SMTP Server

nipr.ac.ir

Port: 25

Last updated: 3/18/2025, 9:16:29 AM

Security Score

C+

Mail Server

HELP Command Exposure

PASS

The 'HELP' command is disabled. This is a good security practice.

5.5.2 Error: command not recognized

The SMTP 'HELP' command allows users to request assistance from the mail server. If enabled, it may reveal information about the server, its software version, or available commands, which could be exploited by attackers.

Blacklist Status

PASS

The mail server is not listed on any known blacklists. No action is needed.

N/A

Mail servers often block messages from IP addresses that have been blacklisted due to sending spam or malicious emails. If your server's IP is blacklisted, your emails may be rejected, marked as spam, or never delivered.

EXPN Command Exposure

PASS

The 'EXPN' command is disabled. This prevents enumeration of mailing lists and improves security.

Status Code: 502 Response: 5.5.2 Error: command not recognized

The SMTP 'EXPN' (Expand) command allows users to retrieve the actual recipients of a mailing list or alias. Attackers can exploit this to gather valid email addresses for phishing or spam campaigns.

SMTP Authentication

ERROR

Could not complete this test due to connection issues

Unexpected EHLO response: (550, b'5.7.1 Your IP (171.22.24.215) is on the BitNinja server security greylist. This means that we experienced malicious attacks coming from your IP and placed it on our greylist due to security reasons. If you have taken the necessary steps to eliminate its source, you can delist this IP on (http://185.94.96.10:60412/spam_delist?hash=dda8f70cb46e8572cebfe9b878ff857a) You can only delist this IP a couple of times. It is good idea to warn your service provider about this incident.')

SMTP Authentication (SMTP AUTH) allows mail clients to authenticate with the mail server before sending emails. This enhances security by preventing unauthorized users from relaying mail through your server.

Email Spoofing Vulnerability

FAIL

The mail server may be vulnerable to email spoofing. Attackers can send fake emails appearing to come from your domain.

Spoofing may be possible in some cases.
DMARC policy is set to none (monitoring only)
SPF record has a soft fail (~all). Consider using -all

Email spoofing occurs when an attacker forges the 'From' field in an email header to impersonate a trusted sender. Without properly configured SPF and DMARC records, recipients may be tricked into believing a fake email is legitimate, increasing the risk of phishing and fraud.

Open Mail Relay

ERROR

Could not complete this test due to connection issues

Connection refused or timeout

An open mail relay allows anyone to send emails through your SMTP server without authentication. Spammers can exploit open relays to send bulk spam or phishing emails, which can result in blacklisting and service degradation.

VRFY Command Exposure

PASS

The 'VRFY' command is disabled. This prevents attackers from verifying valid email addresses.

VRFY info@nipr.ac.ir ==> Status:502 Response: 5.5.2 Error: command not recognized
VRFY admin@nipr.ac.ir ==> Status:502 Response: 5.5.2 Error: command not recognized
VRFY root@nipr.ac.ir ==> Status:502 Response: 5.5.2 Error: command not recognized
VRFY hostmaster@nipr.ac.ir ==> Status:502 Response: 5.5.2 Error: command not recognized
VRFY postmaster@nipr.ac.ir ==> Status:502 Response: 5.5.2 Error: command not recognized

The SMTP 'VRFY' (Verify) command checks if a specific email address exists on the server. If enabled, attackers can use it to confirm valid email addresses for spam or targeted attacks.

PTR (Reverse DNS) Record

PASS

All mail servers have valid reverse DNS (PTR) records. This improves email deliverability and trust.

mail.nipr.ac.ir ==> 185.94.96.10 ==> cl54.nocmails.info. ==> 185.94.96.10

A PTR (reverse DNS) record maps an IP address to a domain name. Many mail servers require a valid PTR record to accept emails, and its absence can cause emails to be rejected or marked as spam.

DMARC Email Security Policy

FAIL

DMARC record is missing or invalid. This may allow unauthorized senders to misuse your domain.

Weak policy (p=none): No enforcement. Returned Value : p=none.
Weak subdomain policy (sp=none): No enforcement for subdomains Returned Value : sp=none.
Raw DMARC record: v=DMARC1;p=none;sp=none;adkim=r;aspf=r;pct=100;fo=0;rf=afrf;ri=86400;rua=mailto:admin@nipr.ac.ir;ruf=mailto:admin@nipr.ac.ir

DMARC (Domain-based Message Authentication, Reporting & Conformance) protects against email spoofing and phishing by enforcing email authentication policies using SPF and DKIM.

SPF (Sender Policy Framework) Record

PASS

SPF record is correctly configured. This helps prevent email spoofing.

SPF record:
v=spf1 ip4:185.94.96.10 ip4:89.32.251.5 +mx +a +ip4:89.32.251.12 ~all

SPF is an email authentication method that specifies which mail servers are authorized to send emails on behalf of your domain. A properly configured SPF record helps prevent email spoofing and improves deliverability.