Jump to content
IPSHelp.Ru

Proxy, VPN & Disposable Email Blocker 1.1.0

2,500.00 RUB

   (0 reviews)

15 Screenshots

About This File

The Proxy, VPN & Disposable Email Blocker application allows you to detect registrations made using one-time or incorrect email addresses, proxy, VPN, Tor, dangerous IP addresses, as well as IP addresses from certain countries. Flexible settings allow you to take different actions depending on the threat found.

Integrations

The application uses Email Verifier and Validator.pizza for email address validation, as well as IPS GeoIPIP Intelligence and ipdata for IP address validation.

  • Email Verifier detects disposable (one-time) and invalid email addresses, as well as non-existent domains. Requires free API key.
  • Validator.pizza detects disposable (one-time) and invalid email addresses, as well as aliases.
  • IPS GeoIP detects user's country. Requires an active Invision Community license.
  • IP Intelligence determines whether a user uses a proxy, VPN, or Tor.
  • ipdata determines whether a user uses a proxy, VPN, Tor, anonymous or threat IP address, detects user's country. Requires free API key. Has free plan for non-commercial use.

Application Detects

  • Disposable email address – services for one-time inbox, such as temp-mail.us.
  • Invalid email address – when domain doesn't exists or has no MX records.
  • Alias email address – when one inbox has more than one address. For example, user@yandex.ru also have aliases user@ya.ru, user@yandex.by, user@yandex.kz.
  • Public proxy, VPN services and Tor nodes.
  • Anonymous and threat IP addresses.
  • User's country via IP geolocation.

Features

  • Flexible threats configuration. You can enable only the necessary services and catch only the threats that are important to you. For example, you can only enable blocking registrations from certain countries or hold registrations made using a proxy for manual approval. You can also enable all services at once and block all threats at once if you want.
  • Flexible actions configuration. Each threat has its own action to be taken. This means you can configure application, for example, to block registration via Tor, ban users if they're using a proxy, and hold users from certain countries for manual approval.
  • Email validation works when you register and change your email address in your profile, and IP validation works when you register.
  • Email and IP address validation logs. You can always check out which email and IP addresses were checked, which threats were found, and what action was taken. You can also see the full response from the services in JSON format.
  • Caching service responses. Responses from validation services are cached for a period of 24 hours. This means that subsequent validations of the same email or IP addresses will not cause repeated requests. This is necessary to reduce API requests and increase validation speed.

Additional Information

  • IP Intelligence requires email address for API requests. Application will use your incoming email address.
  • Some services have requests limit. Check out services' documentation for more information.
  • Email Verifier and ipdata require free API key.

Feedback

Application is actively maintained. If you have suggestion or feature request - feel free to let me know at ilya@ipshelp.ru.


What's New in Version 1.0.0   See changelog

Released

No changelog available for this version.


User Feedback

You may only provide a review once you have downloaded the file.

There are no reviews to display.

×
×
  • Create New...