112:34:23EHLOcompany.local
312:34:23RCPTto:<[...]@hotmail.com>
512:34:25messagefrom[email protected]·subjectVULNERABILITY PROOF: GOLD [company.local] rcpt_to["[...]@hotmail.com"]
Vulnerability: GOLDTarget: company.localIP: [...]Verified: 2026-03-05 04:34:22
712:34:25RCPTto:<[...]@gmail.com>
912:34:26messagefrom[email protected]·subjectVULNERABILITY PROOF: GOLD [company.local] rcpt_to["[...]@gmail.com"]
Vulnerability: GOLDTarget: company.localIP: [...]Verified: 2026-03-05 04:34:22
1112:34:26RCPTto:<[...]@yahoo.com>
1312:34:27messagefrom[email protected]·subjectVULNERABILITY PROOF: GOLD [company.local] rcpt_to["[...]@yahoo.com"]
Vulnerability: GOLDTarget: company.localIP: [...]Verified: 2026-03-05 04:34:22
1512:34:28RCPTto:<[...]@proton.me>
1712:34:28messagefrom[email protected]·subjectVULNERABILITY PROOF: GOLD [company.local] rcpt_to["[...]@proton.me"]
Vulnerability: GOLDTarget: company.localIP: [...]Verified: 2026-03-05 04:34:22
1912:34:29RCPTto:<[...]@gmail.com>
2112:34:30messagefrom[email protected]·subjectVULNERABILITY PROOF: GOLD [company.local] rcpt_to["[...]@gmail.com"]
Vulnerability: GOLDTarget: company.localIP: [...]Verified: 2026-03-05 04:34:22
2312:34:30RCPTto:<[...]@mail.com>
2512:34:31messagefrom[email protected]·subjectVULNERABILITY PROOF: GOLD [company.local] rcpt_to["[...]@mail.com"]
Vulnerability: GOLDTarget: company.localIP: [...]Verified: 2026-03-05 04:34:22
2712:34:32RCPTto:<[...]@gmx.com>
2912:34:33messagefrom[email protected]·subjectVULNERABILITY PROOF: GOLD [company.local] rcpt_to["[...]@gmx.com"]
Vulnerability: GOLDTarget: company.localIP: [...]Verified: 2026-03-05 04:34:22