SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
How To Breakdown, Analyze and
Understand SMTP Codes
Analyzing and understanding SMTP codes is not something that we need to do on a daily basis but when IT
administrators encounter smtp error codes due to emails that were sent through their corporate infrastructure,
they need to know what these email error codes mean as well as how to address them.
You’re getting phone calls from company employees stating that they are having problems sending emails to a
particular domain. Upon investigating the issue, you discover that your email server is receiving bounce backs
containing a three digit smtp error code with a cryptic message explaining the issue, be it custom or generic.
The bounce back you received is part of the SMTP protocol (RFC 821 and 2821) that the sending and
receiving servers use to talk between themselves. Depending on the hosting server, setup will notify the sender
of the status of the delivery.
Every time you send an email through your email provider, the mail server returns a SMTP code. Each code
consists of three numbers. The last number provides even more specific error information and gives you more
details about the mail status of the message.
The Meaning of SMTP status codes
The first number tells you if the receiving server has accepted the command sent by your email provider and if
it was able to process it. The numbers range from 1 to 5.
 1: The server has accepted the command, but does not yet take action. (Not currently used)
 2: The server has completed the task successfully.
 3: The server has understood the request, but needs additional information to complete.
 4: The server has encountered a temporary failure. Mail servers can use such temporary failures to
keep untrusted senders or spammers away. (Soft bounce)
 5: The server has encountered an error. (Hard Bounce)
The second number provides more information about the smtp error code. Those numbers range from
0 to 5.
 0: A syntax error has occurred.
 1: Indicates an informational reply, to a HELP request for example.
 2: Refers to the connection status.
 3 not implemented
 4 not implemented
 5: Refers to the status of the mail system as a whole and the mail server in particular.
The last number provides even more specific error information and gives you more detail about the mail status
of the message. For a more in-depth explanation, refer to the RFC 821 and later revisions thereof.
SMTP Codes that start with 2 or 3 are typically general error codes.
SMTP Codes with 4 as the first number indicate that there is a temporary error, but the server will try to
deliver the message at a later time. This is also known as a soft bounce.
SMTP Codes beginning with 5 indicate a permanent fatal error and the system will not try to deliver the
message to the recipient. This is also known as a hard bounce. The list below includes some common SMTP
errors.
The Most Common SMTP Codes
 220 – SMTP service ready
 221 – Service closing
 250 – Requested action taken and completed. The error has been resolved and the message sent.
 251 – The recipient is not local to the server, but the server will accept and forward the message.
 252 – The recipient cannot be VRFYed (verified), but the server accepts the message and attempts the
delivery.
 421 – The service is not available and the connection will be closed.
 450 – The requested command failed because the user’s mailbox was unavailable. Try again later.
 451 – The command has been aborted due to an error from the recipient’s server.
 452 – The command has been aborted because the server has insufficient system storage.
 500 – The server could not recognize the command due to a syntax error.
 501 – A syntax error was encountered in command arguments.
 502 – This command is not implemented.
 503 – The server has encountered a bad sequence of commands.
 504 – A command parameter is not implemented.
 550 – The requested command failed because the user’s mailbox was unavailable.
 551 – The recipient is not local to the server.
 552 – The action was aborted due to exceeded storage allocation.
 553 – The command was aborted because the mailbox name is invalid.
 554 – The transaction failed for some unstated reason.
Watch this YouTube video from Mimecast to get more details on SMTP Codes and error notifications.
If the YouTube video does not show up when you clicked on the image above, you can find it at
http://www.youtube.com/watch?v=JfX2WZU_DiY
To read this blog post on the Vircom Corporate Email Security Blog, go to
http://www.vircom.com/security/
Learn more about ModusGate, Anti-Spam & Email Security Gateway for Microsoft Exchange, an award
winning corporate anti-spam solution with 99.7% anti-spam catch rate. Visit us now at
http://www.vircom.com/en/products/modusgate-exchange-anti-spam/

Contenu connexe

En vedette

Where the most popular Youtube stars are today
Where the most popular Youtube stars are todayWhere the most popular Youtube stars are today
Where the most popular Youtube stars are todaySimply Zesty Ltd
 
Мобильные решения компании Complex Systems
Мобильные решения компании Complex SystemsМобильные решения компании Complex Systems
Мобильные решения компании Complex SystemsComplex Systems
 
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin developmentZarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin developmentZarafa
 
Dynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billingDynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billingDynasoft Limited
 
What Lies Ahead
What Lies AheadWhat Lies Ahead
What Lies AheadMoboom
 
Dynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking
 
Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010GroveSite
 
Stop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyStop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyConceptShare
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 
8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRM8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRMEnbu Consulting
 

En vedette (14)

Where the most popular Youtube stars are today
Where the most popular Youtube stars are todayWhere the most popular Youtube stars are today
Where the most popular Youtube stars are today
 
How to Hire a PR Firm
How to Hire a PR FirmHow to Hire a PR Firm
How to Hire a PR Firm
 
Мобильные решения компании Complex Systems
Мобильные решения компании Complex SystemsМобильные решения компании Complex Systems
Мобильные решения компании Complex Systems
 
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin developmentZarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
Zarafa SummerCamp 2012 - Basic Introduction WebApp plugin development
 
Dynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billingDynasoft TeleFactura Telecom billing
Dynasoft TeleFactura Telecom billing
 
What Lies Ahead
What Lies AheadWhat Lies Ahead
What Lies Ahead
 
Dynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking For Franchises
Dynamic Benchmarking For Franchises
 
Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010Web 2.0 and the world of global collaboration v2010
Web 2.0 and the world of global collaboration v2010
 
Stop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyStop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistency
 
09 Ny Brochure
09 Ny Brochure09 Ny Brochure
09 Ny Brochure
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
Presenting John Loder
Presenting John LoderPresenting John Loder
Presenting John Loder
 
Taming the video monster
Taming the video monsterTaming the video monster
Taming the video monster
 
8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRM8 Reason You Need Mobile CRM
8 Reason You Need Mobile CRM
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

How to breakdown, analyze and understand smtp codes

  • 1. How To Breakdown, Analyze and Understand SMTP Codes Analyzing and understanding SMTP codes is not something that we need to do on a daily basis but when IT administrators encounter smtp error codes due to emails that were sent through their corporate infrastructure, they need to know what these email error codes mean as well as how to address them. You’re getting phone calls from company employees stating that they are having problems sending emails to a particular domain. Upon investigating the issue, you discover that your email server is receiving bounce backs containing a three digit smtp error code with a cryptic message explaining the issue, be it custom or generic. The bounce back you received is part of the SMTP protocol (RFC 821 and 2821) that the sending and receiving servers use to talk between themselves. Depending on the hosting server, setup will notify the sender of the status of the delivery. Every time you send an email through your email provider, the mail server returns a SMTP code. Each code consists of three numbers. The last number provides even more specific error information and gives you more details about the mail status of the message. The Meaning of SMTP status codes The first number tells you if the receiving server has accepted the command sent by your email provider and if it was able to process it. The numbers range from 1 to 5.  1: The server has accepted the command, but does not yet take action. (Not currently used)  2: The server has completed the task successfully.  3: The server has understood the request, but needs additional information to complete.  4: The server has encountered a temporary failure. Mail servers can use such temporary failures to keep untrusted senders or spammers away. (Soft bounce)  5: The server has encountered an error. (Hard Bounce) The second number provides more information about the smtp error code. Those numbers range from 0 to 5.  0: A syntax error has occurred.  1: Indicates an informational reply, to a HELP request for example.  2: Refers to the connection status.  3 not implemented  4 not implemented  5: Refers to the status of the mail system as a whole and the mail server in particular.
  • 2. The last number provides even more specific error information and gives you more detail about the mail status of the message. For a more in-depth explanation, refer to the RFC 821 and later revisions thereof. SMTP Codes that start with 2 or 3 are typically general error codes. SMTP Codes with 4 as the first number indicate that there is a temporary error, but the server will try to deliver the message at a later time. This is also known as a soft bounce. SMTP Codes beginning with 5 indicate a permanent fatal error and the system will not try to deliver the message to the recipient. This is also known as a hard bounce. The list below includes some common SMTP errors. The Most Common SMTP Codes  220 – SMTP service ready  221 – Service closing  250 – Requested action taken and completed. The error has been resolved and the message sent.  251 – The recipient is not local to the server, but the server will accept and forward the message.  252 – The recipient cannot be VRFYed (verified), but the server accepts the message and attempts the delivery.  421 – The service is not available and the connection will be closed.  450 – The requested command failed because the user’s mailbox was unavailable. Try again later.  451 – The command has been aborted due to an error from the recipient’s server.  452 – The command has been aborted because the server has insufficient system storage.  500 – The server could not recognize the command due to a syntax error.  501 – A syntax error was encountered in command arguments.  502 – This command is not implemented.  503 – The server has encountered a bad sequence of commands.  504 – A command parameter is not implemented.  550 – The requested command failed because the user’s mailbox was unavailable.  551 – The recipient is not local to the server.  552 – The action was aborted due to exceeded storage allocation.  553 – The command was aborted because the mailbox name is invalid.  554 – The transaction failed for some unstated reason.
  • 3. Watch this YouTube video from Mimecast to get more details on SMTP Codes and error notifications. If the YouTube video does not show up when you clicked on the image above, you can find it at http://www.youtube.com/watch?v=JfX2WZU_DiY To read this blog post on the Vircom Corporate Email Security Blog, go to http://www.vircom.com/security/
  • 4. Learn more about ModusGate, Anti-Spam & Email Security Gateway for Microsoft Exchange, an award winning corporate anti-spam solution with 99.7% anti-spam catch rate. Visit us now at http://www.vircom.com/en/products/modusgate-exchange-anti-spam/