Email Address Syntax Check: This removes improperly formatted email addresses, according to IETF standards.
Domain/MX Records Check: This verifies the DNS entriesof an email address. If a domain is found to be invalid, or an MX entry is missing, this process marks the corresponding email address as invalid.
Role-Based Account Detection: Email sends to role-based such as [email protected], [email protected], [email protected], [email protected], etc. can negatively impact your deliverability, and even blacklist you with some ISPs. This process detects and flags such addresses.
Disposable Email Address (DEA) Detection: Throwaway/disposable email addresses, or “junk collector” email addresses,” are detected and processed
appropriately. These are usually used for signup forms or to bypass login forms which require a valid email address.
Honeypot/ Spam Trap Detection: This detects spam seeds, BOTs, honeypots, blacklisted, or bogus email addresses by checking the addresses in the list
against the known list of email addresses/domains, used for trapping spammers.
Checking DNSBLs and URI DNSBLs for blacklisting: A DNS-based blackhole list (DNSBL) or Real-time Blackhole List (RBL) is a list of IP addresses often used for spamming. A URI DNSBL is a DNSBL that lists domain names which have been found in the body of spam email messages but generally, have not been found inside legitimate messages. In the process, email addresses and IP addresses are checked against known DNSBLs and URI DNSBLs to trap spam networks.
Final Verification: This phase performs deep-level extended SMTP verifications on each email address. The addresses will be pinged for mailbox existence without sending an actual email to the inbox.