SMTP Server

giglab-team.ir

Port: 25

Last updated: 3/18/2025, 9:17:45 AM

Security Score

C-

Mail Server

HELP Command Exposure

FAIL

The 'HELP' command is enabled. This may expose unnecessary information about the mail server.

Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP

The SMTP 'HELP' command allows users to request assistance from the mail server. If enabled, it may reveal information about the server, its software version, or available commands, which could be exploited by attackers.

Blacklist Status

PASS

The mail server is not listed on any known blacklists. No action is needed.

N/A

Mail servers often block messages from IP addresses that have been blacklisted due to sending spam or malicious emails. If your server's IP is blacklisted, your emails may be rejected, marked as spam, or never delivered.

EXPN Command Exposure

PASS

The 'EXPN' command is disabled. This prevents enumeration of mailing lists and improves security.

Status Code: 554 Response: Too many nonmail commands

The SMTP 'EXPN' (Expand) command allows users to retrieve the actual recipients of a mailing list or alias. Attackers can exploit this to gather valid email addresses for phishing or spam campaigns.

SMTP Authentication

PASS

The mail server announces supported authentication methods. This helps ensure secure email transmission.

Server requires authentication after STARTTLS. Methods: PLAIN LOGIN

SMTP Authentication (SMTP AUTH) allows mail clients to authenticate with the mail server before sending emails. This enhances security by preventing unauthorized users from relaying mail through your server.

Email Spoofing Vulnerability

FAIL

The mail server may be vulnerable to email spoofing. Attackers can send fake emails appearing to come from your domain.

Spoofing may be possible in some cases.
DMARC policy is set to quarantine
SPF record missing

Email spoofing occurs when an attacker forges the 'From' field in an email header to impersonate a trusted sender. Without properly configured SPF and DMARC records, recipients may be tricked into believing a fake email is legitimate, increasing the risk of phishing and fraud.

Open Mail Relay

PASS

The mail server does not appear to be vulnerable to open relay. This prevents unauthorized users from sending emails through your server.

Server correctly refused to relay

An open mail relay allows anyone to send emails through your SMTP server without authentication. Spammers can exploit open relays to send bulk spam or phishing emails, which can result in blacklisting and service degradation.

VRFY Command Exposure

PASS

The 'VRFY' command is disabled. This prevents attackers from verifying valid email addresses.

VRFY info@giglab-team.ir ==> Status:252 Response: Administrative prohibition
VRFY admin@giglab-team.ir ==> Status:252 Response: Administrative prohibition
VRFY root@giglab-team.ir ==> Status:252 Response: Administrative prohibition
VRFY hostmaster@giglab-team.ir ==> Status:252 Response: Administrative prohibition
VRFY postmaster@giglab-team.ir ==> Status:252 Response: Administrative prohibition

The SMTP 'VRFY' (Verify) command checks if a specific email address exists on the server. If enabled, attackers can use it to confirm valid email addresses for spam or targeted attacks.

PTR (Reverse DNS) Record

FAIL

Some mail servers have incorrect or missing reverse DNS (PTR) records. This may cause emails to be marked as spam.

mail.giglab-team.ir ==> 185.79.158.129 ==> ? ==> ?

A PTR (reverse DNS) record maps an IP address to a domain name. Many mail servers require a valid PTR record to accept emails, and its absence can cause emails to be rejected or marked as spam.

DMARC Email Security Policy

FAIL

DMARC record is missing or invalid. This may allow unauthorized senders to misuse your domain.

Missing required rua tag.
Missing required ruf tag.
Warning: rua tag (destination for aggregate reports) not found
Raw DMARC record: v=DMARC1; p=quarantine; pct=100

DMARC (Domain-based Message Authentication, Reporting & Conformance) protects against email spoofing and phishing by enforcing email authentication policies using SPF and DKIM.

SPF (Sender Policy Framework) Record

ERROR

Could not complete this test due to connection issues

Unable to resolve nameservers for the domain

SPF is an email authentication method that specifies which mail servers are authorized to send emails on behalf of your domain. A properly configured SPF record helps prevent email spoofing and improves deliverability.