Email Security Report
Back to summary report
Company: Example, Inc.
B
Good
Scan Date: October 05, 2017
Description: Potential email servers and SMTP misconfigurations like open relay, unauthenticated logins, restricted relay, and SMTP 'Verify’ vulnerabilities are collected from the online services like MxToolbox and eMailSecurityGrader.
This report category has 6% effect on total scan score.

Email Security and SMTP Findings Overview

# Asset # of Finding(s)
Passed Info Warning Failed
204306 example.com 11 2 4 0
204400 example.org 10 3 4 0

Email Security and SMTP Findings for example.com (17)

ID Finding Status
2536392

SMTP MX Connection Test Port 465 (SMTP/S)

MX servers  port 465 connection failed :
smtp1.company.example.com PORT 465 CONNECTION FAILED
Warning
2536400

SMTP DMARC Record

According to RFC 7489, DMARC recording is a record that determines how emails with authentication failures, such as SPF and / or DKIM, will be processed and how users will be informed.
DMARC Record Not Found

References

Warning
2536401

SMTP DKIM Record

DKIM is an e-mail authentication method. This method is used to determine whether the sent mail is actually sent in the corresponding address.
DKIM Record Not Found
Warning
2536393

SMTP MX Connection Test Port 587 (SMTP Submission)

MX servers  port 587 connection failed:
smtp1.company.example.com PORT 587 CONNECTION FAILED
Warning
2536390

SMTP MX Connection Test Port 25

If port 25 is blocked on the MX server, the server can not receive incoming messages.
MX servers port 25 connection successfully:
smtp1.company.example.com PORT 25 CONNECTION OK
Passed
2536391

SMTP Connection Time

Good on Connection time mx servers
Passed
2536394

SMTP Reverse DNS Test

Mail servers usually perform reverse lookups to verify the sender. If validation fails, communication on the sending server can be blocked.
MX PTR record found. Reverse DNS Test success:
192.168.86.220<<<>>>smtp1.company.example.com
Passed
2536395

SMTP Valid Hostname

Reverse DNS(PTR Record) is a valid Hostname 
Passed
2536396

SMTP Mx Servers Have Public IP Addresses

Mx servers ip's public:
smtp1.company.example.com(192.168.86.220) PUBLIC
Passed
2536397

SMTP Mx Server DNS Blacklist(SPAM) Check

Any mail server in the black list is blocked by the servers subscribed to your DNSBL.
Your MX servers were not found on any spam list:
ResultMX Server / IPDNSBL Server
smtp1.company.example.com
192.168.86.220
zen.spamhaus.org
smtp1.company.example.com
192.168.86.220
spam.abuse.ch
smtp1.company.example.com
192.168.86.220
cbl.abuseat.org
smtp1.company.example.com
192.168.86.220
virbl.dnsbl.bit.nl
smtp1.company.example.com
192.168.86.220
dnsbl.inps.de
smtp1.company.example.com
192.168.86.220
ix.dnsbl.manitu.net
smtp1.company.example.com
192.168.86.220
dnsbl.sorbs.net
smtp1.company.example.com
192.168.86.220
bl.spamcannibal.org
smtp1.company.example.com
192.168.86.220
bl.spamcop.net
smtp1.company.example.com
192.168.86.220
xbl.spamhaus.org
smtp1.company.example.com
192.168.86.220
pbl.spamhaus.org
smtp1.company.example.com
192.168.86.220
dnsbl-1.uceprotect.net
smtp1.company.example.com
192.168.86.220
dnsbl-2.uceprotect.net
smtp1.company.example.com
192.168.86.220
dnsbl-3.uceprotect.net
smtp1.company.example.com
192.168.86.220
db.wpbl.info
smtp1.company.example.com
192.168.86.220
hostkarma.junkemailfilter.com
smtp1.company.example.com
192.168.86.220
b.barracudacentral.org
smtp1.company.example.com
192.168.86.220
bl.emailbasura.org
smtp1.company.example.com
192.168.86.220
cdl.anti-spam.org.cn
smtp1.company.example.com
192.168.86.220
phishing.rbl.msrbl.net
smtp1.company.example.com
192.168.86.220
spam.rbl.msrbl.net
smtp1.company.example.com
192.168.86.220
spamlist.or.kr
smtp1.company.example.com
192.168.86.220
spamrbl.imp.ch
smtp1.company.example.com
192.168.86.220
spam.spamrats.com
smtp1.company.example.com
192.168.86.220
smtp.dnsbl.sorbs.net
smtp1.company.example.com
192.168.86.220
sbl.spamhaus.org
smtp1.company.example.com
192.168.86.220
relays.nether.net
smtp1.company.example.com
192.168.86.220
relays.bl.gweep.ca
smtp1.company.example.com
192.168.86.220
noptr.spamrats.com
smtp1.company.example.com
192.168.86.220
dyna.spamrats.com
smtp1.company.example.com
192.168.86.220
mail-abuse.blacklist.jippg.org
smtp1.company.example.com
192.168.86.220
spamsources.fabel.dk
smtp1.company.example.com
192.168.86.220
bl.mailspike.net
smtp1.company.example.com
192.168.86.220
dnsbl.justspam.org
smtp1.company.example.com
192.168.86.220
recent.spam.dnsbl.sorbs.net
smtp1.company.example.com
192.168.86.220
spam.dnsbl.anonmails.de
smtp1.company.example.com
192.168.86.220
sbl-xbl.spamhaus.org
smtp1.company.example.com
192.168.86.220
korea.services.net
smtp1.company.example.com
192.168.86.220
relays.bl.kundenserver.de
smtp1.company.example.com
192.168.86.220
ubl.unsubscore.com
smtp1.company.example.com
192.168.86.220
torserver.tor.dnsbl.sectoor.de
smtp1.company.example.com
192.168.86.220
blacklist.woody.ch
smtp1.company.example.com
192.168.86.220
cbl.anti-spam.org.cn
smtp1.company.example.com
192.168.86.220
cblless.anti-spam.org.cn
smtp1.company.example.com
192.168.86.220
cblplus.anti-spam.org.cn
smtp1.company.example.com
192.168.86.220
bl.spameatingmonkey.net
smtp1.company.example.com
192.168.86.220
bsb.spamlookup.net
smtp1.company.example.com
192.168.86.220
spam.pedantic.org
smtp1.company.example.com
192.168.86.220
all.spamrats.com
smtp1.company.example.com
192.168.86.220
access.redhawk.org
Passed
2536398

SMTP SPF Record

The SPF record is a validation mechanism that checks whether the sender is authorized to send mail for this domain with a DNS record type. Mail servers use this mechanism with the purpose of preventing Spam mails.
SPF Record found:
v=spf1 a:mail1.company.example.com a:mail2.company.example.com a:mail3.company.example.com a:mail4.company.example.com a:mail5.company.example.com ip4:198.177.17.224/30 -all.
Passed
2536399

SMTP SPF Validation Test

The SPF record is a validation mechanism that checks whether the sender is authorized to send mail for this domain with a DNS record type. Mail servers use this mechanism with the purpose of preventing Spam mails.
SMTP SPF Validation Test Result:
SPF Record (v=spf1 a:mail1.company.example.com a:mail2.company.example.com a:mail3.company.example.com a:mail4.company.example.com a:mail5.company.example.com ip4:198.177.17.224/30 -all) valid. The explanation returned was, SPF fail - not authorized
Passed
2536402

SMTP Relay Tests

If the mail server allows messages to be sent to untrusted locations, it is considered an open relay and is exploited by spam senders. So it can be taken on the black list.
MX: smtp1.company.example.com TESTS
ResultTest NameFrom / To
Standart RelayFrom: querpknrwn@yopmail.com
To: wwyqjcgdqi@yopmail.com
Send itself infoFrom: info@example.com
To: info@example.com
Send itself testFrom: test@example.com
To: test@example.com
Restricted relay from info to testFrom: info@example.com
To: test@example.com
Restricted relay from test to infoFrom: test@example.com
To: info@example.com
Senders domain is localhostFrom: info@localhost
To: info@example.com
Senders domain is localhostFrom: info@localhost
To: test@example.com
Sender address without domain (a local user)From: info
To: info@example.com
Sender address without domain (a local user)From: info
To: test@example.com
Sender address using literal domain address (of local host)From: info@8.8.8.8
To: info@example.com
Sender address using literal domain address (of local host)From: info@8.8.8.8
To: test@example.com
Passed
2536403

SMTP Plain Text Authentication Test

Spam senders potentially can break accounts of users by collecting passwords sent to the server in clear text via PLAIN or AUTH LOGIN mechanisms.
Your MX(s) does not supports plain text AUTH
Passed
2536404

SMTP POP3/POP3(SSL) Connection Test

If neither port is found, it is assumed that your POP3/POP3(SSL) server is either configured separately from the mail exchange (SMTP) server or the port is closed to external access, and thus this test is ignored
POP3/POP3(S) Connection Test Result:
smtp1.company.example.com PORT 110(STANDART POP) CONNECTION FAILED
smtp1.company.example.com PORT 995(POP SSL) CONNECTION FAILED
Info
2536405

SMTP IMAP/IMAP(SSL) Connection Test

If neither port is found, it is assumed that your IMAP/IMAP(SSL) server is either configured separately from the mail exchange (SMTP) server or the port is closed to external access, and thus this test is ignored
IMAP/IMAP(SSL) Connection Test Result:
smtp1.company.example.com PORT 143(STANDART IMAP) CONNECTION FAILED
smtp1.company.example.com PORT 993(IMAP SSL) CONNECTION FAILED
Info
2536406

SMTP Webmail HTTPS Control

Webmail uses https.
Passed


Email Security and SMTP Findings for example.org (17)

ID Finding Status
2537546

SMTP MX Connection Test Port 25 Medium

If port 25 is blocked on the MX server, the server can not receive incoming messages.
MX servers  port 25 connection failed:
mail.example.org PORT 25 CONNECTION FAILED
Warning
2537556

SMTP DMARC Record

According to RFC 7489, DMARC recording is a record that determines how emails with authentication failures, such as SPF and / or DKIM, will be processed and how users will be informed.
DMARC Record Not Found

References

Warning
2537557

SMTP DKIM Record

DKIM is an e-mail authentication method. This method is used to determine whether the sent mail is actually sent in the corresponding address.
DKIM Record Not Found
Warning
2537549

SMTP MX Connection Test Port 587 (SMTP Submission)

MX servers  port 587 connection failed:
mail.example.org PORT 587 CONNECTION FAILED
Warning
2537547

SMTP Connection Time

Poor on Connection time
Info
2537548

SMTP MX Connection Test Port 465 (SMTP/S)

MX servers  port 465 connection successfully:
mail.example.org PORT 465 CONNECTION OK
Passed
2537550

SMTP Reverse DNS Test

Mail servers usually perform reverse lookups to verify the sender. If validation fails, communication on the sending server can be blocked.
MX PTR record found. Reverse DNS Test success:
10.165.60.71<<<>>>ip-160-153-60-71.ip.secureserver.net
Passed
2537551

SMTP Valid Hostname

Reverse DNS(PTR Record) is a valid Hostname 
Passed
2537552

SMTP Mx Servers Have Public IP Addresses

Mx servers ip's public:
mail.example.org(10.165.60.71) PUBLIC
Passed
2537553

SMTP Mx Server DNS Blacklist(SPAM) Check

Any mail server in the black list is blocked by the servers subscribed to your DNSBL.
Your MX servers were not found on any spam list:
ResultMX Server / IPDNSBL Server
mail.example.org
10.165.60.71
zen.spamhaus.org
mail.example.org
10.165.60.71
spam.abuse.ch
mail.example.org
10.165.60.71
cbl.abuseat.org
mail.example.org
10.165.60.71
virbl.dnsbl.bit.nl
mail.example.org
10.165.60.71
dnsbl.inps.de
mail.example.org
10.165.60.71
ix.dnsbl.manitu.net
mail.example.org
10.165.60.71
dnsbl.sorbs.net
mail.example.org
10.165.60.71
bl.spamcannibal.org
mail.example.org
10.165.60.71
bl.spamcop.net
mail.example.org
10.165.60.71
xbl.spamhaus.org
mail.example.org
10.165.60.71
pbl.spamhaus.org
mail.example.org
10.165.60.71
dnsbl-1.uceprotect.net
mail.example.org
10.165.60.71
dnsbl-2.uceprotect.net
mail.example.org
10.165.60.71
dnsbl-3.uceprotect.net
mail.example.org
10.165.60.71
db.wpbl.info
mail.example.org
10.165.60.71
hostkarma.junkemailfilter.com
mail.example.org
10.165.60.71
b.barracudacentral.org
mail.example.org
10.165.60.71
bl.emailbasura.org
mail.example.org
10.165.60.71
cdl.anti-spam.org.cn
mail.example.org
10.165.60.71
phishing.rbl.msrbl.net
mail.example.org
10.165.60.71
spam.rbl.msrbl.net
mail.example.org
10.165.60.71
spamlist.or.kr
mail.example.org
10.165.60.71
spamrbl.imp.ch
mail.example.org
10.165.60.71
spam.spamrats.com
mail.example.org
10.165.60.71
smtp.dnsbl.sorbs.net
mail.example.org
10.165.60.71
sbl.spamhaus.org
mail.example.org
10.165.60.71
relays.nether.net
mail.example.org
10.165.60.71
relays.bl.gweep.ca
mail.example.org
10.165.60.71
noptr.spamrats.com
mail.example.org
10.165.60.71
dyna.spamrats.com
mail.example.org
10.165.60.71
mail-abuse.blacklist.jippg.org
mail.example.org
10.165.60.71
spamsources.fabel.dk
mail.example.org
10.165.60.71
bl.mailspike.net
mail.example.org
10.165.60.71
dnsbl.justspam.org
mail.example.org
10.165.60.71
recent.spam.dnsbl.sorbs.net
mail.example.org
10.165.60.71
spam.dnsbl.anonmails.de
mail.example.org
10.165.60.71
sbl-xbl.spamhaus.org
mail.example.org
10.165.60.71
korea.services.net
mail.example.org
10.165.60.71
relays.bl.kundenserver.de
mail.example.org
10.165.60.71
ubl.unsubscore.com
mail.example.org
10.165.60.71
torserver.tor.dnsbl.sectoor.de
mail.example.org
10.165.60.71
blacklist.woody.ch
mail.example.org
10.165.60.71
cbl.anti-spam.org.cn
mail.example.org
10.165.60.71
cblless.anti-spam.org.cn
mail.example.org
10.165.60.71
cblplus.anti-spam.org.cn
mail.example.org
10.165.60.71
bl.spameatingmonkey.net
mail.example.org
10.165.60.71
bsb.spamlookup.net
mail.example.org
10.165.60.71
spam.pedantic.org
mail.example.org
10.165.60.71
all.spamrats.com
mail.example.org
10.165.60.71
access.redhawk.org
Passed
2537554

SMTP SPF Record

The SPF record is a validation mechanism that checks whether the sender is authorized to send mail for this domain with a DNS record type. Mail servers use this mechanism with the purpose of preventing Spam mails.
SPF Record found:
v=spf1 a mx ptr include:secureserver.net ~all.
Passed
2537555

SMTP SPF Validation Test

The SPF record is a validation mechanism that checks whether the sender is authorized to send mail for this domain with a DNS record type. Mail servers use this mechanism with the purpose of preventing Spam mails.
SMTP SPF Validation Test Result:
SPF Record (v=spf1 a mx ptr include:secureserver.net ~all) valid. The explanation returned was, domain owner discourages use of this host
Passed
2537558

SMTP Relay Tests

If the mail server allows messages to be sent to untrusted locations, it is considered an open relay and is exploited by spam senders. So it can be taken on the black list.
MX: mail.example.org TESTS
ResultTest NameFrom / To
Standart RelayFrom: querpknrwn@yopmail.com
To: wwyqjcgdqi@yopmail.com
Send itself infoFrom: info@example.org
To: info@example.org
Send itself testFrom: test@example.org
To: test@example.org
Restricted relay from info to testFrom: info@example.org
To: test@example.org
Restricted relay from test to infoFrom: test@example.org
To: info@example.org
Senders domain is localhostFrom: info@localhost
To: info@example.org
Senders domain is localhostFrom: info@localhost
To: test@example.org
Sender address without domain (a local user)From: info
To: info@example.org
Sender address without domain (a local user)From: info
To: test@example.org
Sender address using literal domain address (of local host)From: info@8.8.8.8
To: info@example.org
Sender address using literal domain address (of local host)From: info@8.8.8.8
To: test@example.org
Passed
2537559

SMTP Plain Text Authentication Test

Spam senders potentially can break accounts of users by collecting passwords sent to the server in clear text via PLAIN or AUTH LOGIN mechanisms.
Your MX(s) does not supports plain text AUTH
Passed
2537560

SMTP POP3/POP3(SSL) Connection Test

If neither port is found, it is assumed that your POP3/POP3(SSL) server is either configured separately from the mail exchange (SMTP) server or the port is closed to external access, and thus this test is ignored
POP3/POP3(S) Connection Test Result:
mail.example.org PORT 110(STANDART POP) CONNECTION OK
mail.example.org PORT 995(POP SSL) CONNECTION OK
Info
2537561

SMTP IMAP/IMAP(SSL) Connection Test

If neither port is found, it is assumed that your IMAP/IMAP(SSL) server is either configured separately from the mail exchange (SMTP) server or the port is closed to external access, and thus this test is ignored
IMAP/IMAP(SSL) Connection Test Result:
mail.example.org PORT 143(STANDART IMAP) CONNECTION OK
mail.example.org PORT 993(IMAP SSL) CONNECTION OK
Info
2537562

SMTP Webmail HTTPS Control

Webmail uses https.
Passed


Scroll to top