About This File
The Proxy, VPN & Disposable Email Blocker application allows you to detect registrations made using one-time or incorrect email addresses, proxy, VPN, Tor, dangerous IP addresses, as well as IP addresses from certain countries. Flexible settings allow you to take different actions depending on the threat found.
- Email Verifier detects disposable (one-time) and invalid email addresses, as well as non-existent domains. Requires free API key.
- Validator.pizza detects disposable (one-time) and invalid email addresses, as well as aliases.
- IPS GeoIP detects user's country. Requires an active Invision Community license.
- IP Intelligence determines whether a user uses a proxy, VPN, or Tor.
- ipdata determines whether a user uses a proxy, VPN, Tor, anonymous or threat IP address, detects user's country. Requires free API key. Has free plan for non-commercial use.
- Disposable email address – services for one-time inbox, such as temp-mail.us.
- Invalid email address – when domain doesn't exists or has no MX records.
- Alias email address – when one inbox has more than one address. For example, firstname.lastname@example.org also have aliases email@example.com, firstname.lastname@example.org, email@example.com.
- Public proxy, VPN services and Tor nodes.
- Anonymous and threat IP addresses.
- User's country via IP geolocation.
- Flexible threats configuration. You can enable only the necessary services and catch only the threats that are important to you. For example, you can only enable blocking registrations from certain countries or hold registrations made using a proxy for manual approval. You can also enable all services at once and block all threats at once if you want.
- Flexible actions configuration. Each threat has its own action to be taken. This means you can configure application, for example, to block registration via Tor, ban users if they're using a proxy, and hold users from certain countries for manual approval.
- Email validation works when you register and change your email address in your profile, and IP validation works when you register.
- Email and IP address validation logs. You can always check out which email and IP addresses were checked, which threats were found, and what action was taken. You can also see the full response from the services in JSON format.
- Caching service responses. Responses from validation services are cached for a period of 24 hours. This means that subsequent validations of the same email or IP addresses will not cause repeated requests. This is necessary to reduce API requests and increase validation speed.
- IP Intelligence requires email address for API requests. Application will use your incoming email address.
- Some services have requests limit. Check out services' documentation for more information.
- Email Verifier and ipdata require free API key.
Application is actively maintained. If you have suggestion or feature request - feel free to let me know at firstname.lastname@example.org.
What's New in Version 1.2.1 See changelog
No changelog available for this version.