r=n.n(t),t=n(4331),i=n.n(t),t=n(5610),t=n.n(t),f=n(7483),h=n.n(f),f=n(6341),p=n.n(f),f=n(3875),v=n.n(f),f=n(6954),m=n.n(f);function
g(e){var t="luna-".concat(e,"-");function n(e){return
a()(i()(e).split(/\s+/),function(e){return
p()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=h().parse(e);return
function e(t,n){for(var o=0,r=t.length;o'),t.position?'
'):"",t.position?'
position
').concat(t.position.top,'
').concat(t.position.left,"
"):"",'
'),'
margin
').concat(t.margin.top,'
').concat(t.margin.left,"
"),'
'),'
border
').concat(t.border.top,'
').concat(t.border.left,"
"),'
'),'
padding
').concat(t.padding.top,'
').concat(t.padding.left,"
"),'
'),"".concat(t.content.width," × ").concat(t.content.height,""),"
",'
').concat(t.padding.right,'
').concat(t.padding.bottom,"
"),"
",'
').concat(t.border.right,'
').concat(t.border.bottom,"
"),"
",'
').concat(t.margin.right,'
').concat(t.margin.bottom,"
"),"
",t.position?'
').concat(t.position.right,'
').concat(t.position.bottom,"
"):"",t.position?"
":"",""].join(""))}},{key:"getBoxModelData",value:function(){var
e=this.options.element,n=window.getComputedStyle(e);function t(t){var
e=["top","left","right","bottom"];return"position"!==t&&(e=a()(e,function(e){return"".concat(t,"-").concat(e)})),"border"===t&&(e=a()(e,function(e){return"".concat(e,"-width")})),{top:S(n[e[0]],t),left:S(n[e[1]],t),right:S(n[e[2]],t),bottom:S(n[e[3]],t)}}e={margin:t("margin"),border:t("border"),padding:t("padding"),content:{width:S(n.width),height:S(n.height)}};return"static"!==n.position&&(e.position=t("position")),e}}]),i}();function
S(e,t){if(o()(e))return e;if(!r()(e))return"‒";n=e;var
n=v()(n.replace("px",""));return isNaN(n)?e:"position"!==t&&0===n?"‒":n}var
E=e,f=C;try{E.exports=f,E.exports.default=f}catch(E){}},8816:function(e,t,n){"use
strict";n.d(t,{Z:function(){return Le}});var s=n(168),p=n(181);function
u(e,t){return function(e){if(Array.isArray(e))return
e}(e)||function(e,t){var n=null==e?null:"undefined"!=typeof
Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=n){var
o,r,i,a,s=[],c=!0,l=!1;try{if(i=(n=n.call(e)).next,0===t){if(Object(n)!==n)return;c=!1}else
for(;!(c=(o=i.call(n)).done)&&(s.push(o.value),s.length!==t);c=!0);}catch(e){l=!0,r=e}finally{try{if(!c&&null!=n.return&&(a=n.return(),Object(a)!==a))return}finally{if(l)throw
r}}return s}}(e,t)||(0,p.Z)(e,t)||function(){throw new TypeError("Invalid
attempt to destructure non-iterable instance.\nIn order to be iterable,
non-array objects must have a [Symbol.iterator]() method.")}()}var
v=n(5671),c=n(3144),O=n(1752),l=n(9340),d=n(2963),f=n(1120),T=n(7326),t=n(8901),j=n.n(t),t=n(3367),M=n.n(t),t=n(6341),R=n.n(t),t=n(6930),B=n.n(t),t=n(4187),N=n.n(t),t=n(3783),z=n.n(t),t=n(4858),L=n.n(t),t=n(8887),m=n.n(t),t=n(7756),I=n.n(t),t=n(3023),H=n.n(t);function
Z(e){return e.constructor&&
e.constructor.name?e.constructor.name:H()({}.toString.call(e).replace(/(\[object
)|]/g,""))}var
t=n(2461),g=n.n(t),t=n(4331),y=n.n(t),t=n(5610),t=n.n(t),o=n(7483),r=n.n(o),o=n(3990),$=n.n(o),o=n(3875),G=n.n(o),o=n(6954),Y=n.n(o),o=n(9585),S=n.n(o);function
h(e){var t="luna-".concat(e,"-");function n(e){return
g()(y()(e).split(/\s+/),function(e){return
R()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=r().parse(e);return
function e(t,n){for(var
o=0,r=t.length;o'),h=''),p=''),v=''),m=''),g=''),y=function(e){return
j()(e).replace(/\\n/g,"↵").replace(/\\f|\\r|\\t/g,"").replace(/\\/g,"")},b="";function
w(e){return
e=M()(e),R()(J,e)||B()(e,"Array[")?g+y(e)+b:(100').concat(e,"")})),c=this.render({msg:c,type:o,icon:e,id:r,header:i,group:a}),this.$container.addClass("".concat(s("log-container"))).html(c),"table"!==o||m()(this.columns)||this.renderTable(n),m()(this.elements)||this.renderEl(),this.$content=this.$container.find(s(".log-content")),this.content=this.$content.get(0)}},{key:"render",value:function(e){var
t=this.console.c,n="",o="";if(e.group)for(var r=e.group.indentLevel,i=0;i
');e.header&&(n+=be()(Q=Q||(0,s.Z)(['\n
\n ','\n
\n '," ","\n
\n
"]),t("header"),o,t("time-from-container"),e.header.time,e.header.from));var
a="";return e.icon&&(a='
')),n+'\n
\n ').concat(o,"\n ").concat(a,'\n
\n
\n
\n
\n
').concat(e.msg,"
\n
\n
")}},{key:"formatTable",value:function(e){var t=e[0],n=e[1],o=[];return
w()(n)&&(n=A()(n)),ae()(n)||(n=null),b()(t)?(z()(t,function(e){x()(e)?o.push("__LunaConsoleValue"):b()(e)&&(o=o.concat(le()(e)))}),(o=se()(o)).sort(),20<(o=n?o.filter(function(e){return
R()(n,e)}):o).length&&(o=o.slice(0,20)),m()(o)?this.formatCommon(e):(this.columns=o,this.console.c('
')+this.formatPreview(t))):this.formatCommon(e)}},{key:"formatErr",value:function(e){var
t=e.stack?e.stack.split("\n"):[],e="".concat(e.message||t[0],"
"),t=t.map(function(e){return j()(e)});return e+'
').concat(t.slice(1).join("
"),"
").replace(ke,function(e){return'').concat(e,"")})}},{key:"formatCommon",value:function(e){for(var
t=this.console.c,n=w()(e[0])&&1!==e.length,o=0,r=(e=n?this.substituteStr(e):e).length;o').concat(j()(M()(i)),""):b()(i)?e[o]=this.formatPreview(i):a()(i)?e[o]='undefined'):re()(i)?e[o]='null'):$()(i)?e[o]='').concat(M()(i),""):"bigint"==typeof
i?e[o]='').concat(M()(i),"n"):xe()(i)?e[o]='').concat(M()(i),""):_e()(i)?e[o]='').concat(j()(M()(i)),""):(i=M()(i),5e3<(i=0===o&&n?i:j()(i)).length&&(i=I()(i,5e3,{separator:"
",ellipsis:"…"})),e[o]=i)}return e.join("
")}},{key:"formatDir",value:function(e){return
b()(e[0])?this.formatPreview(e[0]):this.formatCommon(e)}},{key:"formatTableVal",value:function(e){var
t=this.console.c;return b()(e)?"{…}":x()(e)?we()('
').concat(P(e),"
")):M()(e)}},{key:"formatPreview",value:function(e){var
t=this,n=this.console.c,o=E()(),r=(this.lazyEvaluation?this.objects[o]=e:this.extractObj(e,{},function(e){t.objects[o]=e}),R()(["dir","table"],this.type)),i=Z(e);return"Array"===i&&1
')+'
')+'
')+'')+'').concat(j()(i),"
")+'').concat(r?"":P(e,{getterVal:this.accessGetter,unenumerable:!1}),"")+"
"+'
')}},{key:"substituteStr",value:function(e){var
t=j()(e[0]),n=!1,o="";e.shift();for(var
r=0,i=t.length;r"),n=!0,o+='');break;default:r--,e.unshift(s),o+=a}}else
o+=a}return
n&&(o+=""),e.unshift(o),e}},{key:"formatJs",value:function(e){return'
').concat(this.console.c(ge()(e,"js",Ce)),"
")}},{key:"formatFn",value:function(e){return'
'.concat(this.formatJs(e.toString()),"
")}},{key:"formatElName",value:function(e){var
t,n=e.id,o=e.className,e=e.tagName.toLowerCase();return""!==n&&(e+="#".concat(n)),w()(o)&&(t="",z()(o.split(/\s+/g),function(e){""!==e.trim()&&(t+=".".concat(e))}),e+=t),e}},{key:"formatEl",value:function(e){var
t=E()();return this.elements[t]=e,this.console.c('
'))}}]),p}(t());var
o=n(1194),Ee=n.n(o),o=n(8847),Oe=n.n(o),o=n(6329),Te=n.n(o),o=n(9001),Ne=n.n(o),o=n(9702),je=n.n(o),o=n(2439),Me=n.n(o),o=n(8933),Re=n.n(o),o=n(4407),ze=n.n(o),o=n(5852),Ie=n.n(o);var
Ze,De=function(e){(0,l.Z)(a,e);n=a,o=function(){if("undefined"==typeof
Reflect||!Reflect.construct)return!1;if(Reflect.construct.sham)return!1;if("function"==typeof
Proxy)return!0;try{return
Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){})),!0}catch(e){return!1}}();var
n,o,i=function(){var e,t=(0,f.Z)(n);return
e=o?(e=(0,f.Z)(this).constructor,Reflect.construct(t,arguments,e)):t.apply(this,arguments),(0,d.Z)(this,e)};function
a(e,t){var
r,t=t.compName,n=(2a.maxSpeedTolerance?a.maxSpeedTolerance:e)o+i+n||a.renderViewport({topTolerance:2*t,bottomTolerance:2*n}))},a.initTpl(),a.initOptions(t,{maxNum:0,asyncRender:!0,showHeader:!1,filter:"",level:["verbose","info","warning","error"],accessGetter:!1,unenumerable:!0,lazyEvaluation:!0}),a.$el=a.find(".logs"),a.el=a.$el.get(0),a.$fakeEl=a.find(".fake-logs"),a.fakeEl=a.$fakeEl.get(0),a.$space=a.find(".logs-space"),
a.space=a.$space.get(0),Fe&&(a.speedToleranceFactor=800,a.maxSpeedTolerance=3e3,a.minSpeedTolerance=800),a.resizeSensor=new(X())(e),a.renderViewport=Me()(function(e){a._renderViewport(e)},16),a.global={copy:function(e){w()(e)||(e=JSON.stringify(e,null,2)),he()(e)},$:function(e){return
document.querySelector(e)},$$:function(e){return
A()(document.querySelectorAll(e))},$x:function(e){return
Re()(e)},clear:function(){a.clear()},dir:function(e){a.dir(e)},table:function(e,t){a.table(e,t)},keys:le()},a.bindEvent(),a}return(0,c.Z)(i,[{key:"setGlobal",value:function(e,t){this.global[e]=t}},{key:"destroy",value:function(){this.$container.off("scroll",this.onScroll),this.resizeSensor.destroy(),(0,O.Z)((0,f.Z)(i.prototype),"destroy",this).call(this)}},{key:"count",value:function(){var
e=0s&&(l=r[0],this.detachLog(l),r.shift()),this.attachLog(e),this.emit("insert",e)}},{key:"updateTopSpace",value:function(e){this.topSpaceHeight=e,this.el.style.top=e+"px"}},{key:"updateBottomSpace",value:function(e){this.bottomSpaceHeight=e}},{key:"updateSpace",value:function(e){this.spaceHeight!==e&&(this.spaceHeight=e,this.space.style.height=e+"px")}},{key:"detachLog",value:function(e){var
t=this.displayLogs,e=t.indexOf(e);-)return t.push(e),void
this.renderViewport();for(var
o,r=0,i=t.length-1,a=0;r<=i;){if((o=t[a=r+Math.floor((i-r)/2)]).id===
)return;o.idt&&(o.logs=n.slice(n.length-t),o.render());break;case"filter":o.render();break;case"level":o.options.level=A()(t),o.render()}}),this.$container.on("scroll",this.onScroll)}},{key:"_renderViewport",value:function(){var
e=0
\n
\n
\n
\n ']))))}}]),i}(),He=function(){return ze()("HH:MM:ss ")};var
i=e,o=Le;try{i.exports=o,i.exports.default=o}catch(i){}},5564:function(e,t,n){"use
strict";n.d(t,{Z:function(){return R}});var
a=n(168),s=n(5671),c=n(3144),l=n(7326),u=n(1752),d=n(9340),f=n(2963),h=n(1120),t=n(1512),p=n.n(t),t=n(1907),v=n.n(t),t=n(1443),t=n.n(t),o=n(2461),Z=n.n(o),o=n(4331),m=n.n(o),o=n(5610),o=n.n(o),r=n(7483),i=n.n(r),r=(n(3990),n(6341)),g=n.n(r),r=n(3875),y=n.n(r),r=n(6954),D=n.n(r);function
P(e){var t="luna-".concat(e,"-");function n(e){return
Z()(m()(e).split(/\s+/),function(e){return
g()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=i().parse(e);return
function e(t,n){for(var
o=0,r=t.length;o'),this.colWidths[u]=f}t.html(s),this.positionResizers()}}},{key:"positionResizers",value:function(){for(var
e=this.colWidths,t=[],n=e.length-1,o=0;o').concat(t,"")):o+="".concat(t,""),r+=""}),this.$headerRow.html(o),this.$fillerRow.html(r)}},{key:"renderResizers",value:function(){for(var
e="",t=this.options.columns.length-1,n=0;n
'));this.$container.append(e),this.$resizers=this.find(".resizer")}},{key:"initTpl",value:function(){this.$container.html(this.c(v()(C=C||(0,a.Z)(['\n
\n \n \n \n \n \n
\n
\n
\n \n \n \n \n \n
\n
\n ']))))}}]),i}(),te=((0,c.Z)(z,[{key:"text",value:function(){return
this.$container.text()}},{key:"detach",value:function(){this.$container.remove()}},{key:"select",value:function(){this.$container.addClass(this.dataGrid.c("selected"))}},{key:"deselect",value:function(){this.$container.rmClass(this.dataGrid.c("selected"))}},{key:"render",value:function(){var
n=this.data,e=this.$container,o=this.container,t=this.dataGrid.getOption("columns");e.html(""),A()(t,function(e){var
t=S()("td"),e=n[e.id];q()(e)||(O()(e)?t.appendChild(e):t.innerText=E()(e)),o.appendChild(t)})}}]),z);function
z(e,t){var n=2<[^>]*>/g.test(e))try{var t=g().parse(e);return function
e(t,n){for(var
o=0,r=t.length;o</'.concat(o.tagName.toLocaleLowerCase(),'>')));else
if(o.nodeType===Node.ELEMENT_NODE){n=this.isExpandable(),n=j(j({},z(o)),{},{hasTail:n,hasToggleButton:n});r.html(this.renderHtmlTag(n))}else
if(o.nodeType===Node.TEXT_NODE)r.html(this.renderTextNode(o));else{if(o.nodeType!==Node.COMMENT_NODE)return;n=o.nodeValue;if(""===n.trim())return;r.html(this.renderHtmlComment(n))}e.appendChild(r.get(0)),o.nodeType===o.ELEMENT_NODE&&((n=h()(S()("ul"))).addClass([t("children"),t("hidden")]),e.appendChild(n.get(0)),this.$children=n)}},{key:"renderChildNodes",value:function(){var
o=this,e=this.options.node,t=this.options,r=t.rootContainer,i=t.ignore,a=t.rootDomViewer,s=this.$children.get(0),c=this.childNodes,l=this.childNodeDomViewers,t=(A()(l,function(e){e.detach(),o.removeSubComponent(e)}),this.endTagDomViewer&&this.endTagDomViewer.detach(),this.getChildNodes()),u=(this.childNodes=t,[]);this.childNodeDomViewers=u,A()(t,function(e,t){var
n=c.indexOf(e);(n=-1\n
'.concat(O()(t),"").concat(n?'="').concat(O()(n),'"'):"","")}).join(""),n="",o=(e.hasTail?n="".concat(e.hasTail?"…":"",'</').concat(e.tagName,">"):this.isExpandable()||(n='</'.concat(e.tagName,">")),"");return
e.hasToggleButton&&(o='
'),this.c(B()(C=C||(0,i.Z)(["\n ",'\n <',"",">",'\n
']),o,e.tagName,t,n))}},{key:"renderTextNode",value:function(e){var
t=this.c,n=e.nodeValue,e=e.parentElement,o='',r='';if(e&&n.length<1e4){if("STYLE"===e.tagName)return
t("".concat(o).concat(E()(n,"css",M)).concat(r));if("SCRIPT"===e.tagName)return
t("".concat(o).concat(E()(n,"js",M)).concat(r))}return
t('"'.concat(o).concat(O()($()(n,1e4,{separator:"
",ellipsis:"…"}))).concat(r,'"'))}},{key:"renderHtmlComment",value:function(e){return
this.c('<!-- '.concat(O()(e),' -->'))}}]),d}();function z(n){var
e={tagName:"",attributes:[]},o=(e.tagName=n.tagName.toLocaleLowerCase(),[]);return
A()(n.attributes,function(e){var
t=e.name,e=e.value;o.push({name:t,value:e,isLink:function(e,t){e=e.tagName;return("SCRIPT"===e||"IMAGE"===e||"VIDEO"===e||"AUDIO"===e)&&"src"===t||"LINK"===e&&"href"===t}(n,t)})}),e.attributes=o,e}if(void
0!==(0,t.Z)(e)){var
I=e,m=R;try{I.exports=m,I.exports.default=m}catch(I){}}},129:function(e,t,n){"use
strict";n.d(t,{Z:function(){return T}});var o=n(907),r=n(181);var
a=n(168),s=n(5671),c=n(3144),l=n(7326),u=n(1752),d=n(9340),f=n(2963),h=n(1120),t=n(1443),t=n.n(t),i=n(1512),p=n.n(i),i=n(2461),v=n.n(i),i=n(4331),m=n.n(i),i=n(5610),i=n.n(i),g=n(7483),y=n.n(g),g=(n(3990),n(6341)),b=n.n(g),g=(n(3875),n(6954)),w=n.n(g);function
x(e){var t="luna-".concat(e,"-");function n(e){return
v()(m()(e).split(/\s+/),function(e){return
b()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=y().parse(e);return
function e(t,n){for(var o=0,r=t.length;o
\n \n
\n
\n
\n
\n ']))))}}],[{key:"alert",value:function(e){var
t=M(),n=t.c;t.setOption({title:"",content:e,width:z(),footer:R({OK:{type:"primary",onclick:function(){t.hide()}}},n)}),t.show()}},{key:"confirm",value:function(o){return
new Promise(function(e){var
t=M(),n=t.c;t.setOption({title:"",content:o,width:z(),footer:R({Cancel:{type:"secondary",onclick:function(){t.hide(),e(!1)}},OK:{type:"primary",onclick:function(){t.hide(),e(!0)}}},n)}),t.show()})}},{key:"prompt",value:function(){var
i=0<[^>]*>/g.test(e))try{var t=U().parse(e);return function e(t,n){for(var
o=0,r=t.length;o".concat(u(e),'null'):p()(n)||v()(n)?"
".concat(u(e),'').concat(f(n),"
"):("RegExp"===n.type&&(l="regexp"),"Number"===n.type&&(l="number"),"Number"===n.type||"RegExp"===n.type?"
".concat(u(e),'').concat(f(n.value),"
"):"Undefined"===n.type||"Symbol"===n.type?"
".concat(u(e),'').concat(m()(n.type),"
"):"(...)"===n?"
".concat(u(e),'').concat(n,"
"):g()(n)?(t=n.id,a=n.reference,r=function(e){var
t=e.type,n=e.value;if(t)return"Function"===t?N(n):"Array"===t&&e.unenumerable?"Array(".concat(e.unenumerable.length,")"):e.type}(n)||y()(l),i=s?"":''),a="
").concat(i).concat(u(e),'').concat(s?"":r,'
"),s&&(a+=this.objToHtml(this.map[t])),a+'
')):(k()(n)&&1e4".concat(u(e),'"').concat(f(n),'"')));function
u(e){if(s)return"";if(g()(n)&&n.jsonSplitArr)return"";var
t=c("key");return"unenumerable"===o||"symbol"===o?t=c("key-lighter"):"proto"===o&&(t=c("key-special")),'').concat(f(e),":
")}}},{key:"render",value:function(){var
e=this.map[this.data.id];this.$container.html(this.objToHtml(e,!0))}},{key:"bindEvent",value:function(){this.$container.on("click","li",this.onItemClick)}}]),r}();e=n.hmd(e);var
z=function(){(0,u.Z)(i,oe);n=i,o=function(){if("undefined"==typeof
Reflect||!Reflect.construct)return!1;if(Reflect.construct.sham)return!1;if("function"==typeof
Proxy)return!0;try{return
Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){})),!0}catch(e){return!1}}();var
n,o,r=function(){var e,t=(0,h.Z)(n);return
e=o?(e=(0,h.Z)(this).constructor,Reflect.construct(t,arguments,e)):t.apply(this,arguments),(0,d.Z)(this,e)};function
i(e){var a,t=1".concat(d(e),'null'):p()(n)||v()(n)?"
".concat(d(e),'').concat(f(n),"
"):("RegExp"===u&&(l="regexp"),"Number"===u&&(l="number"),"Undefined"===u||"Symbol"===u?"
".concat(d(e),'').concat(m()(u),"
"):"(...)"===n?"
".concat(d(e),'').concat(n,"
"):g()(n)?((i=s.get(n))?r=i.id:
(i={},"proto"===o&&(i.self=t),r=s.set(n,i),this.map[r]=n),t="Object",t="regexp"===l?'').concat(f(n)):f(function(e,t){if(t)return"Function"===t?N(P()(e)):"Array"===t?"Array(".concat(e.length,")"):t}(n,u)||y()(l)),s=a?"":''),i="
").concat(s).concat(d(e),'').concat(a?"":t,'
"),a&&(i+=this.objToHtml(n)),i+'
')):(k()(n)&&1e4".concat(d(e),'"').concat(f(n),'"')));function
d(e){if(a)return"";if(g()(n)&&"virtual"===o)return"";var
t=c("key");return"unenumerable"===o||"symbol"===o?t=c("key-lighter"):"proto"===o&&(t=c("key-special")),'').concat(f(e),":
")}}},{key:"render",value:function(){this.$container.html(this.objToHtml(this.data,!0))}},{key:"bindEvent",value:function(){this.$container.on("click","li",this.onItemClick)}}]),i}(),I=(z.Static=re,e),R=z;try{I.exports=R,I.exports.default=R}catch(I){}},8692:function(e,t,n){"use
strict";n.d(t,{Z:function(){return ee}});var
Z=n(7326),h=n(5671),r=n(3144),s=n(9340),c=n(2963),l=n(1120),t=n(1512),u=n.n(t),t=n(8613),D=n.n(t),t=n(8901),p=n.n(t),t=n(5229),P=n.n(t),t=n(5166),i=n.n(t),t=n(4193),v=n.n(t),t=n(2461),m=n.n(t),t=n(3875),g=n.n(t),t=n(3367),y=n.n(t),t=n(4777),o=n.n(t),t=n(9702),F=n.n(t),t=n(1754),B=n.n(t),t=n(6768),L=n.n(t),t=n(4331),a=n.n(t),t=n(6341),d=n.n(t),t=n(3063),f=n.n(t),t=n(6156),H=n.n(t),t=n(3783),b=n.n(t),t=n(1443),t=n.n(t),w=n(5610),w=n.n(w),x=n(7483),_=n.n(x),x=(n(3990),n(6954)),$=n.n(x);function
G(e){var t="luna-".concat(e,"-");function n(e){return
m()(a()(e).split(/\s+/),function(e){return
d()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=_().parse(e);return
function e(t,n){for(var o=0,r=t.length;o'.concat(p()(t),'\n
\n ').concat(p()(n),"\n
"))),r.$container.find("button").on("click",o),r}function
E(e,t,n,o,r,i){(0,h.Z)(this,E),a=J.call(this,e,t,n,"select");var
a,t=e.c,s=(a.$container.html('
').concat(p()(o),'
\n
').concat(r,'
\n
\n
\n \n
').concat(m()(i,function(e,t){return'").concat(p()(t),"")}).join(""),"\n \n
\n
")),a.$container.find("select"));return s.on("change",function(){return
a.onChange(s.val())}),a}function
O(e,t,n,o,r){(0,h.Z)(this,O),i=W.call(this,e,t,n,"checkbox");var
i,t=e.c,e=P()(e.c("checkbox-")),o=(i.$container.html('
').concat(p()(o),'
\n
\n \n ').concat(r,"\n
")),i.$container.find("input")),a=o.get(0);return
a.checked=n,o.on("change",function(){return
i.onChange(a.checked)}),i}function T(e,t,n,o,r){var
i,a=5"),u=(s&&(a="".concat(c,'
\n
\n
\n
\n
\n
\n ').concat(a,'\n
').concat(n,"/").concat(l)),t.html('
').concat(p()(o),'
\n
').concat(r,'
\n
').concat(a,"
")),t.find(e(".value"))),d=t.find("input"),f=t.find(e(".range-track-progress"));return
d.val(y()(n)),d.on("change",function(){var
e=g()(d.val());i.onChange(e)}),d.on("input",function(){var
e=g()(d.val());f.css("width",ie(e,c,l)+"%"),u.text(y()(e))}),i}function
N(e,t,n,o,r){(0,h.Z)(this,N),i=U.call(this,e,t,n,"input");var
i,t=e.c,a=(i.$container.html('
').concat(p()(o),'
\n
').concat(r,'
\n
\n \n
')),i.$container.find("input"));return
a.val(n),a.on("change",function(){return i.onChange(a.val())}),i}function
j(e){return(0,h.Z)(this,j),V.call(this,e,"","","separator")}function
M(e,t){return(0,h.Z)(this,M),(e=K.call(this,e,"","","title")).$container.text(t),e}function
R(e,t,n,o){(0,h.Z)(this,R),this.container=D()("div",{tabindex:"0"}),this.setting=e,(this.container.settingItem=this).$container=u()(this.container),this.$container.addClass(e.c("item")).addClass(e.c("item-".concat(o))),this.key=t,this.value=n}function
z(e){var t=1<[^>]*>/g.test(e))try{var t=v().parse(e);return function
e(t,n){for(var o=0,r=t.length;o').concat(O()(t.title),"");i-1
\n
\n
\n
\n
']))))}}]),i}(),N=e,t=T;try{N.exports=t,N.exports.default=t}catch(N){}},7049:function(e,t,n){"use
strict";n.d(t,{Z:function(){return z}});var
s=n(5671),r=n(3144),c=n(7326),l=n(1752),u=n(9340),d=n(2963),f=n(1120),t=n(1443),t=n.n(t),o=n(1512),h=n.n(o),o=n(2461),i=n.n(o),o=n(4331),p=n.n(o),o=n(5610),o=n.n(o),a=n(7483),v=n.n(a),a=(n(3990),n(6341)),m=n.n(a),a=(n(3875),n(6954)),g=n.n(a);function
y(e){var t="luna-".concat(e,"-");function n(e){return
i()(p()(e).split(/\s+/),function(e){return m()(e,t)?e:e.replace(
1
0

Deliverable access money cash rule transfer Rial Iranian transfer to has ben nsb6 address iban number IR720120020000005470818561
by دانا یزدانی 23 Jun '24
by دانا یزدانی 23 Jun '24
23 Jun '24
در تاریخ یکشنبه ۲۳ ژوئن ۲۰۲۴، ۰۰:۳۰<> نوشت:
User Agent: Mozilla/5.0 (Linux; Android 14; SM-A245F Build/UP1A.231005.007;
wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0
Chrome/125.0.6422.165 Mobile Safari/537.36 Location: Money Cash
RuleTransferDocumentTerminal BankMellat:IRIR170120020000009092750566
SendingAmount:
/20C000R%.HtmlSendToNSB6BankMellat IBANNumber:
IR720120020000005470818561
Branch Code:68452
Location Bank Address:1268452
Name:MohammadRahmati
/*! eruda v2.11.3 */ !function(e,t){"object"==typeof
exports&&"object"==typeof module?module.exports=t():"function"==typeof
define&&define.amd?define([],t):"object"==typeof
exports?exports.eruda=t():e.eruda=t()}(self,function(){var
__webpack_modules__={422:function(e,t,n){"use
strict";n.d(t,{Z:function(){return C}});var
s=n(5671),c=n(3144),l=n(9340),u=n(2963),d=n(1120),t=n(2461),a=n.n(t),t=n(3990),o=n.n(t),t=n(6768),r=n.n(t),t=n(4331),i=n.n(t),t=n(5610),t=n.n(t),f=n(7483),h=n.n(f),f=n(6341),p=n.n(f),f=n(3875),v=n.n(f),f=n(6954),m=n.n(f);function
g(e){var t="luna-".concat(e,"-");function n(e){return
a()(i()(e).split(/\s+/),function(e){return
p()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=h().parse(e);return
function e(t,n){for(var o=0,r=t.length;o'),t.position?'
'):"",t.position?'
position
').concat(t.position.top,'
').concat(t.position.left,"
"):"",'
'),'
margin
').concat(t.margin.top,'
').concat(t.margin.left,"
"),'
'),'
border
').concat(t.border.top,'
').concat(t.border.left,"
"),'
'),'
padding
').concat(t.padding.top,'
').concat(t.padding.left,"
"),'
'),"".concat(t.content.width," × ").concat(t.content.height,""),"
",'
').concat(t.padding.right,'
').concat(t.padding.bottom,"
"),"
",'
').concat(t.border.right,'
').concat(t.border.bottom,"
"),"
",'
').concat(t.margin.right,'
').concat(t.margin.bottom,"
"),"
",t.position?'
').concat(t.position.right,'
').concat(t.position.bottom,"
"):"",t.position?"
":"",""].join(""))}},{key:"getBoxModelData",value:function(){var
e=this.options.element,n=window.getComputedStyle(e);function t(t){var
e=["top","left","right","bottom"];return"position"!==t&&(e=a()(e,function(e){return"".concat(t,"-").concat(e)})),"border"===t&&(e=a()(e,function(e){return"".concat(e,"-width")})),{top:S(n[e[0]],t),left:S(n[e[1]],t),right:S(n[e[2]],t),bottom:S(n[e[3]],t)}}e={margin:t("margin"),border:t("border"),padding:t("padding"),content:{width:S(n.width),height:S(n.height)}};return"static"!==n.position&&(e.position=t("position")),e}}]),i}();function
S(e,t){if(o()(e))return e;if(!r()(e))return"‒";n=e;var
n=v()(n.replace("px",""));return isNaN(n)?e:"position"!==t&&0===n?"‒":n}var
E=e,f=C;try{E.exports=f,E.exports.default=f}catch(E){}},8816:function(e,t,n){"use
strict";n.d(t,{Z:function(){return Le}});var s=n(168),p=n(181);function
u(e,t){return function(e){if(Array.isArray(e))return
e}(e)||function(e,t){var n=null==e?null:"undefined"!=typeof
Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=n){var
o,r,i,a,s=[],c=!0,l=!1;try{if(i=(n=n.call(e)).next,0===t){if(Object(n)!==n)return;c=!1}else
for(;!(c=(o=i.call(n)).done)&&(s.push(o.value),s.length!==t);c=!0);}catch(e){l=!0,r=e}finally{try{if(!c&&null!=n.return&&(a=n.return(),Object(a)!==a))return}finally{if(l)throw
r}}return s}}(e,t)||(0,p.Z)(e,t)||function(){throw new TypeError("Invalid
attempt to destructure non-iterable instance.\nIn order to be iterable,
non-array objects must have a [Symbol.iterator]() method.")}()}var
v=n(5671),c=n(3144),O=n(1752),l=n(9340),d=n(2963),f=n(1120),T=n(7326),t=n(8901),j=n.n(t),t=n(3367),M=n.n(t),t=n(6341),R=n.n(t),t=n(6930),B=n.n(t),t=n(4187),N=n.n(t),t=n(3783),z=n.n(t),t=n(4858),L=n.n(t),t=n(8887),m=n.n(t),t=n(7756),I=n.n(t),t=n(3023),H=n.n(t);function
Z(e){return e.constructor&&
e.constructor.name?e.constructor.name:H()({}.toString.call(e).replace(/(\[object
)|]/g,""))}var
t=n(2461),g=n.n(t),t=n(4331),y=n.n(t),t=n(5610),t=n.n(t),o=n(7483),r=n.n(o),o=n(3990),$=n.n(o),o=n(3875),G=n.n(o),o=n(6954),Y=n.n(o),o=n(9585),S=n.n(o);function
h(e){var t="luna-".concat(e,"-");function n(e){return
g()(y()(e).split(/\s+/),function(e){return
R()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=r().parse(e);return
function e(t,n){for(var
o=0,r=t.length;o'),h=''),p=''),v=''),m=''),g=''),y=function(e){return
j()(e).replace(/\\n/g,"↵").replace(/\\f|\\r|\\t/g,"").replace(/\\/g,"")},b="";function
w(e){return
e=M()(e),R()(J,e)||B()(e,"Array[")?g+y(e)+b:(100').concat(e,"")})),c=this.render({msg:c,type:o,icon:e,id:r,header:i,group:a}),this.$container.addClass("".concat(s("log-container"))).html(c),"table"!==o||m()(this.columns)||this.renderTable(n),m()(this.elements)||this.renderEl(),this.$content=this.$container.find(s(".log-content")),this.content=this.$content.get(0)}},{key:"render",value:function(e){var
t=this.console.c,n="",o="";if(e.group)for(var r=e.group.indentLevel,i=0;i
');e.header&&(n+=be()(Q=Q||(0,s.Z)(['\n
\n ','\n
\n '," ","\n
\n
"]),t("header"),o,t("time-from-container"),e.header.time,e.header.from));var
a="";return e.icon&&(a='
')),n+'\n
\n ').concat(o,"\n ").concat(a,'\n
\n
\n
\n
\n
').concat(e.msg,"
\n
\n
")}},{key:"formatTable",value:function(e){var t=e[0],n=e[1],o=[];return
w()(n)&&(n=A()(n)),ae()(n)||(n=null),b()(t)?(z()(t,function(e){x()(e)?o.push("__LunaConsoleValue"):b()(e)&&(o=o.concat(le()(e)))}),(o=se()(o)).sort(),20<(o=n?o.filter(function(e){return
R()(n,e)}):o).length&&(o=o.slice(0,20)),m()(o)?this.formatCommon(e):(this.columns=o,this.console.c('
')+this.formatPreview(t))):this.formatCommon(e)}},{key:"formatErr",value:function(e){var
t=e.stack?e.stack.split("\n"):[],e="".concat(e.message||t[0],"
"),t=t.map(function(e){return j()(e)});return e+'
').concat(t.slice(1).join("
"),"
").replace(ke,function(e){return'').concat(e,"")})}},{key:"formatCommon",value:function(e){for(var
t=this.console.c,n=w()(e[0])&&1!==e.length,o=0,r=(e=n?this.substituteStr(e):e).length;o').concat(j()(M()(i)),""):b()(i)?e[o]=this.formatPreview(i):a()(i)?e[o]='undefined'):re()(i)?e[o]='null'):$()(i)?e[o]='').concat(M()(i),""):"bigint"==typeof
i?e[o]='').concat(M()(i),"n"):xe()(i)?e[o]='').concat(M()(i),""):_e()(i)?e[o]='').concat(j()(M()(i)),""):(i=M()(i),5e3<(i=0===o&&n?i:j()(i)).length&&(i=I()(i,5e3,{separator:"
",ellipsis:"…"})),e[o]=i)}return e.join("
")}},{key:"formatDir",value:function(e){return
b()(e[0])?this.formatPreview(e[0]):this.formatCommon(e)}},{key:"formatTableVal",value:function(e){var
t=this.console.c;return b()(e)?"{…}":x()(e)?we()('
').concat(P(e),"
")):M()(e)}},{key:"formatPreview",value:function(e){var
t=this,n=this.console.c,o=E()(),r=(this.lazyEvaluation?this.objects[o]=e:this.extractObj(e,{},function(e){t.objects[o]=e}),R()(["dir","table"],this.type)),i=Z(e);return"Array"===i&&1
')+'
')+'
')+'')+'').concat(j()(i),"
")+'').concat(r?"":P(e,{getterVal:this.accessGetter,unenumerable:!1}),"")+"
"+'
')}},{key:"substituteStr",value:function(e){var
t=j()(e[0]),n=!1,o="";e.shift();for(var
r=0,i=t.length;r"),n=!0,o+='');break;default:r--,e.unshift(s),o+=a}}else
o+=a}return
n&&(o+=""),e.unshift(o),e}},{key:"formatJs",value:function(e){return'
').concat(this.console.c(ge()(e,"js",Ce)),"
")}},{key:"formatFn",value:function(e){return'
'.concat(this.formatJs(e.toString()),"
")}},{key:"formatElName",value:function(e){var
t,n=e.id,o=e.className,e=e.tagName.toLowerCase();return""!==n&&(e+="#".concat(n)),w()(o)&&(t="",z()(o.split(/\s+/g),function(e){""!==e.trim()&&(t+=".".concat(e))}),e+=t),e}},{key:"formatEl",value:function(e){var
t=E()();return this.elements[t]=e,this.console.c('
'))}}]),p}(t());var
o=n(1194),Ee=n.n(o),o=n(8847),Oe=n.n(o),o=n(6329),Te=n.n(o),o=n(9001),Ne=n.n(o),o=n(9702),je=n.n(o),o=n(2439),Me=n.n(o),o=n(8933),Re=n.n(o),o=n(4407),ze=n.n(o),o=n(5852),Ie=n.n(o);var
Ze,De=function(e){(0,l.Z)(a,e);n=a,o=function(){if("undefined"==typeof
Reflect||!Reflect.construct)return!1;if(Reflect.construct.sham)return!1;if("function"==typeof
Proxy)return!0;try{return
Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){})),!0}catch(e){return!1}}();var
n,o,i=function(){var e,t=(0,f.Z)(n);return
e=o?(e=(0,f.Z)(this).constructor,Reflect.construct(t,arguments,e)):t.apply(this,arguments),(0,d.Z)(this,e)};function
a(e,t){var
r,t=t.compName,n=(2a.maxSpeedTolerance?a.maxSpeedTolerance:e)o+i+n||a.renderViewport({topTolerance:2*t,bottomTolerance:2*n}))},a.initTpl(),a.initOptions(t,{maxNum:0,asyncRender:!0,showHeader:!1,filter:"",level:["verbose","info","warning","error"],accessGetter:!1,unenumerable:!0,lazyEvaluation:!0}),a.$el=a.find(".logs"),a.el=a.$el.get(0),a.$fakeEl=a.find(".fake-logs"),a.fakeEl=a.$fakeEl.get(0),a.$space=a.find(".logs-space"),
a.space=a.$space.get(0),Fe&&(a.speedToleranceFactor=800,a.maxSpeedTolerance=3e3,a.minSpeedTolerance=800),a.resizeSensor=new(X())(e),a.renderViewport=Me()(function(e){a._renderViewport(e)},16),a.global={copy:function(e){w()(e)||(e=JSON.stringify(e,null,2)),he()(e)},$:function(e){return
document.querySelector(e)},$$:function(e){return
A()(document.querySelectorAll(e))},$x:function(e){return
Re()(e)},clear:function(){a.clear()},dir:function(e){a.dir(e)},table:function(e,t){a.table(e,t)},keys:le()},a.bindEvent(),a}return(0,c.Z)(i,[{key:"setGlobal",value:function(e,t){this.global[e]=t}},{key:"destroy",value:function(){this.$container.off("scroll",this.onScroll),this.resizeSensor.destroy(),(0,O.Z)((0,f.Z)(i.prototype),"destroy",this).call(this)}},{key:"count",value:function(){var
e=0s&&(l=r[0],this.detachLog(l),r.shift()),this.attachLog(e),this.emit("insert",e)}},{key:"updateTopSpace",value:function(e){this.topSpaceHeight=e,this.el.style.top=e+"px"}},{key:"updateBottomSpace",value:function(e){this.bottomSpaceHeight=e}},{key:"updateSpace",value:function(e){this.spaceHeight!==e&&(this.spaceHeight=e,this.space.style.height=e+"px")}},{key:"detachLog",value:function(e){var
t=this.displayLogs,e=t.indexOf(e);-)return t.push(e),void
this.renderViewport();for(var
o,r=0,i=t.length-1,a=0;r<=i;){if((o=t[a=r+Math.floor((i-r)/2)]).id===
)return;o.idt&&(o.logs=n.slice(n.length-t),o.render());break;case"filter":o.render();break;case"level":o.options.level=A()(t),o.render()}}),this.$container.on("scroll",this.onScroll)}},{key:"_renderViewport",value:function(){var
e=0
\n
\n
\n
\n ']))))}}]),i}(),He=function(){return ze()("HH:MM:ss ")};var
i=e,o=Le;try{i.exports=o,i.exports.default=o}catch(i){}},5564:function(e,t,n){"use
strict";n.d(t,{Z:function(){return R}});var
a=n(168),s=n(5671),c=n(3144),l=n(7326),u=n(1752),d=n(9340),f=n(2963),h=n(1120),t=n(1512),p=n.n(t),t=n(1907),v=n.n(t),t=n(1443),t=n.n(t),o=n(2461),Z=n.n(o),o=n(4331),m=n.n(o),o=n(5610),o=n.n(o),r=n(7483),i=n.n(r),r=(n(3990),n(6341)),g=n.n(r),r=n(3875),y=n.n(r),r=n(6954),D=n.n(r);function
P(e){var t="luna-".concat(e,"-");function n(e){return
Z()(m()(e).split(/\s+/),function(e){return
g()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=i().parse(e);return
function e(t,n){for(var
o=0,r=t.length;o'),this.colWidths[u]=f}t.html(s),this.positionResizers()}}},{key:"positionResizers",value:function(){for(var
e=this.colWidths,t=[],n=e.length-1,o=0;o').concat(t,"")):o+="".concat(t,""),r+=""}),this.$headerRow.html(o),this.$fillerRow.html(r)}},{key:"renderResizers",value:function(){for(var
e="",t=this.options.columns.length-1,n=0;n
'));this.$container.append(e),this.$resizers=this.find(".resizer")}},{key:"initTpl",value:function(){this.$container.html(this.c(v()(C=C||(0,a.Z)(['\n
\n \n \n \n \n \n
\n
\n
\n \n \n \n \n \n
\n
\n ']))))}}]),i}(),te=((0,c.Z)(z,[{key:"text",value:function(){return
this.$container.text()}},{key:"detach",value:function(){this.$container.remove()}},{key:"select",value:function(){this.$container.addClass(this.dataGrid.c("selected"))}},{key:"deselect",value:function(){this.$container.rmClass(this.dataGrid.c("selected"))}},{key:"render",value:function(){var
n=this.data,e=this.$container,o=this.container,t=this.dataGrid.getOption("columns");e.html(""),A()(t,function(e){var
t=S()("td"),e=n[e.id];q()(e)||(O()(e)?t.appendChild(e):t.innerText=E()(e)),o.appendChild(t)})}}]),z);function
z(e,t){var n=2<[^>]*>/g.test(e))try{var t=g().parse(e);return function
e(t,n){for(var
o=0,r=t.length;o</'.concat(o.tagName.toLocaleLowerCase(),'>')));else
if(o.nodeType===Node.ELEMENT_NODE){n=this.isExpandable(),n=j(j({},z(o)),{},{hasTail:n,hasToggleButton:n});r.html(this.renderHtmlTag(n))}else
if(o.nodeType===Node.TEXT_NODE)r.html(this.renderTextNode(o));else{if(o.nodeType!==Node.COMMENT_NODE)return;n=o.nodeValue;if(""===n.trim())return;r.html(this.renderHtmlComment(n))}e.appendChild(r.get(0)),o.nodeType===o.ELEMENT_NODE&&((n=h()(S()("ul"))).addClass([t("children"),t("hidden")]),e.appendChild(n.get(0)),this.$children=n)}},{key:"renderChildNodes",value:function(){var
o=this,e=this.options.node,t=this.options,r=t.rootContainer,i=t.ignore,a=t.rootDomViewer,s=this.$children.get(0),c=this.childNodes,l=this.childNodeDomViewers,t=(A()(l,function(e){e.detach(),o.removeSubComponent(e)}),this.endTagDomViewer&&this.endTagDomViewer.detach(),this.getChildNodes()),u=(this.childNodes=t,[]);this.childNodeDomViewers=u,A()(t,function(e,t){var
n=c.indexOf(e);(n=-1\n
'.concat(O()(t),"").concat(n?'="').concat(O()(n),'"'):"","")}).join(""),n="",o=(e.hasTail?n="".concat(e.hasTail?"…":"",'</').concat(e.tagName,">"):this.isExpandable()||(n='</'.concat(e.tagName,">")),"");return
e.hasToggleButton&&(o='
'),this.c(B()(C=C||(0,i.Z)(["\n ",'\n <',"",">",'\n
']),o,e.tagName,t,n))}},{key:"renderTextNode",value:function(e){var
t=this.c,n=e.nodeValue,e=e.parentElement,o='',r='';if(e&&n.length<1e4){if("STYLE"===e.tagName)return
t("".concat(o).concat(E()(n,"css",M)).concat(r));if("SCRIPT"===e.tagName)return
t("".concat(o).concat(E()(n,"js",M)).concat(r))}return
t('"'.concat(o).concat(O()($()(n,1e4,{separator:"
",ellipsis:"…"}))).concat(r,'"'))}},{key:"renderHtmlComment",value:function(e){return
this.c('<!-- '.concat(O()(e),' -->'))}}]),d}();function z(n){var
e={tagName:"",attributes:[]},o=(e.tagName=n.tagName.toLocaleLowerCase(),[]);return
A()(n.attributes,function(e){var
t=e.name,e=e.value;o.push({name:t,value:e,isLink:function(e,t){e=e.tagName;return("SCRIPT"===e||"IMAGE"===e||"VIDEO"===e||"AUDIO"===e)&&"src"===t||"LINK"===e&&"href"===t}(n,t)})}),e.attributes=o,e}if(void
0!==(0,t.Z)(e)){var
I=e,m=R;try{I.exports=m,I.exports.default=m}catch(I){}}},129:function(e,t,n){"use
strict";n.d(t,{Z:function(){return T}});var o=n(907),r=n(181);var
a=n(168),s=n(5671),c=n(3144),l=n(7326),u=n(1752),d=n(9340),f=n(2963),h=n(1120),t=n(1443),t=n.n(t),i=n(1512),p=n.n(i),i=n(2461),v=n.n(i),i=n(4331),m=n.n(i),i=n(5610),i=n.n(i),g=n(7483),y=n.n(g),g=(n(3990),n(6341)),b=n.n(g),g=(n(3875),n(6954)),w=n.n(g);function
x(e){var t="luna-".concat(e,"-");function n(e){return
v()(m()(e).split(/\s+/),function(e){return
b()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=y().parse(e);return
function e(t,n){for(var o=0,r=t.length;o
\n \n
\n
\n
\n
\n ']))))}}],[{key:"alert",value:function(e){var
t=M(),n=t.c;t.setOption({title:"",content:e,width:z(),footer:R({OK:{type:"primary",onclick:function(){t.hide()}}},n)}),t.show()}},{key:"confirm",value:function(o){return
new Promise(function(e){var
t=M(),n=t.c;t.setOption({title:"",content:o,width:z(),footer:R({Cancel:{type:"secondary",onclick:function(){t.hide(),e(!1)}},OK:{type:"primary",onclick:function(){t.hide(),e(!0)}}},n)}),t.show()})}},{key:"prompt",value:function(){var
i=0<[^>]*>/g.test(e))try{var t=U().parse(e);return function e(t,n){for(var
o=0,r=t.length;o".concat(u(e),'null'):p()(n)||v()(n)?"
".concat(u(e),'').concat(f(n),"
"):("RegExp"===n.type&&(l="regexp"),"Number"===n.type&&(l="number"),"Number"===n.type||"RegExp"===n.type?"
".concat(u(e),'').concat(f(n.value),"
"):"Undefined"===n.type||"Symbol"===n.type?"
".concat(u(e),'').concat(m()(n.type),"
"):"(...)"===n?"
".concat(u(e),'').concat(n,"
"):g()(n)?(t=n.id,a=n.reference,r=function(e){var
t=e.type,n=e.value;if(t)return"Function"===t?N(n):"Array"===t&&e.unenumerable?"Array(".concat(e.unenumerable.length,")"):e.type}(n)||y()(l),i=s?"":''),a="
").concat(i).concat(u(e),'').concat(s?"":r,'
"),s&&(a+=this.objToHtml(this.map[t])),a+'
')):(k()(n)&&1e4".concat(u(e),'"').concat(f(n),'"')));function
u(e){if(s)return"";if(g()(n)&&n.jsonSplitArr)return"";var
t=c("key");return"unenumerable"===o||"symbol"===o?t=c("key-lighter"):"proto"===o&&(t=c("key-special")),'').concat(f(e),":
")}}},{key:"render",value:function(){var
e=this.map[this.data.id];this.$container.html(this.objToHtml(e,!0))}},{key:"bindEvent",value:function(){this.$container.on("click","li",this.onItemClick)}}]),r}();e=n.hmd(e);var
z=function(){(0,u.Z)(i,oe);n=i,o=function(){if("undefined"==typeof
Reflect||!Reflect.construct)return!1;if(Reflect.construct.sham)return!1;if("function"==typeof
Proxy)return!0;try{return
Boolean.prototype.valueOf.call(Reflect.construct(Boolean,[],function(){})),!0}catch(e){return!1}}();var
n,o,r=function(){var e,t=(0,h.Z)(n);return
e=o?(e=(0,h.Z)(this).constructor,Reflect.construct(t,arguments,e)):t.apply(this,arguments),(0,d.Z)(this,e)};function
i(e){var a,t=1".concat(d(e),'null'):p()(n)||v()(n)?"
".concat(d(e),'').concat(f(n),"
"):("RegExp"===u&&(l="regexp"),"Number"===u&&(l="number"),"Undefined"===u||"Symbol"===u?"
".concat(d(e),'').concat(m()(u),"
"):"(...)"===n?"
".concat(d(e),'').concat(n,"
"):g()(n)?((i=s.get(n))?r=i.id:
(i={},"proto"===o&&(i.self=t),r=s.set(n,i),this.map[r]=n),t="Object",t="regexp"===l?'').concat(f(n)):f(function(e,t){if(t)return"Function"===t?N(P()(e)):"Array"===t?"Array(".concat(e.length,")"):t}(n,u)||y()(l)),s=a?"":''),i="
").concat(s).concat(d(e),'').concat(a?"":t,'
"),a&&(i+=this.objToHtml(n)),i+'
')):(k()(n)&&1e4".concat(d(e),'"').concat(f(n),'"')));function
d(e){if(a)return"";if(g()(n)&&"virtual"===o)return"";var
t=c("key");return"unenumerable"===o||"symbol"===o?t=c("key-lighter"):"proto"===o&&(t=c("key-special")),'').concat(f(e),":
")}}},{key:"render",value:function(){this.$container.html(this.objToHtml(this.data,!0))}},{key:"bindEvent",value:function(){this.$container.on("click","li",this.onItemClick)}}]),i}(),I=(z.Static=re,e),R=z;try{I.exports=R,I.exports.default=R}catch(I){}},8692:function(e,t,n){"use
strict";n.d(t,{Z:function(){return ee}});var
Z=n(7326),h=n(5671),r=n(3144),s=n(9340),c=n(2963),l=n(1120),t=n(1512),u=n.n(t),t=n(8613),D=n.n(t),t=n(8901),p=n.n(t),t=n(5229),P=n.n(t),t=n(5166),i=n.n(t),t=n(4193),v=n.n(t),t=n(2461),m=n.n(t),t=n(3875),g=n.n(t),t=n(3367),y=n.n(t),t=n(4777),o=n.n(t),t=n(9702),F=n.n(t),t=n(1754),B=n.n(t),t=n(6768),L=n.n(t),t=n(4331),a=n.n(t),t=n(6341),d=n.n(t),t=n(3063),f=n.n(t),t=n(6156),H=n.n(t),t=n(3783),b=n.n(t),t=n(1443),t=n.n(t),w=n(5610),w=n.n(w),x=n(7483),_=n.n(x),x=(n(3990),n(6954)),$=n.n(x);function
G(e){var t="luna-".concat(e,"-");function n(e){return
m()(a()(e).split(/\s+/),function(e){return
d()(e,t)?e:e.replace(/[\w-]+/,function(e){return"".concat(t).concat(e)})}).join("
")}return function(e){if(/<[^>]*>/g.test(e))try{var t=_().parse(e);return
function e(t,n){for(var o=0,r=t.length;o'.concat(p()(t),'\n
\n ').concat(p()(n),"\n
"))),r.$container.find("button").on("click",o),r}function
E(e,t,n,o,r,i){(0,h.Z)(this,E),a=J.call(this,e,t,n,"select");var
a,t=e.c,s=(a.$container.html('
').concat(p()(o),'
\n
').concat(r,'
\n
\n
\n \n
').concat(m()(i,function(e,t){return'").concat(p()(t),"")}).join(""),"\n \n
\n
")),a.$container.find("select"));return s.on("change",function(){return
a.onChange(s.val())}),a}function
O(e,t,n,o,r){(0,h.Z)(this,O),i=W.call(this,e,t,n,"checkbox");var
i,t=e.c,e=P()(e.c("checkbox-")),o=(i.$container.html('
').concat(p()(o),'
\n
\n \n ').concat(r,"\n
")),i.$container.find("input")),a=o.get(0);return
a.checked=n,o.on("change",function(){return
i.onChange(a.checked)}),i}function T(e,t,n,o,r){var
i,a=5"),u=(s&&(a="".concat(c,'
\n
\n
\n
\n
\n
\n ').concat(a,'\n
').concat(n,"/").concat(l)),t.html('
').concat(p()(o),'
\n
').concat(r,'
\n
').concat(a,"
")),t.find(e(".value"))),d=t.find("input"),f=t.find(e(".range-track-progress"));return
d.val(y()(n)),d.on("change",function(){var
e=g()(d.val());i.onChange(e)}),d.on("input",function(){var
e=g()(d.val());f.css("width",ie(e,c,l)+"%"),u.text(y()(e))}),i}function
N(e,t,n,o,r){(0,h.Z)(this,N),i=U.call(this,e,t,n,"input");var
i,t=e.c,a=(i.$container.html('
').concat(p()(o),'
\n
').concat(r,'
\n
\n \n
')),i.$container.find("input"));return
a.val(n),a.on("change",function(){return i.onChange(a.val())}),i}function
j(e){return(0,h.Z)(this,j),V.call(this,e,"","","separator")}function
M(e,t){return(0,h.Z)(this,M),(e=K.call(this,e,"","","title")).$container.text(t),e}function
R(e,t,n,o){(0,h.Z)(this,R),this.container=D()("div",{tabindex:"0"}),this.setting=e,(this.container.settingItem=this).$container=u()(this.container),this.$container.addClass(e.c("item")).addClass(e.c("item-".concat(o))),this.key=t,this.value=n}function
z(e){var t=1<[^>]*>/g.test(e))try{var t=v().parse(e);return function
e(t,n){for(var o=0,r=t.length;o').concat(O()(t.title),"");i-1
\n
\n
\n
\n
']))))}}]),i}(),N=e,t=T;try{N.exports=t,N.exports.default=t}catch(N){}},7049:function(e,t,n){"use
strict";n.d(t,{Z:function(){return z}});var
s=n(5671),r=n(3144),c=n(7326),l=n(1752),u=n(9340),d=n(2963),f=n(1120),t=n(1443),t=n.n(t),o=n(1512),h=n.n(o),o=n(2461),i=n.n(o),o=n(4331),p=n.n(o),o=n(5610),o=n.n(o),a=n(7483),v=n.n(a),a=(n(3990),n(6341)),m=n.n(a),a=(n(3875),n(6954)),g=n.n(a);function
y(e){var t="luna-".concat(e,"-");function n(e){return
i()(p()(e).split(/\s+/),function(e){return m()(e,t)?e:e.replace(
1
0

23 Jun '24
Deliverable Money Rial Cash Rule Transfer Accepts release To has ben Bank
Mellat IR160170000000347789811007
1
1
---------- Forwarded message ---------
فرستنده: <postmaster(a)accountprotection.microsoft.com>
Date: چهارشنبه ۵ ژوئن ۲۰۲۴، ۲۱:۳۴
Subject: Undeliverable: Re: deliverable:Re info support money Xchanged
Rial Iranian cash rule transfer total amount 20,000,000,443,222 Rial
Iranian cash rule transfer Send To NS6 Bank ToSeE TaAvon Iban Sheba
IR950220031302016989264001 Branch Code 313 Name Hashem Jvaad Zadeh Sar
Cheshme access transaction confirmation delivery has been monitored accept
Bank ToSeE TaAvon Document Bank Mellat IR170120010000003315992937 Delivery
accepts release Local 176.56.156.136 in sending money cash rule transfer
Sent with Aqua Mail for Androidدر ۲۰۲۴ مارس ۲۸ پنجشنبه به پاسخ: به:
Lookyloo Monitoring <lookyloo_monitoring(a)circl.lu> ---------- From: Daneil
Smeit Sent: March 28, 2024 03:46:14 To: Lookyloo Monitoring CC:
danayzdanyyzdanydana Subject: IR17 0120 0100 0000 3315 9929 37 > company.
Microsoft office 365-Company BankBazaar Team.com > > company. Microsoft
office 365-Company BankBazaar Team.com > company. Microsoft office
365-Company BankBazaar Team.com > company. Micros
To: <danayzdanyyzdanydana(a)gmail.com>
Your message to postmaster(a)accountprotection.microsoft.com couldn't be
delivered.
postmaster wasn't found at accountprotection.microsoft.com.
danayzdanyyzdanydana Office 365 postmaster
*Action Required* Recipient
Unknown To address
Original Message Details
Created Date: 6/5/2024 6:04:04 PM
Sender Address: danayzdanyyzdanydana(a)gmail.com
Recipient Address: postmaster(a)accountprotection.microsoft.com
Subject: Re: deliverable:Re info support money Xchanged Rial Iranian cash
rule transfer total amount 20,000,000,443,222 Rial Iranian cash rule
transfer Send To NS6 Bank ToSeE TaAvon Iban Sheba
IR950220031302016989264001 Branch Code 313 Name Hashem Jvaad Zadeh Sar
Cheshme access transaction confirmation delivery has been monitored accept
Bank ToSeE TaAvon Document Bank Mellat IR170120010000003315992937 Delivery
accepts release Local 176.56.156.136 in sending money cash rule transfer
Sent with Aqua Mail for Androidدر ۲۰۲۴ مارس ۲۸ پنجشنبه به پاسخ: به:
Lookyloo Monitoring <lookyloo_monitoring(a)circl.lu> ---------- From: Daneil
Smeit Sent: March 28, 2024 03:46:14 To: Lookyloo Monitoring CC:
danayzdanyyzdanydana Subject: IR17 0120 0100 0000 3315 9929 37 > company.
Microsoft office 365-Company BankBazaar Team.com > > company. Microsoft
office 365-Company BankBazaar Team.com > company. Microsoft office
365-Company BankBazaar Team.com > company. Micros
*554 5.4.14 Hop count exceeded - possible mail loop ATTR34
[DS3PEPF0000C37F.namprd04.prod.outlook.com
<http://DS3PEPF0000C37F.namprd04.prod.outlook.com> 2024-06-05T18:04:55.515Z
08DC7F6DF0765058]*
Message by: DS3PEPF0000C37F.mail.protection.outlook.com
Notification Details
Sent by: *CH0PR16MB5337.namprd16.prod.outlook.com
<http://CH0PR16MB5337.namprd16.prod.outlook.com>*
Message Hops
HOP TIME (UTC) FROM TO WITH RELAY TIME
1 6/5/2024
6:04:43 PM mail-qt1-f171.google.com SMTP 39 sec
2 6/5/2024
6:04:43 PM mail-qt1-f171.google.com
SJ5PEPF000001CF.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) *
3 6/5/2024
6:04:43 PM SJ5PEPF000001CF.namprd05.prod.outlook.com
SJ0PR05CA0150.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
4 6/5/2024
6:04:43 PM SJ0PR05CA0150.namprd05.prod.outlook.com
CH3PR16MB6072.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
5 6/5/2024
6:04:47 PM NAM10-DM6-obe.outbound.protection.outlook.com
SJ5PEPF000001EC.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 4 sec
6 6/5/2024
6:04:48 PM SJ5PEPF000001EC.namprd05.prod.outlook.com
BY5PR17CA0015.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 1 sec
7 6/5/2024
6:04:48 PM BY5PR17CA0015.namprd17.prod.outlook.com
CO3PR16MB4934.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
8 6/5/2024
6:04:51 PM NAM12-DM6-obe.outbound.protection.outlook.com
BL6PEPF00022572.mail.protection.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 3 sec
9 6/5/2024
6:04:51 PM BL6PEPF00022572.namprd02.prod.outlook.com
BL1P223CA0011.outlook.office365.com Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
10 6/5/2024
6:04:51 PM BL1P223CA0011.NAMP223.PROD.OUTLOOK.COM
CH0PR16MB5337.namprd16.prod.outlook.com Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
Original Message Headers
ARC-Seal: i=5; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=J55t+pu2eytVs7U1/sEjKCfpuZvsFXXjEX+QYK1aqPHrept4npXSd8PKd5PWjrlNyjR+Rs1QLEZy5n6/13bk+/IsK0eZVajbo8VZQAW3q4e/R2mfeRd/D42EklqO7EdasV3kb3kXcB1Ex+fz0eWZxBlJbVIXH+5VRGq1k2OmqIoqxPSAThv5i2d3uDzV2JSousqau6/8IvngMnwbjM5kKdzyqLezXdTbvmuL0doQbx4oOw7oYyiJ6bze9ui/1mpnRjXezDHOwD15uQv1XA3U7VDi/2It2pSS6ERfRcRt6KoOjBXiSk39tAKIo4V+LhzvBVktECJFie8EjTqVBovcSA==
ARC-Message-Signature: i=5; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=61AlnOpUQzOJrNYR7s8T+4lmDXqWlEotaqaVaUVQOto=;
b=S/X0fCXFB+7vlOZVBE+x5trk8iQ42NZzI0AwMYImW56ijkAy+g+qUVRwAamR0JacBmk5ggPLzvRvL2SASISkSCXhJqfzL9waYX2g8rkJlD1PX8eAcdmZd+lccB0EQp5Xxsvugv8OzQOmlxXomnJX3YYCevCWjK2qpx1WxasmmfFd/VI7MxvIaSY7IpV6RjL6jv39tr96uQ1/fh/A4qvrJoTgsTUBGrqeyWrIFUIwVUf6k+e/dshX7biY66Fc0frphABgn7dlpGgSSlkQhlCZEk5qYejbNB6grwZUbr7zVbEPRr0xlknSCyMlYJWoxeF6eLepdbu9Z4PF575/O71tjg==
ARC-Authentication-Results: i=5; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.59.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
ARC-Seal: i=4; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=Dg4+lG06sSG/XzsE321gHC5a87FHkJKPfu0U47J2d8Xw+BbTBWR5uezzQAvO9HxcL6G7LCqMqnD0JKmwXQSLmPvAPBr1yPQEsTUIjflQScLtheZZxt4/CqPC6L9m8zFshCyXrINFZ5/sMQdvrLEmSASR0AM/pajgcLI04SjA0Vw/Novxnnwk883H0X4aBqHWHRtHJrVojfIu96eII61JaCPOeWRlamPx5Sk605N2rsfYEw9c2ITXn9hqPJ/xtSK4BEstvTds81eEZneT9Q+zAqv8P37VK32mWc6gk/NrGmguqxqLIw7HL6uqiv15ZFn4wZJQuP9qgqAgFH4OQfaf/g==
ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=61AlnOpUQzOJrNYR7s8T+4lmDXqWlEotaqaVaUVQOto=;
b=TUfzlgMBZ9gljtClHLcB9pG1g3GQAk7U7GE72MlnMsZwcZvPfFyx/RfqKKh7njKKclSTus2sBOfOd8MQzN4Pxycv6XoXmNGiNe1dTxmvysiw3CLNS93UKdEgSuo/9E8uAJ7gEUq+WltOkaTe9vCtQ5NG7sMQ+QJTqgMqXhQDChNoLL4TXZpWOPNE9+jtfJcK+kY/w5oaq6VifBBuFCBrp/7hmklx+/mt6zylL8z+YPKjhqdLoY7to/SVuWPxYKfZ3GvWL0cJj9hpx3mQZ6vUNZdVGdFmmnUC87MGENTc9CazZSrV2F0E4LKjsL6NbadZ371ZpiKETnFAHP/nUoyViQ==
ARC-Authentication-Results: i=4; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.59.169) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
dmarc=[1,3,header.from=gmail.com])
Received: from BL1P223CA0011.NAMP223.PROD.OUTLOOK.COM (2603:10b6:208:2c4::16)
by CH0PR16MB5337.namprd16.prod.outlook.com (2603:10b6:610:18b::12) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.33; Wed, 5 Jun
2024 18:04:51 +0000
Received: from BL6PEPF00022572.namprd02.prod.outlook.com
(2603:10b6:208:2c4:cafe::95) by BL1P223CA0011.outlook.office365.com
(2603:10b6:208:2c4::16) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.31 via Frontend
Transport; Wed, 5 Jun 2024 18:04:51 +0000
Authentication-Results: spf=softfail (sender IP is 104.47.59.169)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.59.169 as permitted sender)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.169)
by BL6PEPF00022572.mail.protection.outlook.com (10.167.249.40) with Microsoft
SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.7633.15 via Frontend Transport; Wed, 5 Jun 2024 18:04:51 +0000
ARC-Seal: i=3; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=dgtxPvDrzEvQUgN5Mp59tnkO90JUqrZODFbnc8RHPpr1f/p156MepwJLBfAxkVJRibaIBnE7aogsIyvoQdHMmNddY3VjmCfOU7IinlI3t+U5BlrP93v4sJZmvKTAarWqXbppZiFQ1HqDSGCq/BIJ76l3xdzTbPMZ7x5Ts+t9ftsPyqqB850lZ9dGgHjGH7lTWbhAdOVcPOpvyLkWWps075sk0ENC49l9lNvmP/UvMaL4AnirX+g2Zxm4qvsn+QZW4kqrIHcmY1b5/922uGIvbHW8WTiZcXTkFxRTqWKP+W396d22R8QeyZ/U1NuwYTIMqxZF8mOxE5x47GpdBcdK/Q==
ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=61AlnOpUQzOJrNYR7s8T+4lmDXqWlEotaqaVaUVQOto=;
b=G7aDqxIqByrWxZu/pX6Gad3jlsvIxZjqEI47Jv6n3685L2OGmPUrGmHxKXklLfBVE+T5chfmc+g4eiJ50NIw/9mf/KVL/N09i7YsIZeYAYUPcI5UU8ZhgEAdbpnF6et+jJg3bY049a8S3GScDL/ukQuHVkyzWdnFiMFk/kY8c7jW42DaBy3sP4guhVREQSXplq5iqx/osspvqA35dopdoAh3gjryN0hrrajXcs3i0mHwqtp5VOkw0RcY31C/wJWmbMvRfg89LJV64ossmTAs2pVaXNnKxzYRnPLe778kN4XkcBW69IL/JyWiQiicyNAdJY1UymYqM4C3wj9PC1uzUA==
ARC-Authentication-Results: i=3; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.100) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
b=kTKSMpxZ4uoC8EMqdTSwfhTobfsKLBis0T+9AZd/fLYTQ7osX1TkqlPs6kbmra4kAq4LWTlIOVa39T68bnD7XZ4qRslRZgAMfgELbT6dBWy0n6JNfAJC08sTJujyGaeMDIXHOOZp/8qy3BTWEYFpX5tUwfbeFoHsS6e8txg3XZ9u/S9FBkaCqL4yUOvMc3AHiH/+hVXvODh9DFHzQxzK2jWibsOUn3wKIIH1PTsngT2p2bsKH3tlXSrGavtKch7L0WqD6LIWHzyz/LkdD/ZKzu3qOoLQECPduL/mvVo9nWZ8Z3nvqwY0ySX70VOj2kL7SUeqBnKr6PDdgxMM3UlPgw==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=61AlnOpUQzOJrNYR7s8T+4lmDXqWlEotaqaVaUVQOto=;
b=Dlt3BjBAyMDFmGclnGGtF7AsYqge3iUqFE2E02c+bd5vEeXF8pmR8AnU8sQ9KsGji0FT/uei7xZfaQLsMW6fjY/bL3uLCVqNrxch9uVPNHfcC4zsJAE0WDndZ6+nYR+k1Q5+cmz41LtuuWw0+OP96GIKyLM4BDAhO3NDQDkV1wXqV38veCFB//Wm460gGeNxORdRhHQEXQrT7/mb/K96Yasqb9M0eQyP92ATq+0qmiDNb9E/sn9ymeDgJF+Pj+poJncP2dz1TdfuYVZKQVk6Xy8pQVAwoAoIwUFI5WEw5KPUrynG1fc+CbJ5L3x7USLbZI7BfZ6aP/EB8SM4fxH6EQ==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=softfail (sender ip
is 104.47.58.100) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
dmarc=[1,1,header.from=gmail.com])
Received: from BY5PR17CA0015.namprd17.prod.outlook.com (2603:10b6:a03:1b8::28)
by CO3PR16MB4934.namprd16.prod.outlook.com (2603:10b6:303:178::12) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.31; Wed, 5 Jun
2024 18:04:48 +0000
Received: from SJ5PEPF000001EC.namprd05.prod.outlook.com
(2603:10b6:a03:1b8:cafe::48) by BY5PR17CA0015.outlook.office365.com
(2603:10b6:a03:1b8::28) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.30 via Frontend
Transport; Wed, 5 Jun 2024 18:04:48 +0000
Authentication-Results-Original: spf=softfail (sender IP is 104.47.58.100)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;compauth=pass
reason=100
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
gmail.com discourages use of 104.47.58.100 as permitted sender)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.100)
by SJ5PEPF000001EC.mail.protection.outlook.com (10.167.242.200) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.15 via Frontend
Transport; Wed, 5 Jun 2024 18:04:47 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=ON4rML0I/WJF2UxdDT5bhh2jAMnWY3Ka3/1Is55oIlxch86ReZvpGyfl0CvF9gT+8lrBoeLM3tepmE7nufRn44IWd02e9aT0aL+7WP7fFn0CxVfD9MH8k8/LPY591YIKS5CJY6YsA+g5Q5hcSX/t5E6SAjtGLLhRtEQu4PZ1bhayQlWvtA4mYF7W6zYpp1sERzbBkIllO5L61UMQoT0GAKcUhJEpiGewIi/HRg61TfdOhaaiDrn+47bIWP+6wG69Sdd6zaUpWBlkGcpf+KFkWEq98YAXQ+9zt1JQuNSaQntVABwvrE35wL5ieshTW8H89P76xf5INcaeIyTMNtDseQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=61AlnOpUQzOJrNYR7s8T+4lmDXqWlEotaqaVaUVQOto=;
b=PqYQTkdQ7ufaSR+S2Eftzh7/m1kn17XCU0ru1qDAa44c86DcGJUnAZ4tdaovIZAjMzlrbaoeJbfClFJiBKbzX8nzNkALztjaYZDnLI8L/wcK9UO/O+bRTrNiSm/d2mYMHRtWheRREA7qN6gLLGo8L8UEKeV4vIK8DvAWbzziilL1wBc9C+OkHXghJj42KxqplOz13fC4punuSj82YdjkEFti97RfYGIXVyNN0HY6vLF0Iw+UPBGCFtgSsQRC0DWKgvg7kLIaYrfkKFGKzDrmh+AQwnqOfYwhdaGBuidBgfV+ZSYmocY9kDwEKbjClximZBftLBv4pGZubNqCAQ14fw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
209.85.160.171) smtp.rcpttodomain=accountprotection.microsoft.com
smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
action=none header.from=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com; arc=none (0)
Received: from SJ0PR05CA0150.namprd05.prod.outlook.com (2603:10b6:a03:33d::35)
by CH3PR16MB6072.namprd16.prod.outlook.com (2603:10b6:610:1ab::14) with
Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.31; Wed, 5 Jun
2024 18:04:43 +0000
Received: from SJ5PEPF000001CF.namprd05.prod.outlook.com
(2603:10b6:a03:33d:cafe::23) by SJ0PR05CA0150.outlook.office365.com
(2603:10b6:a03:33d::35) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.7 via Frontend
Transport; Wed, 5 Jun 2024 18:04:43 +0000
Authentication-Results-Original: spf=pass (sender IP is 209.85.160.171)
smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;compauth=pass
reason=100
Received-SPF: Pass (protection.outlook.com: domain of gmail.com designates
209.85.160.171 as permitted sender) receiver=protection.outlook.com;
client-ip=209.85.160.171; helo=mail-qt1-f171.google.com; pr=C
Received: from mail-qt1-f171.google.com (209.85.160.171) by
SJ5PEPF000001CF.mail.protection.outlook.com (10.167.242.43) with Microsoft
SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7633.15
via Frontend Transport; Wed, 5 Jun 2024 18:04:43 +0000
Received: by mail-qt1-f171.google.com with SMTP id
d75a77b69052e-4402e119571so413171cf.1
for <postmaster(a)accountprotection.microsoft.com>; Wed, 05 Jun
2024 11:04:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=gmail.com; s=20230601; t=1717610682; x=1718215482;
darn=accountprotection.microsoft.com;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:from:to:cc:subject:date:message-id:reply-to;
bh=61AlnOpUQzOJrNYR7s8T+4lmDXqWlEotaqaVaUVQOto=;
b=mzHPCOPBwzhMPO2QSMdtFovlKdU1FTLJxDiFCFs7aD53IK4EiueG8WAztV3mC3OTIP
KX/CtgLG2yQQYblJVnzzd8ad1qXBO9NMyw6Iqz6uYill7VBtSrhcEBPHf9nwpEo2E7G7
VP10e22ePoNLcTjvpQX6l9CHUCqhl+89QOkgNYVvFppPvLJ/DUHWEi5BkeOaqgyw7elN
PekJi3+7Oq+F9gnO8HPdsSXX4nrJCyNTd1mVcHEezOZ/sYw3xOhV02IJ9fR87fOWPlO3
nh/45H9C+0JH12agg1jNRQSpal/aTWp4gslYj4X3CfHiwXLdnNbMlpTLQBflD02Vlo1W
JS1A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20230601; t=1717610682; x=1718215482;
h=to:subject:message-id:date:from:in-reply-to:references:mime-version
:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
bh=61AlnOpUQzOJrNYR7s8T+4lmDXqWlEotaqaVaUVQOto=;
b=stZQZ9aaZ+JtO3P8ydEVoy5CdxsboulD23GEffbHUNkRoZU8uRIwzFsa0710TVnSlf
naizN975h55m85yx8LlQo1GsMiVuNpx3mHfL2FdGNWjVrGvQSTLkzT9Uhr8vgm90YIU2
6ONirJ0JyxWzEIXrDTSmbEmXNhOYKPNYbjdkMIPUTtAokMTK8gNcfWEysgDwRY1eCkXM
0kDSJqpGpo647lBw3i3Qzhd880NFKY73hWyVVT/MlCzvdrnsasrb+xTHAfHkHyxH+I7c
IvAJSzN2JJTVEwSITy+AVellFpGQtKK77W0BnAEVVypjxouSWgYMmEUNdhqv+cdJ8U7P
vXvQ==
X-Gm-Message-State: AOJu0YwZjZYih4tpHiW/6dWkok3JfNGLLFYesSgyC8nomGi/jLkd+Qv7
PQFPTi6ouioJiVtkSz2FGZ3uBro4CmJrIWrxq4dZ9ZNa2CVLREGjU+gNvGGQei4p3kmHkB6p/xd
mzSnB7iezhPVBpXMPSEq1RBlEnj/qeyWd2k4Jig==
X-Google-Smtp-Source:
AGHT+IEx/nriBh0qGW17khlznzSNXkQSOTqNcGZAWpFH/sZSSXuJ8dqcdjsKtEJ0D0owtUeyPVSHslCHvOjaicFYGGs=
X-Received: by 2002:ac8:5fd2:0:b0:440:146c:4ac with SMTP id
d75a77b69052e-4403623f92dmr7429981cf.16.1717610680889; Wed, 05 Jun 2024
11:04:40 -0700 (PDT)
MIME-Version: 1.0
References: <CAPw7qDwrZcba0Ydkyrja5kxEiQ5xQUYKujOb+iVD68c=nLNA-A(a)mail.gmail.com>
CAPw7qDwrZcba0Ydkyrja5kxEiQ5xQUYKujOb+iVD68c=nLNA-A(a)mail.gmail.com
<46b1d391-ba0b-4fe4-b4f4-85af2d98a9d3(a)CH3PR16MB6417.namprd16.prod.outlook.com>
In-Reply-To: <46b1d391-ba0b-4fe4-b4f4-85af2d98a9d3(a)CH3PR16MB6417.namprd16.prod.outlook.com>
From: =?UTF-8?B?2K/Yp9mG2Kcg24zYstiv2KfZhtuM?= <danayzdanyyzdanydana(a)gmail.com>
Date: Wed, 5 Jun 2024 21:34:04 +0330
Message-ID: <CAPw7qDw_H=BXG2=Mg7=aHeg++6K9cjf1aq=TEYLY__E+DCdSbQ(a)mail.gmail.com>
Subject: =?UTF-8?Q?Re=3A_deliverable=3ARe_info_support_money_Xchanged_Rial_?=
=?UTF-8?Q?Iranian_cash_rule_transfer_total_amount_20=2C000=2C000=2C443=2C222_R?=
=?UTF-8?Q?ial_Iranian_cash_rule_transfer_Send_To_NS6_Bank_ToSeE_TaAvon?=
=?UTF-8?Q?_Iban_Sheba_IR950220031302016989264001_Branch_Code_313_Name_?=
=?UTF-8?Q?Hashem_Jvaad_Zadeh_Sar_Cheshme_access_transaction_confirmati?=
=?UTF-8?Q?on_delivery_has_been_monitored_accept_Bank_ToSeE_TaAvon_Docu?=
=?UTF-8?Q?ment_Bank_Mellat_IR170120010000003315992937_Delivery_accepts?=
=?UTF-8?Q?_release_Local_176=2E56=2E156=2E136_in_sending_money_cash_rule_tra?=
=?UTF-8?Q?nsfer_Sent_with_Aqua_Mail_for_Android=D8=AF=D8=B1_=DB=B2=DB=B0=DB=B2=DB=B4_=D9=85=D8=A7=D8=B1=D8=B3_?=
=?UTF-8?Q?=DB=B2=DB=B8_=D9=BE=D9=86=D8=AC=D8=B4=D9=86=D8=A8=D9=87_=D8=A8=D9=87_=D9=BE=D8=A7=D8=B3=D8=AE=3A_=D8=A8=D9=87=3A_Lookyloo_Monitoring?=
=?UTF-8?Q?_=3Clookyloo=5Fmonitoring=40circl=2Elu=3E_=2D=2D=2D=2D=2D=2D=2D=2D=2D=2D_From=3A_Daneil_Smei?=
=?UTF-8?Q?t_Sent=3A_March_28=2C_2024_03=3A46=3A14_To=3A_Lookyloo_Monitoring_CC=3A_?=
=?UTF-8?Q?danayzdanyyzdanydana_Subject=3A_IR17_0120_0100_0000_3315_9929_?=
=?UTF-8?Q?37_=3E_company=2E_Microsoft_office_365=2DCompany_BankBazaar_Team=2Ec?=
=?UTF-8?Q?om_=3E_=3E_company=2E_Microsoft_office_365=2DCompany_BankBazaar_Team?=
=?UTF-8?Q?=2Ecom_=3E_company=2E_Microsoft_office_365=2DCompany_BankBazaar_Team?=
=?UTF-8?Q?=2Ecom_=3E_company=2E_Micros?=
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Content-Type: multipart/alternative; boundary="0000000000007f3b40061a2866b1"
Return-Path: danayzdanyyzdanydana(a)gmail.com
X-EOPAttributedMessage: 2
X-EOPTenantAttributedMessage: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7:2
X-MS-TrafficTypeDiagnostic:
SJ5PEPF000001CF:EE_|CH3PR16MB6072:EE_|SJ5PEPF000001EC:EE_|CO3PR16MB4934:EE_|BL6PEPF00022572:EE_|CH0PR16MB5337:EE_
X-MS-Office365-Filtering-Correlation-Id: 953732c9-bff1-4e8d-c1b6-08dc8589ff24
X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230031|69100299006|7093399003;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?2KlP5oMqk1fYvXkGHMIiCSvlqcmftp6RnusdO+aYDgJqGmwu1AA1sKCBMLJi?=
=?us-ascii?Q?GKOpwz3ZFrYSrMb9lCS5A7jwLZiLsAnPWSrdPDdrkBf6aql5qp0zABkfXifL?=
=?us-ascii?Q?nYVtMAKw+aR1kbqOabXP8bh4R9zKHJkARWckSeVWcorX8Yg9CIzZQck2m2xq?=
=?us-ascii?Q?OcT8V9fz9rd/kRhOXA4u2i2YzVhEn6kBN9S06q5/pivE7RgUFEyFzix1EnIU?=
=?us-ascii?Q?/nyytiziqm1tck+dc6n+QXPC9taDK6jY0DyieNwSzUkmy61Tu8uAaG3kM4lg?=
=?us-ascii?Q?5RDye4njfPF0eSWxK7lN0dnzeUUipBG99vw9ToPJQFJGbCGOJob82Hj7AZdh?=
=?us-ascii?Q?Po5W0e5+J4xrzYLrdGXOPxpIDlZ1V9fQA9IUJBolHm491/TvjZBFAdhPPD0B?=
=?us-ascii?Q?y2PuRtVn3Xi3BoD+4kVRFq+0x8LYYBxZiIyrAT2Jp18uFbeSti56Y3BVUUwR?=
=?us-ascii?Q?B7JkHuhwTywLElQ2e6KMeShVuTjiHMedaXHR7nqvNG2g0mTiziP86L8ae4iQ?=
=?us-ascii?Q?GTZ3mU3D+UfkqL2i/U2R3L6y294v1QzwXUH3dg8J9XFWdcEJFaQb2G7v4Vkl?=
=?us-ascii?Q?O0kYg8QqoeHzd8tUCh1kvveD6BE9kQb8CJBQ1XOXvB4eQPHkwB8qX/DZ3T2G?=
=?us-ascii?Q?Klf3zsUTrRFMKYRSpy97tj4lzU3R6NOEwi+9sVqD3X9vF27OWwgjRK4NFBB5?=
=?us-ascii?Q?uTLqmZMlpci20VZQ7GLpFqiFbjzVmweTPVmW+7O+Uxhy/K7iSprJZlg3usxC?=
=?us-ascii?Q?aBtjnxRlvMvoUv0CDfNqXpof9yYi84Fz/QJ/vag1LoBkr75CwE0kuU53En87?=
=?us-ascii?Q?TXH4gzKOx80bl6HczBmGafB0txp8/CDGDJaXbzNVQA7byDwxYPbaHQzwldMh?=
=?us-ascii?Q?mfBKWqJsVe2E29vnxDIZgpKWml28vBaPMW0cqw/9dNFUZVQHzcfCdrS+5r8e?=
=?us-ascii?Q?9WvfscCaIwx0BWpMqlFK+Rj45VXmc2vCbHoVqdVx6bVBX1zR9VRsSiaqY0SB?=
=?us-ascii?Q?6OHEW/aJwFPNTOQJsFtqE7/JJAl+20rz7Msputvst/CRWiXqCyCeBulHFX39?=
=?us-ascii?Q?x65DLqFcDYcBGIAW4c43clumEiTPcisHYR6ulMVg68IS7+fnuF+qkSrKN+oI?=
=?us-ascii?Q?gA55joo+qz8c91ImXX7iXaC4mV/eGazgg+jhypjrHIjF+qPeY7LspWlog4s7?=
=?us-ascii?Q?VtDAjAXGf3d7kQgCnARJlA1UM2MVSyDde58pd1gr8/2JChvSnUtvuVCSVja8?=
=?us-ascii?Q?wQg75pAkY3w+fdKc2JT5+b/MTFvSfkxF8KE1MoAS9EC1X/NCXj1YA7S8v0rf?=
=?us-ascii?Q?iHii6g1+AfRKSZhlxPQZvlX2vkP3xJGgEAWDUCYZc0EW2MZawNWpUjVsZPNx?=
=?us-ascii?Q?QeXH5DC0BFpwHNbxc8lu5U6ppyv1mPfmiN9xKM83LKyWCKgtKlsk2nhYwqjz?=
=?us-ascii?Q?jX7ctFPhOPB5Jz/CaqzMvKd5RoB4Z6ePg3JYkGnvMNcrmHHdd958KY0104y4?=
=?us-ascii?Q?1us8CawgA+XjdutjccvkOEFOWKW77S6ggOze0q+On+MXX9yVzXJn5rrx50wU?=
=?us-ascii?Q?/c64+tdw8OopAewajRggqsvZHds7naUMPumIfLSLd/s/r7RbOQdSvAk2smyc?=
=?us-ascii?Q?BCMDXtewabvHxPV2TqwuNgpEx/Mad26LGrw7lfTjNYorMXpeOtmJn0ATztI0?=
=?us-ascii?Q?GZFETy50TyD7+DHWCrUvu7HQZ4+OvAhsTz5620AMM1eNuxMSPHb4shpQMx25?=
=?us-ascii?Q?pXf1wvHnpDrGA9bo1RXMrRIkp0fq4Q1CXaQoTzw7Mtrh1LpWK3f1+m07Rhtt?=
=?us-ascii?Q?mYCcWPZ9zd8Q58y6v4z+3UOOiNLeQfo+BsTzHfWf9n2OPem+ga4diW+ZDbgB?=
=?us-ascii?Q?+OgVE/uxcI5lHXbfS2GUZvK0PJkJ4lQ4YfgcYpw/TI2oT4sYT45gFFAfN8UJ?=
=?us-ascii?Q?1jZSbBzP1SJUbXyibywTEMb6AWnZ2U6BY9hk5CAx2Gg=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:209.85.160.171;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail-qt1-f171.google.com;PTR:mail-qt1-f171.google.com;CAT:NONE;SFS:(13230031)(69100299006)(7093399003);DIR:INB;
X-ExternalRecipientOutboundConnectors: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR16MB6072
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
SJ5PEPF000001EC.namprd05.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
SJ5PEPF000001EC.namprd05.prod.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs:
0163b746-36be-4ce3-73d7-08dc8589fa0d
X-Microsoft-Antispam-Untrusted:
BCL:0;ARA:13230031|2040899004|69100299006|35042699013|7093399003;
X-Microsoft-Antispam-Message-Info-Original:
=?us-ascii?Q?mL9+/gOPgEZJoZtXZE936DSlVOfhE30IYgkTUlL0lIDT0LMg6ugfTxyA8dSf?=
=?us-ascii?Q?UxC1T6jgMzhkIFz1n9RhlOLkkSTAH/fciBhQ/VRhTIosn1ln642lLGSMk/tf?=
=?us-ascii?Q?m/bM6LmPQcF/YDs2qNnyCeKD5XV8ij0zLKSzkHNd5s9p5fiB7020eOFQtWpC?=
=?us-ascii?Q?hRNbbDH7yoGeKeKxyZ8KVmAqZLEdEGsQEKq6Le45+fX4c8I1GZUJH5AtdRJA?=
=?us-ascii?Q?P0POMBUMYohibXvkBOeiIphlLwLqlMnIdQbhTd1HheadjhB3hredukrVA5/Z?=
=?us-ascii?Q?HC1KmxiM5N0AulHAZCy9X84rSAd5hdwqRjLNrOVj67jYjonRQbC5eCXb5wA4?=
=?us-ascii?Q?o8mCdCNbsAkoLzfgDYTsl39+yW1nSX6xawuZw1KfQSYmBspPT3c6R/KIUjrn?=
=?us-ascii?Q?Up7Coll4UJ8M0D5rRTzSOQ0dlSa4Y+SByMVK8zWsl4EGVYx+1H6AmPMt9kpV?=
=?us-ascii?Q?2izjfLxStnmCRKZSR8Tu5f+MkwRXi5jwt6EAS5fGsmnozsFv0Qk+gTUjyLyb?=
=?us-ascii?Q?6EYZiCMnO8ejJlBUz0cQeS7cnYOkVl9MX+DSnNcBuYTx97LVaRZNY9TkDPQi?=
=?us-ascii?Q?SsjWHb7Kubr+AbEdgM7Rj7q0TjQK95P3D5Zp28/h90cDpfx9xLZnq8ZLr4lv?=
=?us-ascii?Q?0N7BtjLjjgLSRwnkIBlZ/6kcS5zHjaX7O1ccfj7nK0TXBOxrbZT5P0okxI/c?=
=?us-ascii?Q?lV1RsnqXDY/9gz5XyzVCX1CfRodmLX41d/USoiZD7NXcX/qQSThH3aypg3Kb?=
=?us-ascii?Q?mYTN4Fsv2WnPgGXs6OLh7d1fDbQ2+Qr86ieLycaMhAJsEAM0XkyhorPzcXvG?=
=?us-ascii?Q?/xm9UPgGd439Q8AawgL/Z9GOcoN7kRQlzNvTKBtgtwg/ap+mkt29qC6Pv+TM?=
=?us-ascii?Q?ypBzg+Ng5/V+xiGGUqPvbGSAlJiUtulAWROsnKERA/uYbuozXARWiJiPGCKE?=
=?us-ascii?Q?wS/Mw8Iyx6znHzsYTCQVr3oLWndruuhu5q/uuDiGsfhLNAUaeGpEWlCVBeiD?=
=?us-ascii?Q?yulNMX5wHKCX4WCWyBm10AfhqMW0pOhzlyQdESohs4rdc1Uu3kYaYy2bvNjZ?=
=?us-ascii?Q?JaoV4D/fNPnJfAuaqu6TG3LIZyctx82ojA6ZLxm/5of5a2LBMzMpUwco+y2i?=
=?us-ascii?Q?H0KaeicKFNJquq8AJF+5C3M6xSi8uCcDFGhE5SBM7NT93deI5v4WrmCeUcd4?=
=?us-ascii?Q?z6vE2hSVelN2zpnaKh2iSVHe7KbzZid8/hL/pA6+HXuYkqrhyjsfaJ68SRpQ?=
=?us-ascii?Q?hiNIqJDAfwk/ae3pdj1BmeoWI8D1VgtV7JHRdBTe3dkyDnICICp/cx3WnGfa?=
=?us-ascii?Q?AEqiUAwAHCn27BWHI77i5dIH8zEqQ0kKa8bG6lvuqwWuwnlMVPaLr8fLqp1y?=
=?us-ascii?Q?kM2FlhuvcFlYEWk4igLYDeIrIDIzNeI45k5b4sbH3iI2hgOkzy+8I1Xbv1IG?=
=?us-ascii?Q?YmBjTZPC8l5JYn9UK0eYFD+5FBj1xZix607FI9Gq3v68DMmonql+CfhRYavN?=
=?us-ascii?Q?5rE7gQ4CuBJs/Tog8C15VqhaCQhkhL+iAcfgRYC6sUe12UXqi4YLEyDg5p1t?=
=?us-ascii?Q?J7ufAlISbBlKHeB47U5knG80bt+bFHg9/41ybBPJgvkPjABMlwQeE4QQxgok?=
=?us-ascii?Q?yCZZoVMe8i6RrIg1FyR+Hwj3oC5O5sd5ijFWcPBBlghbqf3VvNq1Ktbbo1sx?=
=?us-ascii?Q?o6OeG2jqaV31tKtwuovVxcq9IYt+9hp+Zmi+qsGfJlqrnmoc8nUU5OwWrmfL?=
=?us-ascii?Q?EHvX/Vxo6TTgBfxcuZDvAbw81ikL+vLat2OjPgTVV8gp+Tf4jDOI19etHCzI?=
=?us-ascii?Q?ZoEY9yso3HFjTpoqhQ6CDsxTb57bTGavgzisywnD2J8SjSgDP6oi94mHUma3?=
=?us-ascii?Q?pyzTfA1kvjWsirK623AOSisT79pfBNhA4HlH4Xlgc0xRxuNHfjSTb2/8/iIv?=
=?us-ascii?Q?oSWotySbZnzwtC/t1rA2nQ=3D=3D?=
X-Forefront-Antispam-Report-Untrusted:
CIP:104.47.58.100;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:NAM10-DM6-obe.outbound.protection.outlook.com;PTR:mail-dm6nam10lp2100.outbound.protection.outlook.com;CAT:NONE;SFS:(13230031)(2040899004)(69100299006)(35042699013)(7093399003);DIR:INB;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO3PR16MB4934
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
BL6PEPF00022572.namprd02.prod.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersPromoted:
BL6PEPF00022572.namprd02.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
c5905fb6-852e-40dd-f4bc-08dc8589fcf5
X-Microsoft-Antispam:
BCL:0;ARA:13230031|2040899004|7093399003|69100299006|35042699013;
X-Microsoft-Antispam-Message-Info:
=?us-ascii?Q?NeBfa4fYMrjpt23J1jOKRFUGLfBHVAHSzBkA8D6vi7Xtjn/ROR+PO3L/uFbx?=
=?us-ascii?Q?ApZ1P+W/PEzVbkT8EMi9PWgUdEowImkJaxh5Y84kTeDF0wKnG9o51Rwild6x?=
=?us-ascii?Q?3uwjFdLHO0OFy/JDEF0z8Nu0hzMVVQYTxedPA9AtN6YIymN1wuy9ok63TAUc?=
=?us-ascii?Q?TaEfOhYchfymI7qAm6QIaJJOKYDsa6ovADAb6OhuaM84tHtELOoBeP59z6o1?=
=?us-ascii?Q?cQH7Ag+hN/F74BLFhksB/evqi5sgVmVMd0hWX2LYJP7UFoarTEWi1O6iBoap?=
=?us-ascii?Q?AIAwkymmMDnoCUDnWExNcfBr0PLIKdzJtfvK4XdeOCyaVZyIZH/ej9r2O46w?=
=?us-ascii?Q?r4mnTi4R+fNcktTjwpwRSzeSeNTtb6A2ouapiVrBJ6WnbfKvxBPCu3Sqr5UD?=
=?us-ascii?Q?7JroMZbJbneHWLN7TXD6oMCpFzz5wxPTF4fXJLSRX6dXV3vMUV5yMYSipJ2J?=
=?us-ascii?Q?ZMH4ibIbgm8F3KCw9GLYUmOWcLnGUx7Cm4O5opFXaUOOs/2ymGnPUN42sbPo?=
=?us-ascii?Q?T1ws8x78gan0Iqhpkl3ioJhYsXk3rtRXyI1xWwyuyJy645s+H7zc6hms31ri?=
=?us-ascii?Q?anEb+7HFriSsTBa2LuZMfzgBmAkiE3G/ZgHeRXjU80mQgFQfgH5uijxVCGS3?=
=?us-ascii?Q?isUQo8t8LWHXXmJ2zytAt4hzzoIK/PWrzhP+EPeUCATUt2T75081YKcBchOI?=
=?us-ascii?Q?v+bvfmG95k/633jkiFRViEA+Ep0wAEZJpQikbCw/GQ7Su7EP7R9THIu2bWys?=
=?us-ascii?Q?bgzh1SBEZqdXSMwB8q3I8NzacTiWVrCQ1yRjowx5DSFxiYj4Xm3uvYRLUfuY?=
=?us-ascii?Q?unE+MyB28yXpoN8kvIKmdYwh6wOp/oJcg7PQrbVKZ1WgqBRQ/NRZtKvKMn1S?=
=?us-ascii?Q?nVvC6hN9GZaUCKYLTqcH/0CBLDSmAN1CCVNZ+bYjT9CvBJoy4fa7sxt1ppaN?=
=?us-ascii?Q?xoiJWQ8t9ruiqF0CUITVt5uE6nMIqVitqB+i7stUdRa9uOjbM8j19BslA1Cm?=
=?us-ascii?Q?utiHhfb80Z1DxiUzHbbD9WXHgRhG30b4u61ysGLV5SoOVSHOMrq5fK6bilo+?=
=?us-ascii?Q?h+pwfrp2Wy6QOlBS7WMTx26WvSdb7Sk0yMqMVAG8yIDHw2extKCB3GjjeQZk?=
=?us-ascii?Q?h7Yh/JuBFQB74X+TqdkEPjiia1gqNAK3yfcYPTVXiuCeMIcp0gaDR0sLmVtd?=
=?us-ascii?Q?yEmAwsiI3uFXtshfyLQ3HqEFIPQS+62ZZnURVtXJbNNiz+YD5XLL8QkWtA3k?=
=?us-ascii?Q?Kn9UCdXTW/LPE26LFqqaMYDsIxG+uGcx8vAC3gpEn+bQHLOj5c/+Ox4oY4CP?=
=?us-ascii?Q?3jHcURlOi71PEccvTzFra6sON46Nl9PzzRntHYoROE3AXyO8FjQPQ+/upxuq?=
=?us-ascii?Q?GJy8AoEvSv45yLNuJivzEzHfbCqgy1pY4FIe/oTgrmW1xTJ1jvvp99/2fpIU?=
=?us-ascii?Q?RBmpdR4QNMSz3xh1P+gSI0Ik91ORkMmdEowZNAoLSrlJ3OCK2CWVeb6j5qP6?=
=?us-ascii?Q?Zdn9axfiividoSZHhCaAOb16UxCIX8rhtqaML7k/Do1B4ZN2xkf6IffgjGP4?=
=?us-ascii?Q?3wb69bphfgtUy2u38NUcDzb6jkxDFYEahd4GNSZhJZIhLQogxEUOCFLJZi8P?=
=?us-ascii?Q?6APZ+OCMdWQ520A2srowv1R3a7Je7xrnT+I5shvcWc5UpMWD+yo3eBp0h8lo?=
=?us-ascii?Q?iCyPWmEUtdKJiQwUWTYRvmJnxP7RUXia4rih4455he0BiYupaAZsCtdC2u7s?=
=?us-ascii?Q?Tbxxc+TNtatuj6opgvhhDw3I/VsHeJ8HRHCKCa5HVCc/G8tzoWQRv72ho04w?=
=?us-ascii?Q?YBNGDFHsE0oW04zcESqcrTQvn7lJ4hJJze0X6z/aUTBNwlpoObiQilrkX8Yw?=
=?us-ascii?Q?PpAyt9KEqPw/r9FhhQ80DWaCKLqwsTOQx9b/bLL/mgsumxO923F4dxUENXmk?=
=?us-ascii?Q?VuntMpUfo66ObAzqMfv4Dg=3D=3D?=
X-Forefront-Antispam-Report:
CIP:104.47.59.169;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:NAM12-DM6-obe.outbound.protection.outlook.com;PTR:mail-dm6nam12lp2169.outbound.protection.outlook.com;CAT:NONE;SFS:(13230031)(2040899004)(7093399003)(69100299006)(35042699013);DIR:INB;
X-OriginatorOrg: accountprotection.microsoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Jun 2024 18:04:51.5349
(UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id:
953732c9-bff1-4e8d-c1b6-08dc8589ff24
X-MS-Exchange-CrossTenant-Id: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
X-MS-Exchange-CrossTenant-AuthSource:
BL6PEPF00022572.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR16MB5337
---------- Forwarded message ----------
From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
To: postmaster <postmaster(a)accountprotection.microsoft.com>
Cc:
Bcc:
Date: Wed, 5 Jun 2024 21:34:04 +0330
Subject: Re: deliverable:Re info support money Xchanged Rial Iranian cash
rule transfer total amount 20,000,000,443,222 Rial Iranian cash rule
transfer Send To NS6 Bank ToSeE TaAvon Iban Sheba
IR950220031302016989264001 Branch Code 313 Name Hashem Jvaad Zadeh Sar
Cheshme access transaction confirmation delivery has been monitored accept
Bank ToSeE TaAvon Document Bank Mellat IR170120010000003315992937 Delivery
accepts release Local 176.56.156.136 in sending money cash rule transfer
Sent with Aqua Mail for Androidدر ۲۰۲۴ مارس ۲۸ پنجشنبه به پاسخ: به:
Lookyloo Monitoring <lookyloo_monitoring(a)circl.lu> ---------- From: Daneil
Smeit Sent: March 28, 2024 03:46:14 To: Lookyloo Monitoring CC:
danayzdanyyzdanydana Subject: IR17 0120 0100 0000 3315 9929 37 > company.
Microsoft office 365-Company BankBazaar Team.com > > company. Microsoft
office 365-Company BankBazaar Team.com > company. Microsoft office
365-Company BankBazaar Team.com > company. Micros
09392430244
در تاریخ چهارشنبه ۵ ژوئن ۲۰۲۴، ۲۰:۳۷ <
postmaster(a)accountprotection.microsoft.com> نوشت:
> Your message to postmaster(a)accountprotection.microsoft.com couldn't be
> delivered.
> postmaster wasn't found at accountprotection.microsoft.com.
> danayzdanyyzdanydana Office 365 postmaster
> *Action Required* Recipient
> Unknown To address
>
>
> *Was this helpful? Send feedback to Microsoft
> <https://go.microsoft.com/fwlink/?LinkId=618497>.*
>
1
0
در تاریخ یکشنبه ۲۳ ژوئن ۲۰۲۴، ۲۲:۰۳ دانا یزدانی <
danayzdanyyzdanydana(a)gmail.com> نوشت:
>
>
> در تاریخ شنبه ۲۲ ژوئن ۲۰۲۴، ۲۲:۵۶ <
> postmaster(a)accountprotection.microsoft.com> نوشت:
>
>> Your message to postmaster(a)accountprotection.microsoft.com couldn't be
>> delivered.
>> postmaster wasn't found at accountprotection.microsoft.com.
>> danayzdanyyzdanydana Office 365 postmaster
>> *Action Required* Recipient
>> Unknown To address
>>
>>
>>
>> Original Message Details
>> Created Date: 6/22/2024 7:25:57 PM
>> Sender Address: danayzdanyyzdanydana(a)gmail.com
>> Recipient Address: postmaster(a)accountprotection.microsoft.com
>> Subject: RE: deliverable: Fwd:deliverable
>> Re://localhost:26543/storage/0000-5979/%D9%BE%D9%88%D8%B4%D9%87+%D9%BE%D8%A7%D8%B1%D8%AA+%D8%AD%D8%B3%D8%A7%D8%A8+%D8%A8%D8%A7%D9%86%DA%A9+%D9%85%D9%84%D8%AA/%2C000R.htmlDevice
>> deliverable Money Amounts 20,000,000,000,000Rial Send To has ben Address
>> Account IR210120000000009403817784 Bank Name Bank Mellat-50070 2 Net Name
>> IR-SITS-CO-20110530 3 Client HOSAIN ROSALIE Name Domains Bankmellat.ir Bank
>> Address 6 IP Domains 176.56.156.36/0 7 Bank Tell
>>
>> *554 5.4.14 Hop count exceeded - possible mail loop ATTR34
>> [CH1PEPF0000AD74.namprd04.prod.outlook.com
>> <http://CH1PEPF0000AD74.namprd04.prod.outlook.com> 2024-06-22T19:26:16.848Z
>> 08DC885C97F69D18]*
>> Messageby: CH1PEPF0000AD74.mail.protection.outlook.com
>>
>> Notification Details
>> Sent by: *SA0PR16MB3838.namprd16.prod.outlook.com
>> <http://SA0PR16MB3838.namprd16.prod.outlook.com>*
>> Message Hops
>> HOP TIME (UTC) FROM TO WITH RELAY TIME
>> 1 6/22/2024
>> 7:26:11 PM mail-vk1-f182.google.com SMTP 14 sec
>> 2 6/22/2024
>> 7:26:11 PM mail-vk1-f182.google.com
>> DS3PEPF0000C37B.mail.protection.outlook.com Microsoft SMTP Server
>> (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) *
>> 3 6/22/2024
>> 7:26:11 PM DS3PEPF0000C37B.namprd04.prod.outlook.com
>> CH0PR03CA0297.outlook.office365.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 4 6/22/2024
>> 7:26:11 PM CH0PR03CA0297.namprd03.prod.outlook.com
>> IA3PR16MB6583.namprd16.prod.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 5 6/22/2024
>> 7:26:13 PM NAM11-CO1-obe.outbound.protection.outlook.com
>> CO1PEPF000066ED.mail.protection.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 2 sec
>> 6 6/22/2024
>> 7:26:13 PM CO1PEPF000066ED.namprd05.prod.outlook.com
>> SJ0PR13CA0134.outlook.office365.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 7 6/22/2024
>> 7:26:13 PM SJ0PR13CA0134.namprd13.prod.outlook.com
>> MN0PR16MB6386.namprd16.prod.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 8 6/22/2024
>> 7:26:15 PM NAM02-BN1-obe.outbound.protection.outlook.com
>> DS2PEPF0000343F.mail.protection.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) 2 sec
>> 9 6/22/2024
>> 7:26:15 PM DS2PEPF0000343F.namprd02.prod.outlook.com
>> DM6PR17CA0026.outlook.office365.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>> 10 6/22/2024
>> 7:26:15 PM DM6PR17CA0026.namprd17.prod.outlook.com
>> SA0PR16MB3838.namprd16.prod.outlook.com Microsoft SMTP Server
>> (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) *
>>
>> Original Message Headers
>>
>> ARC-Seal: i=5; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>> b=a90DrI9oPkXTb+2Aiq4acsiVcpEZSltFKnpjAg7tYBvcnVMWfTMbqCODw6lECUZ4T3J1K39VAIC6W4N9IUpfsHvGkN3uwbStHXAMdXogmyddNjwu3S2C00xET49O85zJVK05TX6tvNzXqKMTBOt+hrfDNAyuJpLYWiYIi7/z2v9XLXawS8wHPt9+tkz9Bv/KzIIR8yw0wiCGHLu3rEYY62mwQ2m+Orro2A/TA0wLkyzbquLNoWYtkKaXx6D2RjGC7qndScMpSpBA9V/SmjLPfhY3cpe8Cix+BdLzevgggO36RE6Ic89l6z6z2s7DnvbgfQCDZqWJBQbhOLtr15GmAQ==
>> ARC-Message-Signature: i=5; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
>> s=arcselector9901;
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=hICurRd15UOodlifOpe3fuZiuxw9ceQ6N3Yuyvij2dU=;
>> b=UdZUxGc8+9/d4LO/HNin0qwobDhZW5TnlJWY1MV9E29wYnWdRmTK/7MLNo6+/sMwcOC8COb/xyoqso6JfnkNyeD+pd+6R6nzUSAAgQqmt2+CRvnb6CKmFM/dlZ39Oa+CZSDOBP0qjDS6sJJGes+tZ5JN58oADShL1yxXm4n+Xq/WFAHkdgdsfvu2L848bnoJWJS/Y3ftf83gNjBFuhw1K1owyp5NwsiplS1XBuLd5y1mQdpZ3D8VBoxkZqyrftL1UlcaoX7m3jaGd8alN95CScRwVwGpL2k2l3RG0gEpuh1BJl00nhLvboKN2hcyzZrQk8bZGrzbqrJ1Q/qM5EgRJQ==
>> ARC-Authentication-Results: i=5; mx.microsoft.com 1; spf=softfail (sender ip
>> is 104.47.51.49) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
>> dmarc=[1,3,header.from=gmail.com])
>> ARC-Seal: i=4; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>> b=ThrjoNkfqJbo3xp5fE7OT5OdS0TgP385m+aAYaqKWMa2mwxIW+6pdriEhTFnxbefRK/VSPzeams4fwhceDIoJwNc2QoMrVr22vMx5hU4pu3Brbu9TJe+BCJaIABv44Dnl2pKHruHKr59yMMC2gWmwqAxqMTQomBL9pHP+BKWqDKY0FGw36JLyVRSBfxNvi3lDog3HXewNqgAsyQY5WNrgQmOKprfmZDFBHTVHfZPeNU3LZmfbiSv2BigZuf174rqHvixbybU1QRC4SCXX2Z+xHcN2P8hltBQp2Pp2RbfSSYAdkNplPERfjxbs3MZu2qog8hoMZIM55Bec5sbESxKeg==
>> ARC-Message-Signature: i=4; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
>> s=arcselector9901;
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=hICurRd15UOodlifOpe3fuZiuxw9ceQ6N3Yuyvij2dU=;
>> b=jlI4UkFdKnbxkrC6KvWRk0MVX51J/8zRoqvRHA48El/3gzll30X1XrU3TM4tNJwxgMpB9qYx90ZLvcoskDOJwDIKB2zIi7iMm0MLiCHiKFc71/dRnKPgdhAU6RlZxm8wXQgVS5K5JmoSvxanUz+AKPCCLxnNxJQ/PJa+LWeGbRCwSRohoC48YhJhygs1O723uAvrcoWJucgV6EQWFOKe+LTai87Mnaogb9oBNDAzB+Ar6YxxjAbI2ObOQnSDcn5VnMMjyRzmxT41XNRu1HUodZ9yYvQyTcRjjd/QuGWBxGuHbfVexNVl5dJUXoqoWhe+S8hO83uXavTRQcKTyKQN1Q==
>> ARC-Authentication-Results: i=4; mx.microsoft.com 1; spf=softfail (sender ip
>> is 104.47.51.49) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,3,header.d=gmail.com]
>> dmarc=[1,3,header.from=gmail.com])
>> Received: from DM6PR17CA0026.namprd17.prod.outlook.com (2603:10b6:5:1b3::39)
>> by SA0PR16MB3838.namprd16.prod.outlook.com (2603:10b6:806:86::9) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7698.26; Sat, 22 Jun
>> 2024 19:26:15 +0000
>> Received: from DS2PEPF0000343F.namprd02.prod.outlook.com
>> (2603:10b6:5:1b3:cafe::ba) by DM6PR17CA0026.outlook.office365.com
>> (2603:10b6:5:1b3::39) with Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.38 via Frontend
>> Transport; Sat, 22 Jun 2024 19:26:15 +0000
>> Authentication-Results: spf=softfail (sender IP is 104.47.51.49)
>> smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;compauth=pass
>> reason=100
>> Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
>> gmail.com discourages use of 104.47.51.49 as permitted sender)
>> Received: from NAM02-BN1-obe.outbound.protection.outlook.com (104.47.51.49) by
>> DS2PEPF0000343F.mail.protection.outlook.com (10.167.18.42) with Microsoft
>> SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
>> 15.20.7677.15 via Frontend Transport; Sat, 22 Jun 2024 19:26:15 +0000
>> ARC-Seal: i=3; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>> b=fJBS/k2E79ehkQwmDIJhIlFTpRgtUsNJCx0zjzmEzYoMBmqlSJZnmrjgjxhY80ofQsWBkhxj4FD6yHt2GAihsUMaTzmhu/FJqNW9ykadpfVwPqapViJtAPZhwbPcoJ/bjxBXvfwtxSACq1t1ibRaMCzT/ukpXTLwKiodfRIMi9o6F6ZSqoGfyhLVRtols4MpbG/k9/9U/4LPbgJwPw+b4jFPF42T1n8QSHkQQOCF91AGSd1f/d9CrWEchFfbQm3ncEjhuOmSsuWaod1fe4/uWDUHqdTBtnyxEG/ojHEX1V5lbYalo8/rltdDBaCkHVWoyqAAaeHsxX+JZMh7142D8A==
>> ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
>> s=arcselector9901;
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=hICurRd15UOodlifOpe3fuZiuxw9ceQ6N3Yuyvij2dU=;
>> b=WeIdK18AZr98GzgdD50/4wzBzg5Hbg5mmOsYp9zMkKmtMcBG4bN5T3CmawkYTkEWO9D/RfTDya52EkdMhwt7M4j/p2ut9TaClZzsuwCBBJGTpv6Wdh9pnZrQarh3kH/v44ee0Blc2bio+wmJh8A5d4kJdfwHUwP0OIzroFrTG4d2J2H9wlugxSxe6iOv/HRFV17xE0C/zcNktZbETMQiDtpcYWQukCxoyqG4n3xwvzbvWoXGwLR6dfzN21sQx7UmcG7J+VtOQraYo3nEJ63mmDC4w0tntISbkr0kJzAB4GBd4YbOOmFhskXkXNzV2qcgJ30hJg+JfIMr1Lpq7TQtog==
>> ARC-Authentication-Results: i=3; mx.microsoft.com 1; spf=softfail (sender ip
>> is 104.47.56.169) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
>> dmarc=[1,1,header.from=gmail.com])
>> ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass;
>> b=NqtYMhMHf58aRUnReBzIgfujpMcNBNXtNkFOndF/E04wJXGJ7v0ogmh736shB7oT6KujJIKBU+xVju+ddUMToRc4YDE8RPMz/dC+PBe8MRlpS/O+EFg2hA3JIf2pb/ReGdG8ZIEaqBHAIcinrMEWECXkzNcfEbFoUSavI1mYomEZ7KYyMG0r/rKpmzQpbyYwgVeNh+5g8fnAc+CNY1chMdtsiJdZch9Gkqd1ZerLi98MNcb2OwQETN+41vp0obLVYTzL1tAtNzybBT/oW7P+EK4kxUvfXHZkuhbk6zuw9ocJSBVaOZm6x9XAmlAmrGj4s+4nCOpuiDxRXwG/Rk9auA==
>> ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
>> s=arcselector9901;
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=hICurRd15UOodlifOpe3fuZiuxw9ceQ6N3Yuyvij2dU=;
>> b=IuvcIDwcFOv2UWAW7ps0zN/C33RgXiGwpEdUjbm3MMVB98b40DhY3c1EQqPCCFjEae4mTKUJz6QcGJBNtJWjGsCEfEN19KfxlOeSvGAOEdfOH/e/+ZZ6IKwQTdsR9WHnVCh+IKEuno4LkjxEYckmFmLjd5zQ4QUItpwfztTrUOxVihmLzPmzpkPwcrLPb6zaHBaAojbBbkB7tDKbeDKTXaNoLocmT2D9WumXrGXPYlxFftFc4DtoyKHgLffj9kEURUOmHB0G7lZN+CF+0eo/3KCVtfdTk7EBrHciOjSMG1ioyNNjsKca0sRqEcAYFCETOtHm72/JZxutf7uH+YZx0A==
>> ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=softfail (sender ip
>> is 104.47.56.169) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=pass (0 oda=1 ltdi=1
>> spf=[1,1,smtp.mailfrom=gmail.com] dkim=[1,1,header.d=gmail.com]
>> dmarc=[1,1,header.from=gmail.com])
>> Received: from SJ0PR13CA0134.namprd13.prod.outlook.com (2603:10b6:a03:2c6::19)
>> by MN0PR16MB6386.namprd16.prod.outlook.com (2603:10b6:208:4c5::10) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7698.21; Sat, 22 Jun
>> 2024 19:26:13 +0000
>> Received: from CO1PEPF000066ED.namprd05.prod.outlook.com
>> (2603:10b6:a03:2c6:cafe::1e) by SJ0PR13CA0134.outlook.office365.com
>> (2603:10b6:a03:2c6::19) with Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.37 via Frontend
>> Transport; Sat, 22 Jun 2024 19:26:13 +0000
>> Authentication-Results-Original: spf=softfail (sender IP is 104.47.56.169)
>> smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;compauth=pass
>> reason=100
>> Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
>> gmail.com discourages use of 104.47.56.169 as permitted sender)
>> Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.169)
>> by CO1PEPF000066ED.mail.protection.outlook.com (10.167.249.10) with Microsoft
>> SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
>> 15.20.7677.15 via Frontend Transport; Sat, 22 Jun 2024 19:26:13 +0000
>> ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
>> b=RHp+kndnryhmv2MREzZhl1LRR8MMq0XGOCaSx8drBSJNFyHgx4R3DynFkLLbHNBGIly6L7NM2shwHvdymKkcMIXulOFk5NMSDCfu4KYFUSYNidKfdeYNcCwtgEfA+Wo3roefPbneklFWEBk6vMJoMNQ6pcD8m6Ll8dTFkDbWBTagVpcooe+Mg3YhdjJlYQgPDAeyutv3BDdCfdto1e03heV1F2P3mn2oldx/lV2KwjdcYd2e3S0Fy3RVETgKGIT9fcoVNHYXAvQ8ERt7f3fqHyPbAyYfdG1UvVdQbigUX1AGbs3poQwOVZVCs9ZWSQ8Hr/Noqgo47dDtGUpP42qLGg==
>> ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
>> s=arcselector9901;
>> h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
>> bh=hICurRd15UOodlifOpe3fuZiuxw9ceQ6N3Yuyvij2dU=;
>> b=dPLqiAVYWCOpJ4Ll3coIBrJ9bD9ulGEwga9IMf5jJ4LUvSWsCYic5KqKIgAwG+n0cXVK4uMUDSXGwG4cPkLOiNG0Ko9EhIGpPChixpJSfZC4ToI9Lf36gMxa7PLhZKZGgmdt9WhIRdLZM9k9AOsyYPyAQUb7y4UmTJ4qCkNjt8zSs2rlQ8Fl/h4iHoIxP76RDqFgHkp+voF5/g7ExjAKK+Lfa/N0LX5jRPEfeZnOhzoV1a6m9sMWuJq8cBxwcVpPh3j2FICWc9PEQVF48eKe7t+ndsO8cVS5hv8zJbCaJWCKsEyqpyPCXP2JvW3wKjWQ0F/jfSrxrn0/SkPpQ5oxUA==
>> ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
>> 209.85.221.182) smtp.rcpttodomain=accountprotection.microsoft.com
>> smtp.mailfrom=gmail.com; dmarc=pass (p=none sp=quarantine pct=100)
>> action=none header.from=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com; arc=none (0)
>> Received: from CH0PR03CA0297.namprd03.prod.outlook.com (2603:10b6:610:e6::32)
>> by IA3PR16MB6583.namprd16.prod.outlook.com (2603:10b6:208:524::14) with
>> Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7698.26; Sat, 22 Jun
>> 2024 19:26:11 +0000
>> Received: from DS3PEPF0000C37B.namprd04.prod.outlook.com
>> (2603:10b6:610:e6:cafe::9b) by CH0PR03CA0297.outlook.office365.com
>> (2603:10b6:610:e6::32) with Microsoft SMTP Server (version=TLS1_2,
>> cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.38 via Frontend
>> Transport; Sat, 22 Jun 2024 19:26:11 +0000
>> Authentication-Results-Original: spf=pass (sender IP is 209.85.221.182)
>> smtp.mailfrom=gmail.com; dkim=pass (signature was verified)
>> header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;compauth=pass
>> reason=100
>> Received-SPF: Pass (protection.outlook.com: domain of gmail.com designates
>> 209.85.221.182 as permitted sender) receiver=protection.outlook.com;
>> client-ip=209.85.221.182; helo=mail-vk1-f182.google.com; pr=C
>> Received: from mail-vk1-f182.google.com (209.85.221.182) by
>> DS3PEPF0000C37B.mail.protection.outlook.com (10.167.23.5) with Microsoft SMTP
>> Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7677.15 via
>> Frontend Transport; Sat, 22 Jun 2024 19:26:11 +0000
>> Received: by mail-vk1-f182.google.com with SMTP id 71dfb90a1353d-4ef577b074aso493092e0c.2
>> for <postmaster(a)accountprotection.microsoft.com>; Sat, 22 Jun 2024 12:26:11 -0700 (PDT)
>> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
>> d=gmail.com; s=20230601; t=1719084370; x=1719689170; darn=accountprotection.microsoft.com;
>> h=to:subject:message-id:date:from:mime-version:from:to:cc:subject
>> :date:message-id:reply-to;
>> bh=hICurRd15UOodlifOpe3fuZiuxw9ceQ6N3Yuyvij2dU=;
>> b=Xws4K42GLEa9WS19O7VobN+N70k/kLRa06Eykx6dpsllxo7hMAqSxomnjO9kqYqfpq
>> 5tysmsu/0prdVLy3ZNg5WiuVZgwWbSds9x5mIoiFw4HIlk3KbXAFPpOasp+5aJZr7msZ
>> SkPL7fI6ZyG79VWhEtBTHXNQ8z82nGIxkc5e/d6q8QZYyHaM+yRuN7jmrdGS+QxcOh38
>> 2Glozi8Hix/Z80a7h1rYrRSWIA5hkzCrHbAULqxVfRIuKBcaMU4tjkSN1d07/qZ2cf5l
>> T1qOPgrH5M6YvPU7UfNBQ15bYe/jTSjYSGfa8cInxJ7PVK9oHjJ/dZxLkXQSm83R/FPy
>> a3/w==
>> X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
>> d=1e100.net; s=20230601; t=1719084370; x=1719689170;
>> h=to:subject:message-id:date:from:mime-version:x-gm-message-state
>> :from:to:cc:subject:date:message-id:reply-to;
>> bh=hICurRd15UOodlifOpe3fuZiuxw9ceQ6N3Yuyvij2dU=;
>> b=QyQmUxpONzzidqdkVSgx8/XK3fUo3sfVZA4wtORQ8lymxTBVrrWTDgOHXqapgEUKyu
>> cvPmANgmTYu9IpVGwnSB2PuG1bD9dLo+t39jkC9FFLEIrjiYwUARYrR8qbvYUnYUwDwU
>> p88SzBiiSOaXBt8zXxaasV1ODKeqTBGf5IutpTX8HfV62/Vu2RAjsZLxXW2j8iYriXlg
>> BM/+Bka9VqBKDQDIPzEyXSA3IeeBDZYgUPLPGTngJWw/HvqGvknhKybHJxhrhiHnAmft
>> pcKKaG+RZraArlsexqTSnZDiym66pAf4jDoAdjDKCTo88nhFG0X8ZoCTc0GbXlaexn52
>> LbMQ==
>> X-Gm-Message-State: AOJu0YzJN0/APUwVmK2UNS1XtnYwCN5HbqGTHTq6Z3LqshtjQnV9U1nW
>> Odfbr4vLxDUKeG1pZ1HckgG4OpFhvCXmrjScmnLfYw2DGXjXHRQCqrXPytLZcEsVV/lTLy2lO97
>> GEQlzQAhWh5iwBJgVua7PXlM9mb66WGa6hXVvafxA
>> X-Google-Smtp-Source: AGHT+IFV290fSwnjkfKI8YjSXt/K34hmhpJun/LTNMXI5lWhQqtYi4ClvFSlDa1UfW1CDAmwQnAHwG37DbjN0n/qhcw=
>> X-Received: by 2002:a05:6102:3113:b0:48c:36f9:f2aa with SMTP id
>> ada2fe7eead31-48f52a5aa0cmr647078137.17.1719084369917; Sat, 22 Jun 2024
>> 12:26:09 -0700 (PDT)
>> MIME-Version: 1.0
>> From: =?UTF-8?B?2K/Yp9mG2Kcg24zYstiv2KfZhtuM?= <danayzdanyyzdanydana(a)gmail.com>
>> Date: Sat, 22 Jun 2024 22:55:57 +0330
>> Message-ID: <CAPw7qDxxTLGG6UeOuyDOMAC7pzPR3iE_T77uz+6tHJuc7H77_Q(a)mail.gmail.com>
>> Subject: RE: deliverable: Fwd:deliverable Re://localhost:26543/storage/0000-5979/%D9%BE%D9%88%D8%B4%D9%87+%D9%BE%D8%A7%D8%B1%D8%AA+%D8%AD%D8%B3%D8%A7%D8%A8+%D8%A8%D8%A7%D9%86%DA%A9+%D9%85%D9%84%D8%AA/%2C000R.htmlDevice
>> deliverable Money Amounts 20,000,000,000,000Rial Send To has ben Address
>> Account IR210120000000009403817784 Bank Name Bank Mellat-50070 2 Net Name
>> IR-SITS-CO-20110530 3 Client HOSAIN ROSALIE Name Domains Bankmellat.ir Bank
>> Address 6 IP Domains 176.56.156.36/0 7 Bank Tell
>> To: postmaster <postmaster(a)accountprotection.microsoft.com>
>> Content-Type: multipart/alternative; boundary="000000000000354099061b7f859e"
>> Return-Path: danayzdanyyzdanydana(a)gmail.com
>> X-EOPAttributedMessage: 2
>> X-EOPTenantAttributedMessage: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7:2
>> X-MS-TrafficTypeDiagnostic:
>> DS3PEPF0000C37B:EE_|IA3PR16MB6583:EE_|CO1PEPF000066ED:EE_|MN0PR16MB6386:EE_|DS2PEPF0000343F:EE_|SA0PR16MB3838:EE_
>> X-MS-Office365-Filtering-Correlation-Id: dd284ca5-87e6-4e3e-2aa8-08dc92f12ef4
>> X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230037|7093399009;
>> X-Microsoft-Antispam-Message-Info-Original: =?us-ascii?Q?QPo4eRyw9Ep9875c0Ltlr34QiISySl8K7UHCKFao0E+7wZStWMVIi3vTOKow?=
>> =?us-ascii?Q?ICrbY+KtAZ+ee5LSCgcgadhN39nLl6HSH9shFMeFxnBtejLfDH60+1nTwrrn?=
>> =?us-ascii?Q?JvR75bijdnwqaOCrX432SnwYq4Qtw8rCbPWYeQmMIlftlBV+/B9162vOH1Qo?=
>> =?us-ascii?Q?ECmwWzVHDqnNXHpModbBNB4hxXmMYk9bQ0oX8CYPUqSImaCxF5eRaWb039SH?=
>> =?us-ascii?Q?iv98g90f7ZHus6mWSez1Afb6QUS1J1lo1ReGF3w3IAoQClsaL1Pk5I+ZBaD9?=
>> =?us-ascii?Q?Ilbej7XQeKu9FR0b0AkKbh4KwvQwI2JLdWvN2mlMBrVnEn6irl9X855JZge2?=
>> =?us-ascii?Q?jppqgugtAj/HZzl4ibT4YZfSqJBYGE2rmb90Ja3nAseF7D/uzD/xv/sFcyWZ?=
>> =?us-ascii?Q?2hFOet+NItJGQd6hyIeXwacJhVL5ZGLX53E/DFtwB6tMIcfhE5LRW+Ketu2a?=
>> =?us-ascii?Q?FEsP+9VzQlbpyWcKZmzNkjClFRulbFSs0/PfehE4I1cCWTrWhrxr/lN9OLaC?=
>> =?us-ascii?Q?nAvlXRsD96xDKCefvytF5cpiAfxPetDeFZJHFfUO86gCAsofAdtAEMXtNstG?=
>> =?us-ascii?Q?btcMjee2myru4qFUzePUXqrLLg/VS8HhkwxBbbCKqJ54ZGwCz38FMn55vdNa?=
>> =?us-ascii?Q?FqfGro6wIxNz8wRBisSUklUNOJ4Xw5JGoSgRij8FHBoYCTm9Yu2zaTynMMnf?=
>> =?us-ascii?Q?nJtLiZae7jntSZiWau0hnLHNqWUq/6QtvqgMqtb69ni08IMmN8rR0rkRPCUv?=
>> =?us-ascii?Q?UPkQXpWBT0pzNG8acMokG1tDeJRfRSang9Yqao8rKcxr7ulcDeJKBVhz+4PN?=
>> =?us-ascii?Q?sinX0KK+muCaJSicm6JZIz7BVztA0CG5ouEvsyCG2pysUMjcjAEw10VXEJvN?=
>> =?us-ascii?Q?UWmQUEaHaHtCUoNTa4arawAFFdZPQhFyJWR3A0zt+DuiClAkNDAfntuYixp7?=
>> =?us-ascii?Q?WWkIgJI7/uZxwjaO3o/SF4uHv+VkPNd7uvx0OQsqz2BtnLAiTnMHzGjkT/9u?=
>> =?us-ascii?Q?p+++MybBp6k7qvX22bM/qwmHJ1n/p+dM84k945H4bd+G88k1hPZkh3jTjWDC?=
>> =?us-ascii?Q?m970BTEPIZCIf0R5ouACPQfqNXqdQVlI/CphNBdsY03/4IiAwR8Vj8v94HoH?=
>> =?us-ascii?Q?5l5Xa0vYdcIJTu/+DrEN9eXTcJDhym4ZHHBv+1vnRLcas5h59B9JH9gr35Li?=
>> =?us-ascii?Q?IqmhoAxYtXAJup8tvAHNB6W3hBXfl7xc+f+1jOu3Qw/XZ0d+F+XGAlS5GC+t?=
>> =?us-ascii?Q?1hO1GDFFJEU409HVBjgllnHSP0xqKzKRdfB84VQ58KURXmOlaksHOMLJ/tFI?=
>> =?us-ascii?Q?huyXkaLTFWlHolHiubGCu1Z5+KvvHPH+kK/gBiNJIWW2plMishRvBspUS/iI?=
>> =?us-ascii?Q?fgECrgikVJQpTTVUPQrsdHVdMKNfs6J57vWj9XQoZKLzpBY1qTsF1slwMUGQ?=
>> =?us-ascii?Q?YK3s54nKL4vV6kzgTcnfUBfsP9pNafZNccOno6VF4kGv6LIHupvqSfLtPXm+?=
>> =?us-ascii?Q?olsKfDCp/pVpnj6KkWsDWpovQ7nBwh+4PvpJnmAKb1fMEjm7Z7T14Fgd9V4k?=
>> =?us-ascii?Q?G7pa2YxYagBmjEGROruTB7Pul+b5lLFJyUy/WXbI6Cm49pNk5nZXxCiG/obg?=
>> =?us-ascii?Q?+H0ELarhXU0T9MwacxaKBImDZBVDVdEhkCapViYwARdESBfBOc6jj55JiQzh?=
>> =?us-ascii?Q?6fQftcmg0CTk1vfsQScx2Dt7z0BbWWobiZw7Pp07lYneR1ZBa3hBr4lFJnB4?=
>> =?us-ascii?Q?uhdK2by1cjpScFPq9j0qV47sR9dkJY987dpI2h8rC8cztLhWkTEG?=
>> X-Forefront-Antispam-Report-Untrusted: CIP:209.85.221.182;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail-vk1-f182.google.com;PTR:mail-vk1-f182.google.com;CAT:NONE;SFS:(13230037)(7093399009);DIR:INB;
>> X-ExternalRecipientOutboundConnectors: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
>> X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA3PR16MB6583
>> X-MS-Exchange-Transport-CrossTenantHeadersStripped: CO1PEPF000066ED.namprd05.prod.outlook.com
>> X-MS-Exchange-Transport-CrossTenantHeadersPromoted: CO1PEPF000066ED.namprd05.prod.outlook.com
>> X-MS-Office365-Filtering-Correlation-Id-Prvs: 9a8a4500-13df-43b0-0964-08dc92f12c78
>> X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230037|2040899010|35042699019|7093399009;
>> X-Microsoft-Antispam-Message-Info-Original: =?us-ascii?Q?rx9AKmq4kjUwW9uxEq63dgdLPwSwU8OQs0NK+iXWHN0y1T2iaqy9qQPiznSq?=
>> =?us-ascii?Q?OKf1RX3RbAU4bBe023qc1zFvs7RU5YzLJRbXHGadQQYxRyUtOi4/Gt2G0B3K?=
>> =?us-ascii?Q?ehVykKfpoyGE985uTFNObQtYnM3tam5B7opZa5JORdkOqmsxdgt4pY8fK39Z?=
>> =?us-ascii?Q?1XPP2dbvuQO0AknZo4aQROyjCsGA8wRqlwae7ryNUo9T4rqnyvndSUPXKU4K?=
>> =?us-ascii?Q?nCev2/unK22NXGex4foPJ84MiT9Qj2Ni3IC2eRQGiUvrQ8IOzQQ5J4rBYnYt?=
>> =?us-ascii?Q?VFEjK+6n7pif6q4umRlaI6/57J7TWzKPG26JXUI/gMDGQxswHRWl+jp3Z8sa?=
>> =?us-ascii?Q?rA26Hx3rJP0mMiyyS7ljE0ZUeLqE6inEvRJVhktrq1DIu9PCzDowK953azKZ?=
>> =?us-ascii?Q?/YCH4Os1+pDHXGmql0oqrxa1dVcbBHID6u/xR44V7uVZKG4IvTFZygnQlr7h?=
>> =?us-ascii?Q?w/0NTnvqHWPz9ZG/HIR0+TfviPpwzqZGLpxo71MJW97KqYqJ+KXgsOVaoQkZ?=
>> =?us-ascii?Q?yo5F1F2rUZ1Z4nLlZMR/CdLxTN5EA3wHBr6irQmzXBqdV824nC2V++7j47W1?=
>> =?us-ascii?Q?lJPP7pYLhSLxWg7Ckk08Qn5kKd84kasu9wuNeuwsTZAXntVjN1cQcSW2lmIV?=
>> =?us-ascii?Q?McKapIgaQRU+1PrLLZMvJeGa8nFKccHkscQqI2sCfmweS9unrLQEpzGwBvsU?=
>> =?us-ascii?Q?7/7SX6rNzPr6jadiV7X38hg4Jk36bmpNFJxHxoIQiMc0LOyhEeEMxXOxjGCO?=
>> =?us-ascii?Q?OUoef6y+HKM+Ocx09uJGyCmY9fkrPJzRvZUfzphay1YxAh9gD8VntXKHvp3e?=
>> =?us-ascii?Q?LNkCXh78CmMdQWHrktb8d/8pZZaKyh8Zk4qFxPcoxvq1+LdDv0pH57enL0Ok?=
>> =?us-ascii?Q?OPHLMa0BhVNe/dwAiuJYpzkvpF/vwEWnq/YRqx9QbxolKX7FiHYDgg9Qcjbx?=
>> =?us-ascii?Q?R+QTGxqcO9UqHIEh1prxqrYV0qCNSzTWehXBakdou6aEBBnxTY9z6Qgn3UYr?=
>> =?us-ascii?Q?/sIrp8kfOJK3jc8KNr/bxh7atvLaCGLO4Imxmq/O6gnZz+o4Nm41WaV3rhby?=
>> =?us-ascii?Q?bBgN61aNo8+TuirI83VGq6r05S3Wuj0WuUSnScLNREaCwcn0Tdh8tRV2v4yi?=
>> =?us-ascii?Q?cT9LSOrljdjeUWv5dMA2LaiMlcTEWFEd5ooKJ6qfRwhkEqB2XCH233ojB6LB?=
>> =?us-ascii?Q?BE0M4sWBmGyYC7zJNSnE3GcY2sgHJkNSGLYeZ56PvS7rTW1RzpoP1BERk2JL?=
>> =?us-ascii?Q?FCYjSq0jsNGTimUad4+nKXdTSSJaa6VrmLcybMdHu2XQ06qwcakPlcXDJl+X?=
>> =?us-ascii?Q?31wKcS06ZhoLW4rU0pG7bODVQtYQhwu8/Clf1igtK+XtrvnqfIwLatfmAo7W?=
>> =?us-ascii?Q?FoziPTNKk0Ke59dw38KVMNUthW98YlsTHfOfoe05ygajATxx5QvNGLMssZ6E?=
>> =?us-ascii?Q?1U6A4Do74dW6nKWGWcX0Ln6P6FtiQeVLejw5UgpxpM8UNkYSKze+BMH1dn5Q?=
>> =?us-ascii?Q?huSHs+KlDipG/8ZpNnttMK6IabcHuRr7C2EgsJe/OAjUdw7OkFQ+OThcBoWb?=
>> =?us-ascii?Q?OclfgCOIQPJxWKyCCVQDfrs4f6wY0r1vjXEoZa1S2RwRkBZjrbFWexxpnRi1?=
>> =?us-ascii?Q?sqDeOqKUPJLUIw4BYByhDzzic0vINvEs7Q3Bf/zBOc7fqLcEFFPh4tNwZhzZ?=
>> =?us-ascii?Q?CcNK0xJ0J3nvE5k6X8/0UhNgHjD03dAr58lnbdZr/OAZKL/Rr4rsE0+JGwHK?=
>> =?us-ascii?Q?7cdAqknvOkfpd3igGIp/e1yXm1Csnuo=3D?=
>> X-Forefront-Antispam-Report-Untrusted: CIP:104.47.56.169;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:NAM11-CO1-obe.outbound.protection.outlook.com;PTR:mail-co1nam11lp2169.outbound.protection.outlook.com;CAT:NONE;SFS:(13230037)(2040899010)(35042699019)(7093399009);DIR:INB;
>> X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN0PR16MB6386
>> X-MS-Exchange-Transport-CrossTenantHeadersStripped: DS2PEPF0000343F.namprd02.prod.outlook.com
>> X-MS-Exchange-Transport-CrossTenantHeadersPromoted: DS2PEPF0000343F.namprd02.prod.outlook.com
>> X-MS-PublicTrafficType: Email
>> X-MS-Office365-Filtering-Correlation-Id-Prvs:
>> 1329fa8b-e6ad-43fa-23dd-08dc92f12ddc
>> X-Microsoft-Antispam: BCL:0;ARA:13230037|2040899010|35042699019|7093399009;
>> X-Microsoft-Antispam-Message-Info:
>> =?us-ascii?Q?YC4+NK8ByhWzIsQYfTaabY6AEumoE05EMRG/WTvp/oOgQ5dP80Y7CnqbDT0j?=
>> =?us-ascii?Q?4hEbAWZB8o+asFHr/GqM85bjC54mJTdbzGGlID0btGcq+0F2NDyspM9YYRlX?=
>> =?us-ascii?Q?fknGwA8X6JIK1+hUUOFRRsPiTX2kPcZTnMGac11L7C0zdScBJC0w/JLKzcA3?=
>> =?us-ascii?Q?xctHtr17anpP7fXgWLFjhQo60iVcO6dXSaM2S5P+I4ayNucaTWNt294TmXvP?=
>> =?us-ascii?Q?xQqhm/7CrUDmbuIBhlOxglPf1zrn1zbKH5Hbht5knn3WFpKQoSmUR7kF4aJG?=
>> =?us-ascii?Q?+f51Pih/v6cYpEdydUPm1Gf/Akai9BDWkDoc2CBa2ecvq66bx6DYwkYFDWEU?=
>> =?us-ascii?Q?ZQccJAE682Qm+lw1DlLt0k/S8ZD3yfeKRiIrOSKppL3s8aA+XYPf8QT5OaJG?=
>> =?us-ascii?Q?IjVlRZcz/dR3Vqc2L/yZ/I63bIgIujcQFiBUbrLQP15OTSszdpfc7RIAXOox?=
>> =?us-ascii?Q?qC009YeBGsjvfKZlHnVpG6opxRU+cwKGhot8qGvtDKz52mwQeHqF/J5LTBrN?=
>> =?us-ascii?Q?wwM3T+V/F4cgs/fE24QgVzl2BTOJn2Ohh172KuqQe3gQVHNyoctrF8GY69Wr?=
>> =?us-ascii?Q?ZdA91VGjzOaOwzvS3o6hiRd9+nTQpKW8i5tMm1JijomEIB9xMBwKr2bRghtQ?=
>> =?us-ascii?Q?T0ZHk8moi2xZ+YGGBxrCvwF3wrh0rYKlpBLI0cukVA/JE953p5mh/o+pxiqN?=
>> =?us-ascii?Q?QU6N4+PFVaCECuzZGOA8qUWj/olbptek3jcHFdN3QzVIxoewafDdGqQC2LkS?=
>> =?us-ascii?Q?uqryRtXJ0ByrECiBklbTNAozfeoQaECHzxSfzqLb74cXKjcgiUxMrX84jGMm?=
>> =?us-ascii?Q?twEZHaIS+WftP7G7Hp1ZOgh2OBifrC6Cj01PHA3bcbdpnb1vH+pnd1CFh423?=
>> =?us-ascii?Q?L9tgDFuiVKJLBdefLR2BtDRHXtiV6eh/n7UicFedOAHKxzA+qm8eJxzzAWNA?=
>> =?us-ascii?Q?dpeSCZFQYfYD26UdNEnSvwFhq/6lokkTd/bzOOq9uz5s1z9zdnyzGGEHMwzf?=
>> =?us-ascii?Q?zxeNSO6KmAg+K6+UhLb3Yaue6j0fVri9k/gPwxxMZ7ngHXtyElsl9mFD7Goh?=
>> =?us-ascii?Q?8XkOF6r0LJ/7VEfRWsF6dqDsSENUUvOvwqBsZMb02iplXLVaZd+QWGoyDOPv?=
>> =?us-ascii?Q?K4SZUGQfnkTU0PiyaSoQ/wMBaMgcXAHBYsjh9hcUzFbpIHZgRkagU8B/aHcH?=
>> =?us-ascii?Q?eBGYmR3D6EIfhlGCcv7nfzzGnPOm8XXJd6d+Wh4DunVl3x8Sf9vgRzHshm2G?=
>> =?us-ascii?Q?ijUgW6zB/m4nFcT0RGW4Mq4lJoUcMbc3/vo4MZWiWgkM+e5CN665fd7iuY2Y?=
>> =?us-ascii?Q?L8qRSp0oBILpqHdMHNVjA7mGuvfL26fTaeZy9ORS8/1ozBu0cmiUDIxJhClv?=
>> =?us-ascii?Q?nllloM+jgmtrUjPkwH22RMfwurVnJ4SDfSfp8DHetb4q09k26ONBXjYIlQxV?=
>> =?us-ascii?Q?uO57a5vqj+DoNjNTRqJAH56k/uh5kvid+ag/cl07kF2Xvst9ZSqnlUWUB+Ng?=
>> =?us-ascii?Q?PHC4WPQ68t2YwRVop/+v45A3DvR5t9OeuNiIWe3EaCppJqHulsbqlSxhN63D?=
>> =?us-ascii?Q?EA47ZgIRS0Bjbjr10tExySYR7jpIFHpKsrPVSV4hAgRab+2oW1cT1BriiTyS?=
>> =?us-ascii?Q?6vTA/I6hE1uisnojKKNbZ2OpEwDCRsERt6IcHq6hAnJzpTmsbNg4o5HZmyx7?=
>> =?us-ascii?Q?OokE99sigMCAwRqlzmdFP9mjAM4sD/nklXMVLxp8o66pNyP1LW2f1CqDOdwT?=
>> =?us-ascii?Q?y9DfLClUMntXfgpn0efuqwdkArN6ryw=3D?=
>> X-Forefront-Antispam-Report:
>> CIP:104.47.51.49;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:NAM02-BN1-obe.outbound.protection.outlook.com;PTR:mail-bn1nam02lp2049.outbound.protection.outlook.com;CAT:NONE;SFS:(13230037)(2040899010)(35042699019)(7093399009);DIR:INB;
>> X-OriginatorOrg: accountprotection.microsoft.com
>> X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jun 2024 19:26:15.1045
>> (UTC)
>> X-MS-Exchange-CrossTenant-Network-Message-Id: dd284ca5-87e6-4e3e-2aa8-08dc92f12ef4
>> X-MS-Exchange-CrossTenant-Id: 5ba90553-c2cd-460e-b5fd-ab93ad9155c7
>> X-MS-Exchange-CrossTenant-AuthSource:
>> DS2PEPF0000343F.namprd02.prod.outlook.com
>> X-MS-Exchange-CrossTenant-AuthAs: Anonymous
>> X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
>> X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR16MB3838
>>
>>
>>
>>
>> ---------- Forwarded message ----------
>> From: "دانا یزدانی" <danayzdanyyzdanydana(a)gmail.com>
>> To: postmaster <postmaster(a)accountprotection.microsoft.com>
>> Cc:
>> Bcc:
>> Date: Sat, 22 Jun 2024 22:55:57 +0330
>> Subject: RE: deliverable: Fwd:deliverable
>> Re://localhost:26543/storage/0000-5979/%D9%BE%D9%88%D8%B4%D9%87+%D9%BE%D8%A7%D8%B1%D8%AA+%D8%AD%D8%B3%D8%A7%D8%A8+%D8%A8%D8%A7%D9%86%DA%A9+%D9%85%D9%84%D8%AA/%2C000R.htmlDevice
>> deliverable Money Amounts 20,000,000,000,000Rial Send To has ben Address
>> Account IR210120000000009403817784 Bank Name Bank Mellat-50070 2 Net Name
>> IR-SITS-CO-20110530 3 Client HOSAIN ROSALIE Name Domains Bankmellat.ir Bank
>> Address 6 IP Domains 176.56.156.36/0 7 Bank Tell
>>
>
1
0
Dear list members,
here are the draft minutes from the IPv6 wg session held during ripe88
if you have any comments, please let us know as soon as possible, preferably this week.
Much thanks to the RIPE NCC for taking the minutes.
IPv6 Working Group RIPE 88
Thursday, 23 May 2024, 11:00-12:30 (UTC+2)
Chairs: Christian Seitz, Jen Linkova and Raymond Jetten
Scribe: Evelien Schilder
Status: Draft
View the recordings<https://ripe88.ripe.net/programme/meeting-plan/ipv6-wg/>
View the stenography transcript<https://ripe88.ripe.net/archives/steno/41/>
View the chat logs<https://ripe88.ripe.net/archives/chat/41/>
1. Welcome
The presentation is available at:
https://ripe88.ripe.net/archives/video/1352/
Raymond welcomed everyone. The minutes of RIPE 87 were approved. He thanked Jen Linkova for chairing the IPv6 Working Group since RIPE 67 and acknowledged her outstanding work.
2. Co-Chair-Change
The presentation is available at:
https://ripe88.ripe.net/archives/video/1354/
Jen Linkova stepped down as an IPv6 Working Group chair. Nico Schottelius was selected to replace Jen as a new IPv6 Working Group chair.
3. Operational Issues Discovered During IPv6-mostly Migration
Jen Linkova, Google
The presentation is available at:
https://ripe88.ripe.net/archives/video/1355/
Jen discussed recommendations and operational issues related to IPv6-mostly migration.
Jordi Palet Martinez, The IPv6 Company, said that he disagreed with Jen's recommendation to not use DNS64.
Jed replied that it may be needed, operational experience was necessary to see how many legacy systems rely on it, because this is currently clear.
Jordie said that in his experience when you disable DNS64 and you have CLAT, when reaching IPv4 only destinations, two translations are needed - CLAT and PLAT. This means extra translation and extra power needed. Given the low level of deployment and usage of DNSSEC, there is an increase in deployment of IPv6 in content providers, the ability to enable for example, in BIND, doesn't break DNSSEC, and some hosts are already doing AAAA synthesis. He has not found customers with problems with breaking DNSSEC, even for big deployments. Having vendors implement AAAA synthesis is more useful than disabling DNS64.
Jen Linkova replied that it's a controversial part of the document. She thanked Jordi and asked him to continue this on the list.
Ondřej Caletka, RIPE NCC, said that the RIPE NCC Tech Team ran this experiment this morning where they disabled DNS64 on the IPv6-mostly network. He said that nothing should break, because either the device would be running dual stack or running IPv6-only. There might be less efficiency. All these issues are from people who actively changed the default configurations of their devices, so he was interested in fixing these issues in Linux and was happy that the IPv6-mostly network worked during this meeting.
Jen asked if Ondrej would volunteer to get CLAT done for Linux.
Ondrej replied he's already working on that, so things are happening. There was also a project sponsored by the NLnet Foundation, so things were happening.
Jen thanked him and said the discussion should continue.
Yoshinobu Matsuzaki, IIJ, said they deployed an IPv6-mostly network at the APRICOT conference in February, and they used an enterprise access point. It's too smart, as it assures the client has DHCP and IPv4 address and if the client does not require IPv4, the access point automatically kicks out the association every 10 minutes.
Jen answered that Cisco was supposed to fix that a while ago.
Yoshinobu added that one has to be careful when configuring such an access point.
Jen said it was a good point and that they need to add that to the document.
4. IPv4-with-IPv6 Next-Hop
Tobias Fiebig
The presentation is available at:
https://ripe88.ripe.net/archives/video/1358/
Tobias Fiebig (MPI-INF / AS59645) suggested an end to making IPv4-driven addressing plans. He recommended following RFC 8950 and said that IPv4 with IPv6 next hop is the future. This allows one to fully leverage the available IPv4, to build a clean IPv6-centric addressing scheme and to have IPv4 as a flexible add-on with a central IPv4 IPAM.
Nico Braud-Santoni, Funkfeuer Graz, asked that Tobias mention IPv4 forwarding to an IPv6 next hop on Linux with net link. He also asked if Tobias could clarify what he meant and under which conditions this would work.
Tobias Fiebig, MPI-INF, said he didn't have the exact kernel version but with the Debian 12 or Ubuntu 20.04, 22.04, you can just tell your routing stack on Linux to use a v6 next hop for a v4 route. So it's "ip route add default via inet6 fead:..." and it sends packets.
Robert Scheck said that for RFC 9850 support, Tobias hadn't mentioned OpenBGPD. He asked if Tobias had considered OpenBGPD.
Tobias said that he believed that it was on the road map.
Maria Matejka, Bird/CZ.NIC, thanked Thomas for using documentation prefixes in his presentation. She said she can't remember when she saw a presentation using strictly the documentation prefixes even for IPv4, it must have been years ago.
Tobias answered that he was currently teaching data networks and they have a lot of prefixes on the slides and the postdoc who had to revise the slides really, really hates him.
Jen commented that Tobias had said that you get less capability of traceroutes for IPv4. She said that if your routers do the right thing, you do not lose anything. You might lose some capabilities if you have multiple L3 links between two devices.
Tobias answered that she might be overestimating the number of IPv4 addresses in the test setup. He said there was no IPv4 on loopback.
Jen said she would need to think about this further.
Stefan Pantelmann, AVM, asked if Tobias had compared his approach to other existing protocols working with IPv4 and IPv6, let's say MAP-T or MAP-E?
Tobias answered that he hadn't made a comparison, and that this was not a protocol, it was just routing and forwarding packets. There is no state, there is no translating, it was just forwarding packets and was also not that relevant for client networks. This was more to get it to virtual machines and things that provide services.
Stefan said they had five or six different modes now in their routers that deal with whether the provider offers full dual stack, DS-Lite or minor form etc. They did not have this as of now and how could it be done.
Tobias said he hadn't looked at it. Access was the wrong side of the stack for him.
Joerg Jungermann (Northern Data AG) said he's been experimenting since 2019. He commented that it makes your network easier and he's happy to work in an environment where they have IPv6 as a first class citizen. They operate a cloud and having a greenfield deployment makes the network very easy to manage and to route IPv4 addresses to the clients.
Tobias thanked him and said that if someone was running an IX to please drop him an email. He is looking to access to the peering LAN, a little bit of backhaul and a small virtual machine and the IX members can play with this.
5. IPv4-mapped IPv6 Addresses
Ondřej Caletka, RIPE NCC
The presentation is available at:
https://ripe88.ripe.net/archives/video/1361/
Ondřej spoke about IPv4-mapped IPv6 addresses, which are used for IPv4 compatibility in IPv6 socket API. They are not meant to be used anywhere on the Internet but apparently some people are putting them into public DNS for cost saving reasons.
Maria Matejka, Bird / CZ.NIC, said that Ondřej should have used fax to contact the German company, they would take it seriously.
Ondřej thanked Maria for the comment.
Nico Braud-Santoni, Funkfeuer Graz, asked if DNS providers' authoritative or resolvers could alleviate the problem by providing A records as auxiliary data on AAAA queries, perhaps only in cases where no native IPv6 address is available.
Ondřej thought it might be possible.
Alexander Zubkov, Qrator Labs, said that the high cost for missing AAAA might be due to less caching time. One solution could be to implement an IPv6 service.
Ondrej answered that the best way to solve this was by implementing IPv6.
Jen said she agreed that it is necessary to provide clear guidance. She thought it should go in the Happy Eyeballs v3. There is a draft and has a section about broken AAAA records. The text is on GitHub.
Ondrej agreed that it was a good idea.
Tobias Fiebig, MPI-INF, said he recently got a lot of DNS data and asked if Ondrej wanted to know how bad it was. He could ask a student to run the data.
Ondrej answered that Tobias could share it with the IPv6 Working Group or DNS Working Group if it's about broken DNS.
Tobias said that he would look into it.
Oleksij Samorukov, NetArt Group, said that v6/v4 compatible is a bad idea as it could break layers in a strange way. He also said it would be interesting to run a global survey on some big DNS registry databases.
Ondrej answered that this was discussed in the IPv6 mailing list, as well as in an incident report from GitHub. They started preparing for the IPv6 rollout and they found the issue that IPv4-mapped IPv6 addresses started causing trouble for them.
Raymond Jetten, RIPE NCC Executive Board, said that Ondřej has a volunteer for deploying IPv6 at GitHub and that it's Jordi.
Blake Willis, Zayo Europe, commented that you will find that folks that may be running 6PE in their networks, meaning IPv6 with a labelled Unicast next hop which would be IPv4 Unicast BGP sessions. With JunOS, the router will synthesise one of these address with ::ffff: and the IPv4 loopback of the remote BGP network. Now the next hop is a label but it needs something to resolve the next hop. He didn't think that the actual packet has a IPv4-mapped next hop on the wire, but the address might be seen.
Ondřej answered that it's the same case as the host behaviour because you have a 128-bit field and you have to fill it somehow with a 32-bit number.
Philipp Tiesel, SAP, had two comments. He said he always considers these types of addresses as a IPv4 address so the behaviour is quite consistent to what he would have expected even if we should be putting this in AAAA records. He's asking if Ondrej tried to use it to force a DNS64 IPv6-only host to use the CLAT because this is what he would expect to work. He suggested to taking a macOS, take an AAAA record and see whether one can avoid DNS64 synthesis, and see whether that works.
Ondrej said he was not sure if he could follow the suggestiong but was open to trying it out.
Tom Hill (BT) asked whether the record DNSSEC was signed.
Ondrej answered that it was.
Tom Hill then asked if Ondřej was aware of NSEC. Not having a record if NSEC is enabled can cost you a lot of money potentially.
Ondrej then said that it was a good point, so maybe the charging scheme of the cloud DNS provider makes sense, but it doesn't make sense as people put wrong data in DNS.
Tom said he didn't have a good answer to that.
6. Thanks, Wrap Up and Rate the Talks
Working Group Chairs
The presentation is available at:
https://ripe88.ripe.net/archives/video/1362/
Raymond thanked the working group and reminded everyone to rate the talks.
The session was concluded.
Raymond Jetten
Senior Technology Specialist
Production
Cloud Services, Networks and connectivity
Interconnectivity & Content
Elisa Oyj
Vuolteenkatu 2
33100 Tampere
+358 45 6700 139
raymond.jetten(a)elisa.fi<mailto:raymond.jetten@elisa.fi>
www.elisa.fi<http://www.elisa.fi/>
Lisätietoa henkilötietojen käsittelystä ja tietosuojasta Elisalla https://elisa.fi/tietosuoja
Mer information om Elisas hantering av personuppgifter och dataskydd https://elisa.fi/tietosuoja
More information on personal data management and data protection at Elisa https://elisa.com/dataprotection
*********************************************************************************************
For Internal Use Only
3
2
09392430244
1
0
Dear IPv6-wg list members and RIPE community.
In response to our requests on the list to find a new co-chair we are glad to announce that we have 1 interested candidate:
Nico Schottelius
Jen Linkova, who has been one of the co-chairs of the IPv6 Working Group since RIPE 69
has announced she wishes to step down at the RIPE 88 meeting in Kraków, at the end of her term.
The deadline for candidates has now passed, so we are glad to welcome Nico to the IPv6-wg
He may send in his personal message to this list soon.
The change of co-chair will be done at the ripe 88 meeting in Krakow during our session.
Best regards,
The IPv6 WG chairs.
For Internal Use Only
4
3
Dear IPv6 working group,
we found some great presenters for our next IPv6 WG session in Krakow and
built an agenda. Our session will take place on Thursday 23 May 2024 from
11:00 - 12:30 CEST. The agenda will also be published in the RIPE88 meeting
plan [1] soon.
1. Welcome ([5 min]
* Opening and Welcome
* Approval of RIPE 87 Minutes
* Microphone Etiquette
2. Co-Chair-Change [10 min]
3. Operational issues discovered during IPv6-mostly migration [30 min incl. Q&A]
Jen Linkova
4. IPv4-with-IPv6 Next-Hop [20 min incl. Q&A]
Tobias Fiebig
5. IPv4-mapped IPv6 addresses [20 min incl. Q&A]
Ondřej Caletka
6. Thanks, Wrap Up and Rate the Talks [5 min]
If there are any changes to this agenda we will send an update and also update
the meeting plan on the website [1].
[1] https://ripe88.ripe.net/programme/meeting-plan/
On behalf of the IPv6 WG co-chairs,
Jen, Ray and Chris
1
0
Hello!
I want to share some experience and ask if other people here also
noticed that behavior.
I operate an IPv6 torrent client (qbittorrent/libtorrent) and I noticed
various things:
The client itself sometimes uses non-GUA source addresses when
connecting to GUA addresses in the default setting. When binding to the
GUA address only, it uses only them.
https://github.com/qbittorrent/qBittorrent/issues/19618
This seems to be not yet fixed.
I also notice a reasonable amount of incoming traffic with non-GUA
addresses like from 63ed:b73b::/32 or 485f:1207::/32, ac11:1::/32 etc.
This also shows that some ISPs don't seem to prohibit their
customers from sending such packages.
Does anybody here also experienced that?
Is there any monitoring at exchange points to find the source?
--
kind regards
Marco
Send unsolicited bulk mail to 1711396344muell(a)cartoonies.org
2
3
End of an era?
https://www.google.com/intl/en/ipv6/statistics.html has no data since Feb 25th. The (lack of) growth over the last 9 months is hardly encouraging either.
2
1
Dear IPv6 Working Group,
We are still looking for candidates to be a IPv6-WG co- chair.
Are you interested? Drop us (the current chairs) a mail. ipv6-wg-chair(a)ripe.net<mailto:ipv6-wg-chair@ripe.net>
Please do not send it to the list.
Or do you know anyone who could be suitable and interested?
Ask them to stand up and drop the co-chairs an email.
Below is a copy of the earlier request:
Jen Linkova, who has been one of the co-chairs of the IPv6 Working Group since RIPE 69
has announced she wishes to step down at the RIPE 88 meeting in Kraków, at the end of her term.
Thus, we have a call for candidates.
The term of a IPv6 WG co-chair is three years. A current co-chair may stand for
re-selection at the end of their term or may resign voluntarily at any time.
What is the IPv6 WG doing:
The working group activities may be anything useful in helping people to deploy IPv6,
and to manage IPv4/IPv6 co-existence. These activities include:
Outreach
Education
Sharing deployment experiences
Discussing and fixing operational issues
The co-chairs also prepare the program for the IPv6 WG session at the ripe meetings.
The working group will cooperate with operators and others, both inside and outside the
networking industry, to share resources and combine efforts.
The tasks and expectations of a WG co-chair are described here:
https://www.ripe.net/publications/docs/ripe-692
A WG co-chair must comply with the Code of Conduct:
https://www.ripe.net/publications/docs/ripe-766
If you feel you are interested in this or have any questions on this, you can drop the current
co-chairs a note ipv6-wg-chair at ripe.net
We kindly request you to respond at latest Friday 3-May-2024 midday CET (Amsterdam),
when the call for candidates will be closed.
After this we will announce the candidates on the list, and you can express your support or concerns.
However the official selection will take place at the RIPE 88 Meeting in Kraków during the IPv6 Working Group session.
On behalf of the IPv6 WG co-chairs,
Jen, Christian & Ray
RIPE IPv6 Working Group co-Chair
To the co Chairs: ipv6-wg-chair at ripe.netmailto:ipv6-wg-chair at ripe.net<mailto:ipv6-wg-chair%20at%20ripe.net>
To the mailing list: ipv6-wg at ripe.netmailto:ipv6-wg at ripe.net<mailto:ipv6-wg%20at%20ripe.net>
For Internal Use Only
1
0

27 Mar '24
>> united by Postbank/Deutsche Bank, new relic, ns1, ibm, fastly and others
To blame fastly wasn't right. That was my fault.
Thank you Job Snijders for clarification.
Regards,
Thomas
1
0
Dear IPv6 wg list members.
In about 2 months, we will meet in Krakow, and ofcourse online.
We still need presentations for the meeting, and we also need candidates to be our new collegue.
For both you can send us (the chairs) your either presentation proposals or let us know that you are interested in becoming an IPv6-wg co chair.
See our previous messages:
Hello All,
RIPE 88 will be held in Krakow, Poland from 20-24 May 2024, as well as online.
For any participation form you can register here:
https://ripe88.ripe.net/attend/register/
The IPv6 Working Group session is scheduled for Thursday 23 May from 11:00 . 12:30 (UTC+1)
We are looking for presentations - please email : ipv6-wg-chair (at) ripe.net if you'd like to present.
Please also state if you intend to be online or onsite, and the duration of your presentation, and a short description of it.
Once we have decided on the agenda, we'll contact the presenters closer to the meeting.
Hope to see as many of you as possible,
On behalf of the IPv6-WG
Christian, Jen, Ray
And the co-chair position:
Dear IPv6 Working Group,
Jen Linkova, who has been one of the co-chairs of the IPv6 Working Group since RIPE 69
has announced she wishes to step down at the RIPE 88 meeting in Kraków, at the end of her term.
Thus, we have a call for candidates.
The term of a IPv6 WG co-chair is three years. A current co-chair may stand for
re-selection at the end of their term or may resign voluntarily at any time.
What is the IPv6 WG doing:
The working group activities may be anything useful in helping people to deploy IPv6,
and to manage IPv4/IPv6 co-existence. These activities include:
Outreach
Education
Sharing deployment experiences
Discussing and fixing operational issues
The co-chairs also prepare the program for the IPv6 WG session at the ripe meetings.
The working group will cooperate with operators and others, both inside and outside the
networking industry, to share resources and combine efforts.
The tasks and expectations of a WG co-chair are described here:
https://www.ripe.net/publications/docs/ripe-692
A WG co-chair must comply with the Code of Conduct:
https://www.ripe.net/publications/docs/ripe-766
If you feel you are interested in this or have any questions on this, you can drop the current
co-chairs a note: ipv6-wg-chair at ripe.net
We kindly request you to respond at latest Friday 3-May-2024 midday CET (Amsterdam),
when the call for candidates will be closed.
After this we will announce the candidates on the list, and you can express your support or concerns.
However, the official selection will take place at the RIPE 88 Meeting in Kraków during the IPv6 Working Group session.
On behalf of the IPv6 WG co-chairs,
Christian, Jen, Raymond
RIPE IPv6 Working Group co-Chair
To the co Chairs: ipv6-wg-chair(a)ripe.net<mailto:ipv6-wg-chair@ripe.net>
To the mailing list: ipv6-wg(a)ripe.net<mailto:ipv6-wg@ripe.net>
For Internal Use Only
7
8
After my IPv6-mostly talk at RIPE88 plenary someone asked me: what
about Windows?
So, there is some light at the end of the tunnel:
https://techcommunity.microsoft.com/t5/networking-blog/windows-11-plans-to-…
--
Cheers, Jen Linkova
3
3
Michael Richardson <mcr(a)sandelman.ca> writes:
> Did you get any real feedback as to why they are hesistant though?
Not really. And most of the people there were already doing IPv6.
> I've heard that lack of widespread training is one oft cited reason, but at
> the same time, managers refuse to actually provide any training.
Training is one point, no time another. We still have IPv4 yet
another. I guess just reloading https://ipv6excuses.com/ a couple of
times will find an answer.
> > What if we put together an "advent of IPv6" just like
> > https://adventofcode.com/ or https://tryhackme.com/r/christmas
>
> He.net had a certification system:
> https://ipv6.he.net/certification/cert-main.php
I know. "Certification Level: Sage earned at 2011-12-17 02:56:52"
Jens
--
----------------------------------------------------------------------------
| Delbrueckstr. 41 | 12051 Berlin, Germany | +49-151-18721264 |
----------------------------------------------------------------------------
2
1