Scans for mail relays or validates email sending capabilities (often used by spammers).

In the development of such scanners, a "draft feature" might be:

Targets email servers to verify mailbox access.

Checks for open remote desktop connections and may attempt brute-force or credential stuffing attacks.