{"id":103,"date":"2026-02-06T06:24:22","date_gmt":"2026-02-06T06:24:22","guid":{"rendered":"https:\/\/text.email\/blog\/?p=103"},"modified":"2026-02-06T23:38:45","modified_gmt":"2026-02-06T23:38:45","slug":"dont-know-your-companys-smtp-server","status":"publish","type":"post","link":"https:\/\/text.email\/blog\/dont-know-your-companys-smtp-server\/","title":{"rendered":"Don\u2019t Know Your Company\u2019s SMTP Server? Use mx.text.email Instead (With a Few Caveats)"},"content":{"rendered":"\n<p>A lot of devices and systems can send email alerts\u2026 but only if you give them SMTP settings.<\/p>\n\n\n\n<p>Think: industrial equipment, UPS units, security panels, environmental sensors, website monitoring tools, network appliances, and \u201csmart\u201d everything. Many of these products were designed for IT departments and <strong>assume you know your company\u2019s outbound mail server details<\/strong>.<\/p>\n\n\n\n<p>If you <em>don\u2019t<\/em> know your company\u2019s SMTP server information (and you can\u2019t easily get it), there\u2019s a simple fallback: you can send directly to <strong>text.email<\/strong>\u2019s SMTP server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Quick Option: Connect Directly to <code>mx.text.email<\/code><\/h2>\n\n\n\n<p>If your device asks for an SMTP server, you can enter:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SMTP server \/ host:<\/strong> <code>mx.text.email<\/code><\/li>\n<\/ul>\n\n\n\n<p>You can typically connect on any of these ports (depending on what your device supports):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>25<\/strong><\/li>\n\n\n\n<li><strong>587<\/strong><\/li>\n\n\n\n<li><strong>465<\/strong><\/li>\n\n\n\n<li><strong>2525<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Then configure the \u201cTo\u201d address as your text.email address, for example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>your-number@text.email<\/code><\/li>\n\n\n\n<li><code>your-number@your-subdomain.text.email<\/code><\/li>\n<\/ul>\n\n\n\n<p>When <strong>text.email<\/strong> receives the email, it converts it into an SMS message (and handles the rest of the delivery flow).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>No username\/password needed<\/strong><\/h3>\n\n\n\n<p>Many SMTP setups require authentication (a username + password). That\u2019s common when you\u2019re sending email <em>out<\/em> to the broader internet.<\/p>\n\n\n\n<p>This direct-to-text.email approach is different because:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You\u2019re sending <strong>to a local address at <code>@text.email<\/code> or <code>@subdomain.text.email<\/code><\/strong><\/li>\n\n\n\n<li>The message is being handed directly to the receiving server for the text.email domain<\/li>\n<\/ul>\n\n\n\n<p>So in typical device UIs, you can leave these blank:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Username:<\/strong> <em>(blank)<\/em><\/li>\n\n\n\n<li><strong>Password:<\/strong> <em>(blank)<\/em><\/li>\n<\/ul>\n\n\n\n<p>If the device <em>forces<\/em> you to enter something anyway, try entering a placeholder value (some devices won\u2019t allow empty fields), but <strong>text.email<\/strong> does not require SMTP AUTH for mail destined to <code>text.email<\/code>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Note About SPF \/ DKIM \/ DMARC (Important)<\/h2>\n\n\n\n<p>Email authentication is normally validated using three common mechanisms:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SPF<\/strong> (was this message sent from an allowed server for the sender\u2019s domain?)<\/li>\n\n\n\n<li><strong>DKIM<\/strong> (is there a valid cryptographic signature from the sender\u2019s domain?)<\/li>\n\n\n\n<li><strong>DMARC<\/strong> (does the sender\u2019s domain publish a policy requiring SPF\/DKIM alignment, and did the message pass?)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">What text.email does today<\/h3>\n\n\n\n<p><strong>Right now, <code>mx.text.email<\/code> is not strictly validating inbound mail against SPF, DKIM, and DMARC.<\/strong><\/p>\n\n\n\n<p>That\u2019s intentional: lots of alerting devices send email in \u201cweird\u201d ways, and we\u2019d rather deliver your SMS than block a critical notification because a device can\u2019t do modern email auth correctly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What may change later<\/h3>\n\n\n\n<p>Over time, we\u2019ll likely tighten this up and start enforcing SPF\/DKIM\/DMARC checks more strictly (because stronger validation helps prevent abuse, spoofing, and spam).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why direct device-to-<code>mx.text.email<\/code> can fail these checks<\/h3>\n\n\n\n<p>If your device is relaying directly to <code>mx.text.email<\/code>, it\u2019s <strong>very common<\/strong> for one or more of SPF\/DKIM\/DMARC to fail, for reasons like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The device uses a \u201cFrom\u201d address like <code>alerts@yourcompany.com<\/code>, but it\u2019s <strong>not actually sending from an approved outbound server<\/strong> for <code>yourcompany.com<\/code> \u2192 <strong>SPF fails<\/strong><\/li>\n\n\n\n<li>The device doesn\u2019t support DKIM signing at all \u2192 <strong>DKIM fails<\/strong><\/li>\n\n\n\n<li>Your domain has a DMARC policy requiring alignment, and the device\u2019s sending behavior doesn\u2019t align \u2192 <strong>DMARC fails<\/strong><\/li>\n<\/ul>\n\n\n\n<p>So even though it works today, <strong>direct relay is best treated as a fallback<\/strong>\u2014and it\u2019s another reason to prefer your company\u2019s official SMTP relay whenever possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">When Should You Use Direct Relay?<\/h2>\n\n\n\n<p>Use this approach when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You don\u2019t know your organization\u2019s SMTP relay settings<\/li>\n\n\n\n<li>You don\u2019t have permission to use the corporate mail system<\/li>\n\n\n\n<li>You\u2019re working with a device where the vendor documentation is vague (or wrong)<\/li>\n\n\n\n<li>You want to \u201cjust make it send alerts\u201d without involving IT<\/li>\n<\/ul>\n\n\n\n<p>If you <em>do<\/em> have access to your company\u2019s SMTP server information, it\u2019s usually better to use that.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Downsides and Tradeoffs to Consider<\/h2>\n\n\n\n<p>Direct-to-<code>mx.text.email<\/code> is convenient, but it\u2019s not always the best long-term solution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1) Some networks block outbound SMTP (especially port 25)<\/h3>\n\n\n\n<p>Many corporate networks and ISPs block outbound SMTP to reduce spam. If your device sends mail on port 25, the connection might fail entirely.<\/p>\n\n\n\n<p>Workarounds:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Try <strong>587<\/strong>, <strong>465<\/strong>, or <strong>2525<\/strong><\/li>\n\n\n\n<li>Use your corporate SMTP relay (often permitted internally)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2) No authentication means fewer identity guarantees<\/h3>\n\n\n\n<p>Without SMTP AUTH, the receiving side has fewer ways to confirm the sender is \u201callowed\u201d to send. That can make spoofing easier and auditing harder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3) Future SPF\/DKIM\/DMARC enforcement may break direct relay setups<\/h3>\n\n\n\n<p>As described above, this is the big one: direct relay is the most likely path to failing SPF\/DKIM\/DMARC in the future.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4) Some devices have outdated SMTP\/TLS support<\/h3>\n\n\n\n<p>Old devices can be finicky about STARTTLS, TLS versions, or SMTP behaviors. A corporate relay may be more forgiving.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5) Debugging is sometimes harder without IT visibility<\/h3>\n\n\n\n<p>If you route through your corporate SMTP relay, IT can often look up logs. Direct device-to-<code>mx.text.email<\/code> setups can be trickier to diagnose if the device doesn\u2019t provide good error details.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6) Compliance and security considerations<\/h3>\n\n\n\n<p>Some organizations require alerts to flow through approved systems, especially if messages contain sensitive data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recommendations and Quick Setup Checklist<\/h2>\n\n\n\n<p>Ready to get started?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended best practice<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Best:<\/strong> Use your organization\u2019s approved SMTP relay (if available)<\/li>\n\n\n\n<li><strong>Fallback:<\/strong> Use <code>mx.text.email<\/code> when you don\u2019t know the SMTP details or can\u2019t get them<\/li>\n\n\n\n<li><strong>Always:<\/strong> Send to your text.email address (<code>@text.email<\/code> or <code>@subdomain.text.email<\/code>) so it routes correctly and generates SMS<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Setup checklist<\/h3>\n\n\n\n<p>When a device asks for SMTP settings:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u2705 SMTP server\/host: <strong><code>mx.text.email<\/code><\/strong><\/li>\n\n\n\n<li>\u2705 Port: <strong>25, 587, 465, or 2525<\/strong><\/li>\n\n\n\n<li>\u2705 SMTP authentication: <strong>None \/ disabled<\/strong><\/li>\n\n\n\n<li>\u2705 \u201cTo\u201d address: <strong>your text.email address<\/strong><\/li>\n\n\n\n<li>\u2705 Send a test message<\/li>\n<\/ul>\n\n\n\n<p>If the test fails, the two most common causes are:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>outbound SMTP blocked on the network (try a different port)<\/li>\n\n\n\n<li>the device\u2019s TLS\/SMTP implementation is outdated<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Want to set up email-to-text alerts but don&#8217;t know your company&#8217;s SMTP server details? Use this option instead.<\/p>\n","protected":false},"author":1,"featured_media":108,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-text-email-tips"],"_links":{"self":[{"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/posts\/103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/comments?post=103"}],"version-history":[{"count":4,"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/posts\/103\/revisions"}],"predecessor-version":[{"id":109,"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/posts\/103\/revisions\/109"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/media\/108"}],"wp:attachment":[{"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/media?parent=103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/categories?post=103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/text.email\/blog\/wp-json\/wp\/v2\/tags?post=103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}