Results for s6005b748@go.scanmy.email
General email informations
Sent at | 2020-05-09 13:47:08 |
Received at | 2020-05-09 13:47:08 UTC (0 seconds) |
SMTP server IP | 10.11.12.13 |
SMTP Reverse DNS (PTR) | p12o13.example.com |
EHLO | Ok p12o13.example.com |
SMTP client protocol | Ok Email received using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (recommended) |
SMTP FROM | ushfhgsrth235vfsrthsrth@bounce.example.com |
Header FROM | Simon <simon@example.com> |
Subject | My beautiful test |
Content |
IP informations
Sending IP | 10.11.12.13 | ||||||||||||||||||||||||||||||||||
ISP owner | Example SAS | ||||||||||||||||||||||||||||||||||
Usage type | Data Center/Web Hosting/Transit | ||||||||||||||||||||||||||||||||||
Country | France | ||||||||||||||||||||||||||||||||||
Senderscore | 94 Good ! More infos about Senderscore | ||||||||||||||||||||||||||||||||||
AbuseIPDB score | 4 Good ! More infos about AbuseIPDB | ||||||||||||||||||||||||||||||||||
Blacklisted on |
1 impacting blacklists for 10.11.12.13
|
Authentication results
SPF test | pass for bounce.example.com using 10.11.12.13 (sender SPF authorizedusing mechanism "include:spf.example.com") | ||||||||
DKIM test |
pass Signed by : dkim-esp.com using sha256 algorithm and a 1024 bits RSA key size |
||||||||
DMARC test |
pass
|
||||||||
BIMI display | No BIMI record found, you may be interested by that new technology to display your logo in front of your emails received. (More infos about BIMI) |
Header domains alignment
Header From domain example.com is aligned with bounce.example.com SMTP FROM domain |
Header From domain example.com is aligned with p12o13.example.com PTR domain (reverse DNS of sending IP) |
Header From domain example.com is not aligned with dkim-esp.com domain(s) used to DKIM sign |
SMTP FROM domain bounce.example.com is not aligned with dkim-esp.com domain(s) used to DKIM sign |
Google/Yahoo new bulk senders policy
DMARC test & alignment | pass |
DMARC policy | pass |
Easy unsubscribe | not tested |
DNS configurations
SPF |
validDNS lookups: 7
bounce.example.com SPF record: "v=spf1 include:spf.example.com include:_spf.google.com include:aspmx.pardot.com -all"
|
DMARC |
invalid dmarc.example.tech does not indicate that it accepts DMARC reports about example.com - Authorization record not found: example.com._report._dmarc.dmarc.example.tech IN TXT "v=DMARC1"
DMARC location: "example.com"
DMARC record: "v=DMARC1; p=reject; sp=reject; pct=100; fo=1; adkim=r; aspf=r; rua=mailto:dmarc@example.com,mailto:example@dmarc.example.tech; ruf=mailto:dmarc@example.com,mailto:example@dmarc.example.tech" |
DKIM configuration | dkim-esp.com is using a 1024bits RSA key, which starts to be considered weak (but not vulnerable, a 1024bits key is still safe), you should consider moving to a 2048bits key if technically possible: https://tools.ietf.org/html/rfc8301#section-3.2 |
DNSSEC | DNSSEC protocol is not activated on example.com, more infos on https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en |
Content analysis
Rspamd v3.0 |
some issues found5.79 / 15
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Spamassassin v3.4.2 Vanilla installation |
good0.9 / 5
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Domains |
4 domain(s) extracted
4 issue(s) found
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Tracking |
13 unique external resources
9 cookies or ETags
Etag and Cookies can be negatively seen, as user tracking inside a mail
|