Scans for mail relays or validates email sending capabilities (often used by spammers).
In the development of such scanners, a "draft feature" might be:
Targets email servers to verify mailbox access.
Checks for open remote desktop connections and may attempt brute-force or credential stuffing attacks.