Email Validation 3 - ValidateEmailFast
Improve Deliverability & Reduce Bounces
Email Validation performs over 50 checks and verifications and returns a simple pass/fail score that enables you to send emails with confidence, improving deliverability and reducing your bounce rate by up to 90%.
Protect Your Sender ReputationWith warning flags like bogus, vulgar, disposable, role, misspelling, screamer, honeypot, spam trap and known complainer, you can identify and automatically remove problematic emails that can damage your sender reputation.
We are the only email validation service to provide up-to-date reputation data for email service providers, ensuring the integrity of your emails.
Seamless Integration with Web FormsCapture accurate and up-to-date email addresses on your web forms to ensure critical information and marketing communications reach your customers and prospects.
Secure and CompliantWe do not store, share or sell your data. Period.
When comparing email validation services - know what is happening with YOUR data. Most email validation services will store your email data for their future use.
We understand that your data is your livelihood and it must be kept secure. We’ve invested in multiple state of the art data centers, manned 24x7x365. All sensitive data is encrypted and our redundant infrastructure ensures the highest levels of service availability. It is bank-grade security.View Security & Uptime Datasheet
- 24x7x365 manned state-of-art data centers
- 24x7x365 secured access to data centers
- Servers housed in locking cabinets, cages and suites
- Ingress and egress secured with electronic keycards, pin codes, biometric hand scans and mantraps
- 24x7x365 high resolution, motion-sensitive video surveillance
- Fully redundant power and HVAC
- Fire-threat detection and suppression
- No copies of your real-time data nor your responses are stored
- Sensitive data like customer information is encrypted
- All connections can use SSL with a minimum of 128-bit symmetric encryption and a 1024-bit authenticated key agreement
- Multi-layer perimeter security is provided by a pair of modern firewalls running latest firmware
- Hourly perimeter scans ensure security
- Continuous layer-3 monitoring of firewalls and load balancers provides real-time proactive security information
- Servers run on hardened Windows servers with the latest security patches
- Servers have been penetration tested
- Redundant switches, firewalls, load balancers, servers and backup systems ensure high availability
See How Clean and Accurate Contact Data Impacts Your Business
With over 20 years’ experience, our comprehensive suite of global data quality solutions enables your business to:
- Respond to Actionable Scoring on Global Leads
- Ensure Delivery Accuracy
- Determine and Eliminate Fraud at the Point of Entry
- Enhance the Performance of Sales and Marketing Platforms
- Gain Insight on Customers and Prospects
- Standardize Data for Compliance
Understanding the Nomenclature
No matter the industry, you likely have jargon or terminology that’s specific to the work you do. The email world has a nomenclature all of its own, too. Understanding the lingo can keep you on the right side of the email servers.
To read about the key terms that can help you make the most of your email marketing efforts check out our blog:Learn More
JSON Request URL
XML Request URL
Overview of How it Works
These are the essential checks that are performed by each operation. The service operation steps through each section to determine if an email is valid. If one step fails, subsequent checks are not made because they have been logically eliminated. Example: if the syntax on an email fails, neither the DNS nor the SMTP check is done.
Step 1: Email Correction - The email is first cleaned and corrected before being validated and verified. Extraneous text and characters are removed and common email deformities are fixed. Typos, misspellings as well as incomplete domains are also corrected.
Step 2: Syntax Check - The email is tested to verify that the format is valid, such as an "@" symbol, a domain, and no odd characters that aren't allowed in email addresses. The rules specific to the domain are also checked. For example, if you input email@example.com it will pass the syntax check but fail the domain specific syntax check, and therefore we do not need to continue with the DNS or SMTP level checks.
Step 3: DNS Check - The DNS or domain name check verifies that the domain exists and has a valid MX record in order to relay mail.
Step 4: SMTP Check - Once we obtain the location of the mail server from a successful DNS check, we start communicating with the target mail server. No email is actually sent to the email address being verified. This step gives us three pieces of information. It tells us if the server is working, if it will accept any address, and if will it accept this specific address. One difficulty of email validation is dealing with the defensive behaviors of email servers. Because of the growth of spam and email-mining tools, SMTP servers often respond to requests for information in cryptic and defensive ways. Mail servers may respond very slowly to information requests, provide unhelpful data, or sometimes no data at all. We have carefully crafted our system with this in mind, and therefore the data we return is still very accurate. However, sometimes we are still forced to return an unknown result for some of the SMTP level checks.
Step 5: Integrity Checks - A deliverable email address is not always a good email address. Just because an email does not bounce back does not mean that it was received, and so our service performs a variety tests and checks to evaluate the integrity of an email address. For example an email address may be a disposable address that is only temporarily deliverable or worst yet a spam trap.