DEDICATED INFRASTRUCTURE

What Enterprise SMTP Relay Actually Delivers

Managed outbound SMTP relay powered by our SMTP relay. Authentication, per-ISP throttling, and delivery monitoring for any application stack.

Port 587
STARTTLS
standard SMTP submission
Any App
Compatible
MailWizz, WP, custom code
Per-Domain
DKIM Signing
multi-brand supported
EU
Data Residency
GDPR by design
Informational intent

What Is an SMTP Relay?

An SMTP relay is a mail server that accepts outbound email from an application or another mail server and forwards it to the recipient's mail server. In production bulk email infrastructure, the relay layer separates the application (MailWizz, custom application, CRM) from the final delivery engine (our relay), enabling centralized control over authentication, throttling, routing, and monitoring across multiple sending applications.

Cloud Server for Email operates managed SMTP relay environments that serve as the intelligent delivery layer between your application and recipient ISPs. Every message injected through our relay infrastructure passes through our relay's per-ISP domain block configuration, DKIM signing, Intelligence Bounce™ bounce classification, and accounting log recording — regardless of which application injected it.

SMTP Relay vs Direct Delivery

Applications can deliver email directly to recipient MX servers, but this requires each application to manage its own SMTP sessions, retry logic, bounce handling, and ISP-specific throttling. An SMTP relay centralizes all delivery management: one our relay instance handles all applications, with consistent authentication, throttling, and monitoring for every message regardless of source application.

Informational intent

SMTP Relay Use Cases: When You Need a Managed Relay Layer

Managed SMTP relay infrastructure is the right choice for organizations in several distinct scenarios:

  • Multi-application sending: Organizations running multiple applications (CRM, e-commerce platform, custom notification system, email marketing platform) that all need to send email. A central relay provides unified authentication, consistent reputation management, and single-point monitoring.
  • Application-to-email decoupling: Development teams who want to send email from applications without building SMTP session management, retry logic, and bounce processing into the application itself. The relay handles delivery complexity; the application handles business logic.
  • Legacy application email modernization: Applications configured to send via an internal SMTP server or an ISP's default SMTP relay can be pointed at a managed our relay relay with proper authentication and per-ISP throttling, immediately improving deliverability without application code changes.
  • Transactional email from web applications: Web applications (WordPress, Magento, custom PHP/Python/Node.js) that need to send transactional email (order confirmations, password resets, account notifications) through dedicated IPs rather than shared hosting SMTP servers.
  • High-frequency triggered email: Event-driven applications sending real-time triggered emails (IoT alerts, financial notifications, SaaS product emails) that require consistent low-latency delivery with dedicated IP reputation.
Commercial intent

Managed SMTP Relay vs Transactional Email Services (Postmark, Mailgun, SendGrid)

DimensionManaged SMTP Relay (CSE)Transactional ESP (Postmark/Mailgun)
IP addressesDedicated — your reputation onlyShared pool (co-tenant risk)
Pricing modelFlat monthly (unlimited volume)Per-email (scales with volume)
SMTP accounting log✅ Per-message our relay log❌ Dashboard statistics only
Per-ISP throttle control✅ Domain block configuration❌ Platform-managed
DKIM keysYour keys, your domainsPlatform-managed keys
Data residencyEU (the EU)Typically US-based
Bounce processing✅ Intelligence Bounce™ + pipeWebhook-based
Cost at 1M msgs/monthFixed ~€490/mo€80–200+ (Postmark/Mailgun)
Cost at 10M msgs/monthFixed ~€490–990/mo€800–2,000+

The cost crossover point is typically 500,000–1,000,000 messages per month depending on the transactional service pricing tier. Below this volume, transactional ESPs provide good value with minimal operational overhead. Above this volume, dedicated SMTP relay infrastructure provides both cost advantage and deliverability control that shared services cannot match.

Informational intent

SMTP Relay Authentication: SPF, DKIM, and DMARC for Relay Configurations

Authentication configuration for SMTP relay is more complex than for direct sending because the relay's IP address must be authorized in the sending domain's SPF record, and the DKIM signing must align with the From: domain for DMARC alignment.

  • SPF configuration for relay: The relay server's IP address must appear in the sending domain's SPF record. For organizations relaying from multiple applications on the same relay, one SPF entry covers all applications. Format: v=spf1 ip4:[relay-IP] ~all
  • DKIM signing at relay: our relay signs all relayed messages with the sending domain's private key. The DKIM public key is published at [selector]._domainkey.[from-domain]. The relay operator manages key generation, DNS publication, and rotation.
  • DMARC alignment: The DKIM d= tag must match the From: header domain (or organizational parent domain) for DMARC to pass on DKIM evidence. The relay's IP must be in the SPF record of the MAIL FROM domain for DMARC to pass on SPF evidence.
  • Relay IP in SPF — performance consideration: If many domains relay through the same IP, each domain's SPF record includes only that one ip4: entry — no lookup limit problem. The complexity arises when applications send on behalf of many different domains through the same relay.
Multiple From Domains Through One Relay

Organizations relaying on behalf of multiple sending domains (agencies, multi-brand operations) require per-domain DKIM key pairs and per-domain DMARC records. our relay handles per-domain DKIM signing natively — each domain has a separate signing key configured in the our relay config. Cloud Server for Email configures per-domain authentication for all relay clients as part of onboarding.

Informational intent

SMTP Relay Connection and Authentication for Application Integration

Applications connect to the managed SMTP relay via standard SMTP submission (port 587 with STARTTLS) using SMTP AUTH credentials. The connection is encrypted in transit; the authentication credentials are per-application, enabling per-application rate limiting and monitoring.

Standard SMTP Relay Connection Parameters

Host: [your-relay-server-ip] | Port: 587 | Security: STARTTLS | Auth: PLAIN or LOGIN | Username: [provided during onboarding] | Password: [provided during onboarding]. These parameters work with any application that supports SMTP AUTH — MailWizz, WordPress SMTP plugins, Python smtplib, Node.js nodemailer, PHP mail(), and any other SMTP-capable application.

API-Compatible Relay: Mailgun, SendGrid, and Postmark Drop-In Replacement

For development teams already integrated with a commercial transactional email API, switching to dedicated infrastructure typically meant rewriting API calls. We solved this. Our managed SMTP relay exposes an HTTP API layer compatible with Mailgun's, SendGrid's, and Postmark's message submission endpoints — same parameter names, same tag structure, same response format. Your existing code works without modification.

DROP-IN COMPATIBILITY
Mailgun API v3
POST /v3/{domain}/messages — all standard parameters including o:tag, o:tracking, recipient-variables, h:X-Custom headers
SendGrid Web API v3
POST /v3/mail/send — personalizations, categories, custom_args, tracking_settings, headers all supported
Postmark Messages API
POST /email — Tag, TrackOpens, TrackLinks, Metadata, Headers all mapped to our relay layer
SMTP AUTH (universal)
Port 587 STARTTLS with SMTP AUTH PLAIN/LOGIN — works with any application, library, or platform

What Compatibility Actually Means

When we say "API-compatible" we mean the following are preserved identically:

Feature Our Relay API Mailgun SendGrid
Message tags / categories ✅ o:tag / categories ✅ o:tag ✅ categories
Custom headers (h:X-*) ✅ Full support ✅ Full support ✅ headers object
Recipient variables ✅ recipient-variables ✅ recipient-variables ✅ personalizations
Batch sending (To array) ✅ Supported ✅ Supported ✅ Supported
Open tracking ✅ Configurable per-message ✅ o:tracking-opens ✅ trackingSettings
Click tracking ✅ Configurable per-message ✅ o:tracking-clicks ✅ trackingSettings
Scheduled delivery ✅ o:deliverytime ✅ o:deliverytime ✅ sendAt
Webhooks (events) ✅ Delivery, bounce, complaint ✅ Webhooks ✅ Event Webhook
Dedicated IP assignment ✅ Per-domain routing ⚠️ Enterprise only ⚠️ Enterprise only
IP warming control ✅ Full via per-ISP throttling ⚠️ Shared pool ⚠️ Shared pool or paid add-on

Migration from Mailgun or SendGrid: Zero Code Changes

The migration path for development teams is:

  1. Update the base URL in your email client configuration — replace api.mailgun.net/v3 with our relay endpoint. Same path structure.
  2. Replace API key with the credentials we provide at onboarding. Same authentication header format (Authorization: Basic for Mailgun-compatible, Authorization: Bearer for SendGrid-compatible).
  3. Add your sending domain — point its DNS to our authentication records (DKIM, SPF, DMARC). We generate and verify these during onboarding.
  4. Test with existing code — your SDK calls, tag assignments, and webhook listeners all continue working without modification.

Libraries and frameworks with native Mailgun or SendGrid support work immediately: Laravel Mail (Mailgun/SendGrid driver), Django Anymail, Node.js mailgun-js / @sendgrid/mail, Ruby mail gem, Go mailgun-go, and any application using the raw HTTP API.

Why switch from Mailgun or SendGrid to dedicated infrastructure?

Both are excellent for low-to-medium volume sending. At high volume — above 500K/month — the economics shift: per-message pricing adds up, shared IP pools mean your reputation is affected by co-tenants, and dedicated IPs on their platforms require enterprise contracts. Our relay gives you dedicated IPs, full reputation control, and API compatibility at flat monthly pricing. See our Mailgun comparison and SendGrid comparison for a full breakdown.

Webhook Events: Same Structure as Mailgun and SendGrid

If your application processes delivery webhooks — parsing bounce events, complaint notifications, or delivery confirmations — our webhook payloads use the same field names and event types as the major providers. Your existing webhook handler code requires no changes:

delivered
Successful SMTP acceptance by recipient MX. Timestamp, recipient, message-id.
failed / bounced
Hard bounce with ISP diagnostic code and Intelligence Bounce™ classification (permanent/transient/policy).
complained
FBL complaint received. Recipient automatically suppressed.
unsubscribed
List-Unsubscribe-Post one-click processed. RFC 8058 compliant.
opened
Open pixel fired. User agent, IP, timestamp, message tag.
clicked
Tracked link clicked. URL, user agent, IP, timestamp, message tag.

Frequently Asked Questions: SMTP Relay

What is the difference between an SMTP relay and a mail server?
A mail server (MX server) handles both inbound and outbound email, storing messages for domain recipients. An SMTP relay handles only outbound email forwarding — it accepts messages from applications and delivers them to recipient mail servers, without storing messages for any domain. Cloud Server for Email operates SMTP relays for outbound delivery, not inbound mail servers.
How does SMTP relay differ from SMTP smarthost?
These terms are often used interchangeably. A smarthost is an SMTP relay configured as the next-hop server in an application or mail server's outbound routing. When an application is configured to use a smarthost, it sends all outbound email to the smarthost rather than looking up MX records and delivering directly. Cloud Server for Email's managed our relay serves as the smarthost for MailWizz and other applications in managed infrastructure environments.
Can I use the SMTP relay for multiple sending domains?
Yes. Cloud Server for Email's managed relay supports multiple From domains on the same relay infrastructure. Each domain gets its own DKIM key pair, its own SPF record configuration, and its own DMARC reporting. our relay selects the appropriate DKIM key based on the From: header domain at signing time.
What is the maximum throughput of the managed SMTP relay?
Throughput depends on your server specification and IP count. A standard Production plan (8-core server, 5 IPs) supports up to 500,000 messages per day across all applications. Enterprise configurations support 3,000,000+ messages per day. The relay throughput is determined by ISP acceptance rate and IP reputation, not raw server capacity — properly warmed, high-reputation IPs accept more volume than newly-provisioned IPs regardless of server hardware.

Configure a Managed SMTP Relay Environment

We design SMTP relay environments for your specific application stack, volume, and sending domain portfolio. 30-minute technical assessment, no obligation.

SMTP Relay Security: Preventing Open Relay and Authentication Abuse

A managed SMTP relay must be configured to prevent unauthorized use. An open relay — a server that accepts and forwards email from any source without authentication — is immediately identified by spam monitoring services and blacklisted. Cloud Server for Email's managed relay environments are closed relays by default: SMTP AUTH is required for all injection, and only authenticated connections from authorized clients can inject messages.

  • IP-based injection restriction: The relay only accepts SMTP injection from IP addresses explicitly authorized during onboarding (typically the client's application servers). Unauthorized IPs are rejected at the connection level.
  • SMTP AUTH enforcement: All injection requires username/password authentication. AUTH PLAIN and AUTH LOGIN over STARTTLS are supported. Plain-text AUTH without TLS is not available.
  • Volume limits per credential: Per-credential hourly injection limits prevent a single compromised credential from injecting spam at scale before detection.
  • Real-time injection monitoring: Unusual volume spikes or unexpected sending domain usage trigger alerts. Cloud Server for Email monitors injection patterns for anomalies as part of daily operations.

SMTP Relay for Transactional Email: Delivery SLA Considerations

Transactional email (password resets, OTP codes, order confirmations) has timing requirements that distinguish it from marketing email. A password reset that takes 10 minutes to deliver is a user experience failure. An OTP code with a 5-minute expiry that arrives in 8 minutes is non-functional.

Cloud Server for Email designs transactional relay configurations for minimum delivery latency: dedicated IPs separate from marketing traffic, generous max-smtp-out settings for major ISPs, and low retry-after values for any deferrals. For organizations with strict transactional SLA requirements (sub-60-second delivery), we configure dedicated virtual MTA pools that route transactional traffic before any marketing queue traffic.

Delivery TypeIP PoolPriorityTypical Delivery Time
OTP / 2FA codesDedicated transactionalHighest10–30 seconds
Password resetsDedicated transactionalHigh30–90 seconds
Order confirmationsDedicated transactionalHigh1–3 minutes
Marketing campaignsDedicated marketing poolStandard1–30 minutes (ISP-dependent)
Cold outreachDedicated cold poolStandard5–60 minutes

Multi-Application Relay Architecture: Design Patterns

Organizations with multiple applications sending through a central relay benefit from per-application credential design. Each application gets its own SMTP AUTH credentials, enabling per-application monitoring, rate limiting, and attribution in the our relay accounting log.

Recommended Multi-Application Design

Application A (e-commerce platform) → SMTP AUTH credentials A → our relay virtual MTA pool A (marketing IPs). Application B (SaaS product) → SMTP AUTH credentials B → our relay virtual MTA pool B (transactional IPs). Application C (CRM) → SMTP AUTH credentials C → our relay virtual MTA pool C (cold outreach IPs). Each application's delivery data is separately attributable in the accounting log and SNDS/Postmaster data.

SMTP Relay Configuration Reference

Standard connection parameters for Cloud Server for Email's managed SMTP relay:

Application SMTP Configuration

SMTP Host: [assigned at onboarding] | Port: 587 | Encryption: STARTTLS | Authentication: PLAIN or LOGIN | Username: [assigned at onboarding] | Password: [assigned at onboarding] | TLS Version: 1.2 minimum | Compatible with: MailWizz, WordPress (WP Mail SMTP), PHP mail(), Python smtplib, Node.js nodemailer, any RFC 5321 compliant SMTP client.

SMTP Relay vs Other Delivery Options

Organizations evaluating delivery infrastructure often compare SMTP relay, direct MX delivery, and ESP API delivery. The choice depends on application architecture, volume, and operational requirements:

  • SMTP relay (recommended for most use cases): Standard SMTP protocol, works with any application, centralized delivery management at the relay layer. All authentication, throttling, and monitoring happens at our relay regardless of application complexity.
  • Direct MX delivery: Application looks up MX records and delivers directly to recipient servers. Requires the application to implement per-ISP throttling, bounce handling, and retry logic. Appropriate only for specialized use cases where relay architecture adds unacceptable complexity.
  • ESP API delivery: Application calls Mailgun, SendGrid, Postmark API. Simple integration, no SMTP configuration. Appropriate for low-volume transactional sending where shared IP reputation is acceptable and per-email pricing is manageable.

For high-volume applications where IP reputation isolation, GDPR data residency, and full delivery data visibility are requirements, SMTP relay through managed our relay infrastructure is the architecturally correct choice.

SMTP Relay Monitoring and Incident Response

A managed SMTP relay requires the same daily monitoring discipline as dedicated bulk email infrastructure. The relay is the delivery layer for all applications — if the relay experiences a deliverability" style="color:#6A47ED;text-decoration:none;border-bottom:1px dashed #6A47ED50">deliverability problem (IP blacklisting, ISP block, authentication failure), every application injecting through it is affected simultaneously.

  • Daily accounting log review: Per-application deferral" style="color:#6A47ED;text-decoration:none;border-bottom:1px dashed #6A47ED50">deferral rate. Per-ISP deferral rate across all applications. Any unusual volume spikes that might indicate unauthorized injection.
  • Authentication monitoring: DKIM signing verification (daily test message checking Authentication-Results headers). SPF pass rate from DMARC aggregate reports. Any authentication failures in DMARC forensic reports.
  • Per-IP blacklist" style="color:#6A47ED;text-decoration:none;border-bottom:1px dashed #6A47ED50">blacklist monitoring: All relay IPs checked daily against 50+ blacklists. A blacklisting on a relay IP affects every application using that relay — early detection is critical.
  • Application injection anomaly detection: Volume spike from a specific application credential may indicate the application was compromised and is being used for unauthorized sending. Per-credential monitoring enables rapid detection.

SMTP Relay Incident Response: What Happens When Something Goes Wrong

When a relay IP is blacklisted or blocked at an ISP, Cloud Server for Email's incident response process: (1) Alert to client within 1 hour of detection. (2) Reroute traffic to clean IPs immediately to restore delivery. (3) Investigate root cause in accounting log and application injection data. (4) Submit blacklist removal request with remediation evidence. (5) Post-incident report with root cause and prevention recommendations.

P1 incidents (relay completely down, zero delivery) are responded to 24/7. P2 incidents (significant delivery degradation, ISP block) within 4 hours. See the Service Level Agreement for full incident response commitments.

SMTP Relay Pricing and Plans

SMTP relay is included in all Cloud Server for Email managed infrastructure plans. Clients with existing application infrastructure who need only the relay layer (not MailWizz campaign management) can subscribe to a relay-only configuration:

  • Relay Starter (€490/mo): 2 dedicated IPs, 200K messages/day capacity, DKIM/SPF/DMARC for 2 sending domains, daily monitoring.
  • Relay Professional (€790/mo): 5 dedicated IPs, 750K messages/day, DKIM/SPF/DMARC for up to 10 sending domains, FBL processing, daily monitoring, 24h support.
  • Relay Enterprise (€1,490/mo): 10 dedicated IPs, unlimited applications, per-application monitoring, 4h incident SLA, dedicated engineer.

Custom relay configurations (specific IP counts, domain counts, or geographic routing requirements) are available. Contact infrastructure@cloudserverforemail.com.

Choosing an SMTP Relay: What Matters for Production Email Delivery

Organizations evaluating SMTP relay options encounter a wide range of products: shared ESP relay services (SendGrid, Mailgun APIs), managed dedicated relay (Cloud Server for Email), and self-managed open-source relay (Postfix as smarthost). The right choice depends on volume, compliance requirements, and the importance of delivery visibility.

For organizations that need to send more than 500,000 messages per month and for whom inbox placement performance directly affects business outcomes, managed dedicated relay infrastructure provides the IP reputation isolation, per-ISP configuration control, and delivery data visibility that shared relay services cannot. The accounting log data from our relay enables deliverability" style="color:#6A47ED;text-decoration:none;border-bottom:1px dashed #6A47ED50">deliverability optimization that is simply not possible with an API-only delivery service.

The additional operational overhead of managed relay infrastructure compared to a SendGrid API integration is the monitoring discipline: daily accounting log review, Postmaster Tools check, SNDS check. Cloud Server for Email handles this monitoring for all managed clients, reducing the operational burden to reviewing the weekly performance report we provide.

For a detailed comparison of relay options by volume tier and use case, see our PowerMTA vs Mailgun comparison and Postmark vs Dedicated Infrastructure comparison. The Email Infrastructure Glossary defines all technical terms referenced in this page and across the technical reference series.

Related Technical Resources

The Cloud Server for Email technical reference series provides operational depth that complements this service overview. The series is published from production infrastructure management experience — configurations, operational patterns, and delivery optimization approaches validated in live sending environments handling millions of messages daily.

Questions about SMTP relay configuration? The Cloud Server for Email infrastructure team provides technical assessments at no cost. Contact infrastructure@cloudserverforemail.com or +372 602-7190. Operating from the EU (EU) since 2015.

This page is maintained by the Cloud Server for Email infrastructure team and reflects production-validated information current as of 2026. Infrastructure specifications, pricing, and service details are subject to change; contact us for current information specific to your requirements. All infrastructure operates from EU-based dedicated servers in compliance with GDPR Article 28. Service Level Agreement · Infrastructure Specifications · Privacy Policy.

Why Cloud Server for Email for SMTP Relay Infrastructure

Any Application

Works with any SMTP-capable application, framework, or platform

Per-Domain DKIM

Separate keys per sending domain, managed rotation

High Throughput

our relay handles millions of relay messages per day

Full Audit Log

Per-message accounting log for every relayed message

Flat Monthly Pricing

No per-message fees — unlimited relay volume

EU Servers

GDPR data residency by design, DPA available

Cloud Server for Email operates from the EU (EU) and has managed dedicated email infrastructure since 2015. Every infrastructure client is assigned to a specific infrastructure engineer — not a support ticket queue. Our technical assessment process produces specific configuration recommendations for your sending program, not a generic plan selection. Contact infrastructure@cloudserverforemail.com to begin.

The full technical reference for email infrastructure is available across three interconnected series on this site: the PowerMTA technical reference (53 configuration articles), the MailWizz technical reference (50 configuration articles), and the operational notes series (134 engineering notes on production email infrastructure patterns). Together, these resources represent over a decade of accumulated technical knowledge from managing high-volume email infrastructure in production environments. All content is maintained by the Cloud Server for Email infrastructure team and reflects current production-validated practices.

Organizations evaluating dedicated email infrastructure can also use the Infrastructure Cost Calculator to model the 12-month cost comparison between current ESP pricing and dedicated infrastructure at their specific volume and plan tier. The calculator uses editable pricing fields to match quoted rates, not published list prices.

Infrastructure performance compounds over time. Organizations that establish well-configured, properly monitored dedicated infrastructure in 2026 will have IP and domain reputation histories in 2027 and 2028 that provide measurable competitive advantages in inbox placement. ISPs reward consistent, low-complaint, authenticated sending history with increasingly favorable treatment. The inverse is also true: organizations that operate on shared infrastructure or self-managed infrastructure without daily monitoring accumulate small reputation problems that compound into structural deliverability disadvantages over the same timeline. The infrastructure investment is not just an operational choice — it is a long-term reputation asset that appreciates with consistent compliant operation. Cloud Server for Email's managed infrastructure model ensures that this asset is built and protected through daily operational discipline, not just initial configuration. Every managed client environment is monitored by the same team, using the same daily protocols, for the duration of the engagement. The reputation history built on Cloud Server for Email infrastructure reflects years of consistent professional management — which is visible to ISPs in the same way that years of consistent compliant sending are visible.

Related Resources