Did DNS Propagate?

If you have multiple DNS servers, one of your biggest concerns is probably the propagation of changes across your pool of servers.  Once you make a change, add a record or remove a record is that record getting updated on all your servers?  Are you serving up the same records or is one server out of sync?   Are your registrar’s servers syncing your changes?

MxToolbox's DNS Propagation tool, available in Classic and Professional interfaces

MxToolbox’s DNS Propagation tool, available in Classic and Professional interfaces

MxToolbox is happy to announce our new DNS Propagation tool.  Our tool checks all of your DNS servers simultaneously when you lookup a record, compares the Start of Authority record to all servers and highlights the server(s) that are different.  In one lookup, you can view the propagation of your records across your entire DNS pool.


A well-timed search for Google.com’s A record shows them in the process of propagation across servers.

Are your emails deliverable?

One of the biggest concerns in email marketing and online commerce is the deliverability of email.  Can you do business if the email server at your target customers refuses to accept your email?

There are many types of email deliverability rankings, some focus on marketing deliverability to specific customers, bulk email services or even online management of email reputation.  MxToolbox focuses on the fundamental questions of email function:

  • Are your email headers properly formed?
  • Is SPF configured properly?
  • Is DKIM configured?  And, what is the signature?
  • What’s the round trip processing time and for each hop in the email?

Our new Email Deliverability analysis tool provides insight into your email configuration which will help you ensure email delivery to your customers, prospects and business partners.

Email Deliverability Report

An example MxToolbox email deliverability report.

Looking Up ASN

Autonomous System Numbers or ASNs are provided by Internet registries to Internet Service Providers as a unique identifier of their network.  ISPs may have multiple networks and therefore multiple ASNs, one for each non-contiguous subnet, which may get confusing for network managers or customers, as you can see in this example below.  ASNs are also used to configure Border Gateway Protocol (BGP) between two networks or between two subnets.

ASN Lookup Example

Level 3 Communications owns multiple ASNs. With our tool, it’s easy to find the appropriate one for your project.

MxToolbox has developed an ASN Lookup Tool that takes an ISPs name and returns the ASNs they own. In addition, the tool can accept an ASN and return the name of the owner.  This tool can be useful for network managers working with large ISPs or trying to determine ownership of a particular ASN or attempting to setup BGP.


More threats to DNS

As reported by Cisco, Domain Shadowing attacks have risen more that 4x in the last year.  This is a disturbing trend, that concerns all businesses, whether small, medium or large.  DNS Shadowing attacks utilize a business’s reputation to acquire access to important personal or financial information typically by leveraging a subdomain of the business.  For example, an attacker with access to your DNS configuration can setup an spam.yourdomain.com subdomain and route your customers to a website with your look, feel and branding.  From there, your customers will be prompted to login, and expose their credentials and personal information.

This type of threat even affects government agencies, as recently seen with the St. Louis Federal Reserve.  Attackers gained access to the DNS servers and added a subdomain on a foreign server where they gathered login credentials from researchers.   While gathering researchers credentials may not seem frightening, there is potential that these credentials could have been leveraged to access more financially relevant systems.

Incidents like these highlight the need for multi-layered threat protection that protects your servers and your reputation across multiple technologies and externally monitors threats.  At MxToolbox, we offer comprehensive monitoring solutions, like DNS Zone Protect, to help protect our customers from new and emerging threats. DNS Zone Protect gives you peace of mind knowing that changes to your DNS are being externally monitored by MxToolbox.

Did your DNS change last night?

As your company grows, so does access to your DNS.  Often multiple groups can make changes to DNS: Development, IT Operations, Marketing and even consultants.  Keeping track of who has access and what changes were made or were not made can be a difficult, but important exercise. Servers on subdomains left publicly visible long after the project is over can be used for exploitation by attackers.  Or, someone could inadvertently tell the world about a new product by setting up the subdomain early.  Finally, there is real risk in someone making an unauthorized change to DNS that shuts down critical systems.  Monitoring your DNS for changes is a business-critical task.

MxToolbox recently launched DNS Zone Protect, a monitoring solution for all your DNS, that gives you immediate warning when any change is made to your DNS.  With DNS Zone Protect, you get peace of mind knowing that changes to your DNS are being externally monitored by MxToolbox.

A new threat to your reputation via DNS

We’ve heard time and again that phishing attacks are the most popular method to obtain access to sensitive company data, but now, phishing is being used to get access to DNS. Lately, a new attack called DNS Shadowing has become increasingly popular, with growth of over 300% in the last year, and it threatens your online reputation.

DNS Shadowing involves phishing or otherwise obtaining access to your DNS accounts. From there, an intruder can create subdomains of your domain and point these entries to their servers without your knowledge. They use these false entries as part of email campaigns to your customers to gather credit cards and financial information. Since these attacks have legitimate appearing sites on URLs that appear to be part of your networks, it appears that you are asking for this information! Your reputation can be used to attack consumers that don’t even have business with you. Talk about a blow to your online reputation!

MxToolbox recently launched DNS Zone Protect, a monitoring solution for all your DNS, that gives you immediate warning when any change is made to your DNS. With DNS Zone Protect, you get peace of mind knowing that changes to your DNS are being externally monitored by MxToolbox.

Announcing New Email Deliverability Lookups and Monitors

This week we released tools and monitors that test your servers for DKIM and DMARC standards compatibility.  These two standards help companies send and receive email more safely and should be used by any company running their own email servers to ensure email deliverability.

What are these standards?


DKIM, or DomainKeys Identified Mail, is a standard that allows an organization to cryptographically sign an email message in order to take responsibility for that message.  Receivers can then use this digital signature in their process for approving or rejecting the email in their spam filter.  As DKIM signatures are associated with a domain, the reputation of that domain is the basis for evaluation.


DMARC, or Domain-based Message Authentication, Reporting & Conformance, is a standard for how email receivers authenticate email messages using SPF and DKIM.  DMARC policies are published by senders via DNS.  These policies tell a receiver that the messages sent were protected by SPF and DKIM and how to respond to messages that did not pass the receivers filters, such as spam filters or virus filter.

Why do I need it?

Email is a generally insecure method of communication.  Spam and phishing attacks leverage email because it easy to spoof and highly trusted by naive consumers.  For example, many people trust an email simply because it contains a company’s logo and appears to come from that company’s email address, both of which are easy to fake.  Email service providers like Google (Gmail), Microsoft (Hotmail/Outlook.com), and Yahoo! value DKIM and DMARC because it simplifies their algorithms for filtering trusted email from spam and phishing attacks.  If you are a small business targeting business or consumer customers, you need to adopt DKIM and DMARC to ensure your emails get through to your customers.

How do I use MxToolbox?

Once you have DKIM and DMARC setup, you can use MxToolbox to check your configurations and ensure they are accessible to the outside world.  We even offer these as monitors which will alert you if DKIM or DMARC is unaccessible or changes.

DKIM lookup result for mailjet.com using their google key


Typical DMARC lookup results for google.com

As with all our DNS monitor types, DKIM and DMARC monitors check your configuration every 5 minutes.

The Ransomware Threat to Small Business

Today’s Wall Street Journal article, ‘Ransomware’ a Growing Threat to Small Businesses, is a great synopsis of the threat organized and skilled cyber criminals pose to small businesses every day.  Many small businesses run without any sort of spam, virus or malware protection so they make easy and attractive targets for criminals looking to make an easy buck (or bitcoin).

At MxToolbox, we see this issue arise daily.  Small businesses contact us because they are on a blacklist only to discover that it was a malware infection caused by malware from spam or an infection caused by following a spammy link.  Ransomware attacks start in exactly the same way, a spam email with a legitimate looking website or an attachment.  All it takes is an errant click or opening the wrong attachment and you’re infected and your business grinds to a halt.  Recovery can take you hundreds of dollars or dozens of hours, whether you pay or recover from a backup.

Do you have an offsite backup?

Most small businesses don’t.  Our first recommendation for your small business to survive a ransomware threat, a fire, a tornado or any business continuity issue is to immediately invest in a cloud-based or other type of offsite backup, and backup your entire business.  This will protect against these large issues but also against simple accidents that could harm your business.  Have you ever deleted a file and immediately wished you hadn’t cleaned your Recycle Bin?

Protect your email

If you are running your own email system, you need to protect it.  We highly recommend some sort of comprehensive spam, virus and malware protection on your servers.  Basic spam filtering isn’t enough and will not capture the zero-day outbreak type malware or attachments that are used by ransomware attacks.  You need to filter for malware and viruses as well.

Protect your team from malicious links

This one is a little harder.  Spam email, especially with zero-day outbreak attacks, can include links to sites that are neutral at the time the email is sent, but activated shortly after to become malicious.  This type of attack is very difficult to protect against and often uses phishing style emails that look completely legitimate.  Exploits like ransomware get you to click on these links and download software to infect your systems.  New technologies can protect you from these types of seemingly normal, but malicious links.

MxToolbox Solution

At MxToolbox, we offer comprehensive email security solutions

  • Email Protection + Continuity provides inbound and outbound mail filtering to ward off spam, malware and other email-based attacks.  Outbound filtering means that even should your servers be compromised, spam will not be passed on to your customers.  With Continuity, should your email go down, your users will still have access to send and receive email while you work the issue.

  • Total Security includes everything from Email Protection + Continuity but adds in DNS and URL filtering of websites, both of on-premise and mobile devices.  With Total Security, your users are protected even if they click on links that download ransomware, botnets or malware and also protected from botnets reaching out to host servers to start the encryption process.

Note:  As of Monday, April 20th, PBS has another article on Ransomware.

New Zimbra mail coming soon

For the past year, our Zimbra customers have probably been wondering if they would ever get anything new from us.  Now, we actually have something for them.  MxToolbox is upgrading Zimbra to the latest release on April 18th!

What does this mean?

This is a free upgrade that all current Zimbra users will receive with absolutely no work required of the user or customer.  MxToolbox will cut everything over to the new version on April 18th during a short maintenance window.


New Features

(Borrowed shamelessly from Zimbra’s Site)

Zimbra Web Client

Streamlined User Interface

The Zimbra Web Client has been completely redesigned with a focus on simplicity and accessibility.  The Zimbra 8 interface is more streamlined so that common actions are easily discoverable and highly intuitive to use.

Conversation View

In Zimbra 8 email is presented to users in a “natural” conversation view that makes reading and replying to messages convenient and intuitive. Quoted text is hidden and messages are laid out in a way that is easy for users to understand the “in-reply-to” relationship between different messages in the same email thread. Discreet links to Reply, Forward and More Actions (presented just below the email) let users respond to messages quickly and efficiently.

Rich Composition

Improved composition editor allows users to craft rich text emails, with features such as paste-style support from desktop applications and the ability to include inline images bring the power of desktop word processors to email.

Shared Tagging

In Zimbra 8 tagging functionality has been improved so that when items are shared users cannot only use tags to organize their data but also share these tags across applications as well as mailboxes.

Activity Streams

Activity Streams allows users extensive control over the messages that go to their Inbox. Users can easily set up activity stream filters that direct incoming messages to various folders (or are deleted from) based on different criteria that they can specify. For example, emails to distribution lists, feed and notifications that are not directly addressed to the user can be archived in folders that can be read when convenient.

“Graymail” filtering prevents user’s Inbox from being cluttered by legitimate but unwanted emails.

Dedicated Search Tab

A dedicated search tab is created whenever a user enters a new query in the header search box. This allows users to perform a search, navigate away from the search tab to perform another action such as compose an email, or schedule an event and then come back to the search tab to continue with the query.

Zimbra 8 provides users with a simple yet powerful search interface allowing users to perform simple actions such as quickly filter on common attributes or perform complex search queries making use of complex logical operators.

Enterprise Calendaring

Zimbra 8 provides an intuitive and sophisticated enterprise calendaring system that enables users to manage multiple calendars and provides support for advanced scheduling activities.

Zimbra 8 has significantly improved the user’s experience when working with the appointment scheduling feature. Once users select attendees, Zimbra 8 can compare calendar availability and provide users with a list of suggested meeting times. Similarly, based on meeting requirements such as the size of the room and location, Zimbra’s scheduler can provide users with a list of conference facilities that fit meeting requirements.

Merged and Split Day View options give users the flexibility to view their different calendars (e.g. personal and work-related) either individually or overlaid on top of each other. (In other words, see a “merged” view of appointments from several different calendars in one calendar.)

Landscape and date range printing provides users greater control over how calendars are printed.

Wizard to add external calendars when users right-click to create new calendars. Zimbra 8 supports importing several popular calendar formats including Google and Yahoo! Calendars.

Zimbra Mobile

Zimbra offers server side implementation of Microsoft’s ActiveSync 12.1 protocol providing end users access to their Zimbra mail on any mobile device that supports ActiveSync 12.1.

Auto Discovery

Auto-discover support enables seamless linkage between the user’s account on the Zimbra server and the email client on the mobile device when valid credentials (email and password) are supplied from the device.

Remote Device Wipe

In the event that the security of the mobile device is compromised administrators can perform a remote device wipe from the admin console, thus safeguarding against any loss of sensitive corporate data.

Bandwidth Reduction

Since most mobile devices are often on high latency, low bandwidth (reduced connectivity) networks, Zimbra’s ActiveSync implementation has been designed to operate at a reduced bandwidth.

Battery Optimization

ActiveSync protocol implementation has been optimized to conserve battery life for push enabled devices.

Persona/Alias Support

ActiveSync implementation provides push synchronization of email, contacts, calendars, tasks as well as the Persona/ Alias profile configurations associated with the user’s email address.

Advanced Administration Policies

The introduction of 30 new configuration policies provides administrators more fine-grained control over user accounts and approved applications – allowing them to enable/disable device software and hardware capabilities as necessary.

Unified Communications

Zimbra UC seamlessly integrates with leading voice systems to deliver all of your business communications in one place.  Zimbra 8 is designed so that real-time communication services such as voice, telephony and presence inter-operate with non-real-time services such as email and voice mail – allowing users to benefit from faster response times and companies to benefit from higher group productivity.


Click-to-Call offers immediate voice connectivity with call-routing to device or soft-phone. This lets users take office calls at their office numbers on their mobile devices. Zimbra 8 supports the configuration of multiple numbers.


Presence provides real-time notification of user’s current availability and ability to communicate.

Visual Voice Mail

Visual voice mail lets users view caller and voicemail information and supports inline playback and management features. It also supports MWI (Message Waiting Indicator) status updates, allowing users to customize the way they want to be notified about new voicemail messages. These voice messages can be saved in either .wav or .mp3 format.

Call History

Call history includes information about voice mails received, placed calls, received calls, missed calls as well as details about date, time, and call duration.

IT & Administration

Outlook 2013

The Zimbra Connector for Outlook now works with Outlook 2013.

Retention Policies

Custom retention and disposal policies can be set on a folder-by-folder basis by end users, or enforced globally by IT.

Zimbra Admin Console

The Zimbra Admin Console has been completely redesigned to make administration easier.

If you have questions or issues as a result of this upgrade, or would like to add Zimbra services, please contact MxToolbox Toll Free at (866) 698-6652, or sales@mxtoolbox.com


New Port Checks on the Port Scan Tool

If you haven’t noticed already we’ve beefed up the diagnostic capabilities of our Port Scanning Tool by adding 8 additional ports. We love making our lookup tools even more powerful and providing you with the information you need – fast.  Our updated port scan tool now checks a total of 25 ports to let you know what services are running on your server and open to the world. Here is a list of the new ports the tool now checks for open ports.

  • 111/tcp – Remote Procedure Call (RPC)
  • 135/tcp – Microsoft RPC for DHCP, DNS, and WINS
  • 445/tcp – Microsoft Active Directory and SMB file sharing
  • 1025/tcp – NFS, IIS or Teradata
  • 1723/tcp – Microsoft Point-to-Point Tunneling Protocol
  • 5060/tcp – Session Initiation Protocol
  • 5900/tcp – Remote Frame Buffer, VNC remote desktop protocols
  • 6001/tcp – X11 client-server network

So, why did we pick these ports?

At MxToolbox, we want to help you protect your organization.  We selected these ports because they rank high in statistical usage, provide high value services, and can be dangerous.  These ports, if exposed to the outside world, can be used to exploit your systems.  If you need them open, defend them.  If you don’t need them exposed, close them as soon as you can.  In short, if we can see them, then these services are exposed to the world and are at risk for hacks, DDOS attacks or data ransoms.  Remember to regularly patch systems supporting these services.  Keeping a close eye on these ports helps to protect your organization.

About the Port Scan Tool

This test will tell you what standard services are running on your server and open to the world.  You can type in an IP address or hostname.  We attempt a full TCP connection and graceful disconnect on each of about 25 common TCP ports we test, with a timeout of 3 seconds.   Possible results for each port are Success,Timeout or Refused.