{"id":823,"date":"2024-09-16T08:46:24","date_gmt":"2024-09-16T06:46:24","guid":{"rendered":"https:\/\/mailnjoy.com\/blog\/?p=823"},"modified":"2026-04-24T11:30:00","modified_gmt":"2026-04-24T09:30:00","slug":"how-to-verify-an-email-address","status":"publish","type":"post","link":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/","title":{"rendered":"How to verify an email address"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Content<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#In-house_email_verification_expertise\" title=\"In-house email verification expertise\">In-house email verification expertise<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Basics_of_email_verification\" title=\"Basics of email verification\">Basics of email verification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Mandatory_steps_to_verify_an_email_address\" title=\"Mandatory steps to verify an email address\">Mandatory steps to verify an email address<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Specific_case_of_catchall_emails\" title=\"Specific case of catchall emails\">Specific case of catchall emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Possible_additional_steps_in_email_address_verification\" title=\"Possible additional steps in email address verification\">Possible additional steps in email address verification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Differentiate_a_technically_valid_email_address_from_a_real_person\" title=\"Differentiate a technically valid email address from a real person\">Differentiate a technically valid email address from a real person<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Behavioral_attributes_of_email_addresses\" title=\"Behavioral attributes of email addresses\">Behavioral attributes of email addresses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Can_you_create_your_own_email_verification_tool\" title=\"Can you create your own email verification tool ?\">Can you create your own email verification tool ?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#Synthesis_about_how_to_verify_an_email_address\" title=\"Synthesis about how to verify an email address\">Synthesis about how to verify an email address<\/a><\/li><\/ul><\/nav><\/div>\n\r\n<h2><span class=\"ez-toc-section\" id=\"In-house_email_verification_expertise\"><\/span><span style=\"color: #000000;\">In-house email verification expertise<br \/><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-size: 14pt;\">At Mailnjoy, we have technical expertise in <a href=\"https:\/\/mailnjoy.com\/check\/en\">verifying email addresses<\/a>.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Nowadays, even if it&#8217;s easy to find many articles on any subject, especially<b> <\/b>thanks to the Internet and books, we nevertheless believe that the best person to answer a specific question is someone who has made the subject his speciality, and who will therefore be able to provide factual elements that are more accurate and precise than generalist articles.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">So if you want to learn the best tips on &#8220;how to make good bread&#8221;, the most reliable answer is to ask that question to a good baker who makes hundreds of breads every day and really knows what he&#8217;s talking about.<br \/><\/span><span style=\"font-size: 14pt;\">Well, the same goes for &#8220;<b>how to verify an email address<\/b>&#8220;: Mailnjoy verifies millions of them every day thanks to its own technical engine, and today <b>we&#8217;re going to give you all the details and secrets<\/b> <b>so you can fully understand how it all works<\/b>.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">In particular, you&#8217;ll discover which steps are mandatory to test the validity of an email address, which steps are optional (used by some email verifier only), which specific extensions are proposed by some email checkers only to differentiate from other tools, or why some email addresses are &#8220;safe&#8221;, or why others will always remain &#8220;risky&#8221; despite our best efforts&#8230; in short,<strong> lots of tips and concrete facts, which you won&#8217;t read anywhere <\/strong><\/span><span style=\"font-size: 14pt;\"><strong>else<\/strong>, so that verifying an email address really has no more secrets for you! <br \/><br \/>We&#8217;ll start our analysis by detailing the most classic steps in email verification (common to all email verification tools), then we&#8217;ll go into detail on the specialized steps, offered only by certain higher-quality email checkers.<br \/><\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Basics_of_email_verification\"><\/span><span style=\"font-size: 14pt;\"><br \/><\/span><span style=\"color: #000000;\">Basics of email verification<br \/><br \/><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-size: 14pt;\">For this point, we invite you to first read the topic <a href=\"https:\/\/mailnjoy.com\/blog\/en\/identify-reliable-email-verifier\/\">how to recognize a reliable email verifier<\/a>, in order to discover the key elements that any good <a href=\"https:\/\/www.smartlead.ai\/blog\/best-email-verification-tools\">email verification tool<\/a> should present. These basics are the necessary foundation for any reliable email verification solution, and will be appended by the technical elements discussed in this article.<br \/><br \/><\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Mandatory_steps_to_verify_an_email_address\"><\/span><span style=\"color: #000000;\">Mandatory steps to verify an email address<\/span><br \/><br \/><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-822\" src=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/obligatoire-logo-300x268.jpg\" alt=\"mandatory steps email verification\" width=\"310\" height=\"277\" srcset=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/obligatoire-logo-300x268.jpg 300w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/obligatoire-logo.jpg 722w\" sizes=\"(max-width: 310px) 100vw, 310px\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><span style=\"font-size: 14pt; color: #000000;\">a) <span style=\"text-decoration: underline;\">Email address format check<\/span><\/span><br \/><br \/><br \/><\/h3>\r\n<p><span style=\"font-size: 14pt;\"><b>The very first step in verifying an email address is to check that it <\/b><b>has<\/b><b> a valid format<\/b>: the SMTP protocol has defined the rules about what can and cannot constitute an email address. These elements are checked by the email verifiers:<br \/><br \/><\/span><span style=\"font-size: 14pt;\"><strong>*<\/strong> check that the e-mail address contains an &#8220;@&#8221; character (and not several times this character), which must be both preceded and followed by other characters<br \/><br \/><strong>*<\/strong><\/span> <span style=\"font-size: 14pt;\">check that the total number of characters in an email address does not go beyond 254 (beyond this limit, the e-mail is not correct)<br \/><br \/><\/span> <strong><span style=\"font-size: 14pt;\">*<\/span><\/strong> <span style=\"font-size: 14pt;\">the characters after the &#8220;@&#8221; represent the domain, which must be made up of a non-empty character string, followed by a dot, followed by an extension. If one of these elements is missing or is not in the expected format, then the email will not be correct.<br \/><br \/><\/span> <strong><span style=\"font-size: 14pt;\">*<\/span><\/strong> <span style=\"font-size: 14pt;\">the characters before the &#8220;@&#8221; sign represent<b> <\/b>the &#8220;username&#8221; part of the email: this must not be of zero size (\u2265 1 character).<br \/><br \/><\/span><span style=\"font-size: 14pt;\"><u>Note<\/u>:<strong> there is no size limit on the username part (only the email address total size of 254 characters maximum must be respected)<\/strong>, but in the real life it is strongly advised to stay below 64 characters. The longer the email address, the more complex it will be to spell it orally to someone, and the greater the risk of making a typographical error, which is why <b>99% of email addresses created are less than 48 characters long, <\/b><b>making <\/b> <b>them easily <\/b><b>&#8220;understandable&#8221; and readable by a human<\/b>.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">On the opposite, an very long email address will seems obviously strange to you, and anyone can already assume that it&#8217;s not normal (and won&#8217;t be confident to write on it) when looking at it. For example:<br \/><br \/><\/span><span style=\"font-size: 14pt;\"><em>thisadressisanexampleofverylongandcomplexusernamewhichdontreallygivetrustandmotivationtowriteonitbuttechnicallyspeakingitcouldbeavalidemailadressisntitfunny.58742478521@example.com<\/em><br \/><br \/><\/span><span style=\"font-size: 14pt;\">Indeed, even if this email address is technically correct according to it&#8217;s size (and could therefore be a &#8220;technically valid&#8221; email if the mailbox exists), it&#8217;s unlikely that you&#8217;d consider it to be trustworthy, is it? \ud83d\ude09<br \/><br \/><strong>*<\/strong><\/span> <span style=\"font-size: 14pt;\">check that there are no unauthorized characters in the username or domain.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Typically,<b> you&#8217;ll regularly come across email addresses that have been spelled with accents<\/b> (which are not allowed), or character encoding problems in a list of email addresses that have erased some characters and replaced them with a &#8220;?&#8221;.<br \/><\/span><span style=\"font-size: 14pt;\">The only allowed characters are:<br \/><br \/><\/span> <strong>*<\/strong> <span style=\"font-size: 14pt;\">letters from &#8220;a&#8221; to &#8220;z&#8221;<br \/><\/span> <strong>*<\/strong> <span style=\"font-size: 14pt;\">numbers from &#8220;0&#8221; to &#8220;9&#8221;<br \/><\/span> <strong>*<\/strong> <span style=\"font-size: 14pt;\">the special characters that are allowed: &#8221; . -&#8220;, &#8220;_&#8221;, &#8220;+&#8221;<br \/><br \/><\/span><span style=\"font-size: 14pt;\"><u>Note<\/u>: contrary to popular belief, <b>the case of an email address has no influence<\/b>: PIERRE@example.com is the same email address as pierre@EXAMPLE.COM . So there&#8217;s no need to check this aspect, and email addresses are often automatically converted to lower case after being verified for easier reading.<\/span><br \/><br \/><br \/><\/p>\r\n<h3><span style=\"font-size: 14pt; color: #000000;\">b) <span style=\"text-decoration: underline;\">Check if the domain associated with the email address is able to receive emails<\/span><\/span><br \/><br \/><br \/><\/h3>\r\n<p><span style=\"font-size: 14pt;\">Even if the email address format is correct, this does not mean that we can yet consider the email address to be valid. <b>The second mandatory step is <\/b><b>to <\/b><b>determine whether the receiving domain is able of receiving emails<\/b> (in a general way, on any existing mailbox).<br \/><br \/><\/span><span style=\"font-size: 14pt;\">To do this, we&#8217;re going to look at a domain-specific DNS field called the MX (Mail Exchanger). If this DNS record is non-existent or misconfigured, then the domain will not be able to receive any email, and we can conclude that the email address checked is necessarily invalid.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Example with domain &#8220;gmail.com&#8221;, for which the MX value is valid:<br \/><br \/><\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-821\" src=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/MX-google-color.jpg\" alt=\"DNS MX record\" width=\"679\" height=\"164\" srcset=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/MX-google-color.jpg 716w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/MX-google-color-300x72.jpg 300w\" sizes=\"(max-width: 679px) 100vw, 679px\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-size: 14pt;\">Sometimes, some domains do have an entry defined in their MX field, but it&#8217;s an incorrect configuration that doesn&#8217;t accept any email.<br \/><\/span><span style=\"font-size: 14pt;\">If someone asks to verify an email address on one of these faulty domains at this moment, the email verification tool will indicate that the email is invalid (and rightly so) because the domain doesn&#8217;t allow any email to be received. If the administrator of the faulty domain discovers and corrects the problem shortly afterwards, the email address will once again be usable and routable.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">This explains why some emails are considered invalid by an email verification tool, and then suddently the same email address starts working again shortly afterwards.<br \/><\/span><span style=\"font-size: 14pt;\"><b>As the email verifier takes a &#8220;snapshot&#8221; at a given moment <\/b><b>of which <\/b><b>email addresses <\/b><b>are <\/b><b>working and which <\/b><b> <\/b><b>are <\/b><b>not<\/b>, this &#8220;snapshot&#8221; proves to be accurate at that precise moment: the more time passes and the more changes are made to the various domains, the less representative this analysis will be of reality.<\/span><br \/><br \/><br \/><\/p>\r\n<h3><span style=\"font-size: 14pt; color: #000000;\">c) <span style=\"text-decoration: underline;\">Verify current email status<\/span><\/span><br \/><br \/><br \/><\/h3>\r\n<p><span style=\"font-size: 14pt;\">Now that we&#8217;ve verified both the email address format, and the fact that the receiving domain is able of receive emails (in general), it&#8217;s time to check whether the email address precisely requested actually exists.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">To carry out this verification, <b>we<\/b><b> use a direct connection to the SMTP server of the domain concerned<\/b> (some refer to this step as &#8220;pinging the email address&#8221;). <\/span><span style=\"font-size: 14pt;\"><b>This is the KEY step in order to find the status of the email address, and represents the basis of email verification techniques<\/b>.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">In practical terms, we&#8217;re launching a connection request to the email box, with the same commands (in SMTP language) as a webmail client (e.g. gmail) would use to send an email to a recipient. The main difference is that here the commands are sent as lines of code (in order to scan the remote server&#8217;s response lines) and that <b>SMTP communication is spontaneously stopped <\/b><u><b>before<\/b><\/u><b> the &#8220;send command&#8221; is given.<\/b><br \/><\/span><span style=\"font-size: 14pt;\">With this technique it is possible to get the mailbox status without having sent any real email (this is essential for an email verifier, which, it cannot be stressed enough, must NOT send any email to the addresses tested)<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Example of communication to check the SMTP status of an email address :<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-820 size-full\" src=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/SMTP-communication-color.jpg\" alt=\"SMTP communication commands\" width=\"1081\" height=\"372\" srcset=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/SMTP-communication-color.jpg 1081w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/SMTP-communication-color-300x103.jpg 300w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/SMTP-communication-color-1024x352.jpg 1024w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/SMTP-communication-color-768x264.jpg 768w\" sizes=\"(max-width: 1081px) 100vw, 1081px\" \/><\/p>\r\n<p><br \/><br \/><span style=\"font-size: 14pt;\"><b>The complexity of this step lies in being able to correctly interpret the technical code returned by the remote server<\/b>, and thus to accurately determine whether the remote server is indicating that the email exists or not.<br \/><\/span><span style=\"font-size: 14pt;\">In theory, these response codes are standardized (and should therefore be easy to recognize), but in the real life we soon realize that many servers do not follow these standards, and send back response codes that are sometimes even inverted! (for example, indicating that the mailbox is valid, when in fact it is invalid, or the opposite).<br \/><\/span><span style=\"font-size: 14pt;\">This situation implies that you need map countless SMTP servers around the world and recognize their own response codes&#8230; Failure to do so will result in a high rate of false positives or false negatives, taking away all the benefits from the email address verification process.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">It should also be noted that checking the SMTP status of an invalid email address is equivalent to having generated a hard bounce (for the receiving domain concerned). The important point to<b> <\/b>understand here is that <b>the email verifier tool will therefore have the same difficulties and possible blockages of its domains and sending IPs as any advertiser<\/b> who has sent too many invalid emails, and will then find itself blocked in its verification actions.<br \/><\/span><span style=\"font-size: 14pt;\">The creation of an email verifier tool therefore requires the implementation of a sufficiently complex and resilient architecture to be able to continue verifying email addresses even in the presence of a large number of invalid emails every day.<br \/><br \/><\/span><span style=\"font-size: 14pt;\"><u>Note<\/u>: an interesting historical fact to note is that when it was created, the SMTP protocol defined a specific directive enabling an email address to be verified without sending an email to it: this was the VRFY (sender verify) command. However, having to deal with an increasing spam issues, where some malicious actors send a maximum number of emails with unwanted content, almost all SMTP servers worldwide have voluntarily deactivated this function, making it impossible to obtain the status of an email address through this directive (even though it was designed for this purpose in the beginning).<\/span><br \/><br \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Specific_case_of_catchall_emails\"><\/span><span style=\"color: #000000;\">Specific case of catchall emails<\/span><br \/><br \/><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-size: 14pt;\">Some domains have a special operating mode enabled that makes the previous SMTP connection step unusable: these are so-called &#8220;catchall&#8221; domains.<br \/><\/span><span style=\"font-size: 14pt;\"><b>These domains have an SMTP server configured <\/b><b>so<\/b><b> <\/b><b>that it accepts ALL <\/b><b>incoming <\/b><b>emails<\/b>, regardless of the username part.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">So, on these specific domains, if for example you send a message to the following emails, <strong>they will all be accepted by the server and will not generate a hard bounce<\/strong>:<br \/><br \/><\/span><span style=\"font-size: 14pt;\">stone @ CATCHALL-DOMAIN.COM<br \/><\/span><span style=\"font-size: 14pt;\">fakeemail @ CATCHALL-DOMAIN.COM<br \/><\/span><span style=\"font-size: 14pt;\">contact @ CATCHALL-DOMAIN.COM<br \/><\/span><span style=\"font-size: 14pt;\">thisisabademail @ CATCHALL-DOMAIN.COM<br \/><\/span><span style=\"font-size: 14pt;\"><br \/>This technical specificity means that on this type of domain, it will not be possible to &#8220;easily&#8221; determine whether an email address exists or not. Indeed, <b>just because there is no bounce generated when an email is sent,<\/b><b> this does not mean that the address checked truly exists<\/b>, and even less that the emails that might be sent to it will be actually read by someone.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">In addition, a number of these domains are even more complex to check, as some are in fact &#8220;false-catchalls&#8221;: they behave like a catchall domain during the SMTP phase, but can still generate a hard bounce when an email is <u>ACTUALLY<\/u> sent.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">So, there is a double risk in using an email classified as &#8220;catchall&#8221;: a risk of lower engagement (i.e. sending to an email box that will not be read by anyone) and a risk of hard bounce (if it is a &#8220;false-catchall&#8221; domain)<br \/><br \/><\/span><span style=\"font-size: 14pt;\">This is why emails which belongs to the<b> <\/b><b> <\/b> catchall category are often risky to use. In order to reduce this risk and make it more acceptable to users, high-quality email verifier are gradually implementing<b> <\/b>innovative solutions, which we&#8217;ll discuss later.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Possible_additional_steps_in_email_address_verification\"><\/span><span style=\"color: #000000;\">Possible additional steps in email address verification<br \/><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-size: 14pt;\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-819\" src=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/loupe-email-petit.jpg\" alt=\"additional steps email verification\" width=\"194\" height=\"192\" srcset=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/loupe-email-petit.jpg 463w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/loupe-email-petit-300x297.jpg 300w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/loupe-email-petit-60x60.jpg 60w\" sizes=\"(max-width: 194px) 100vw, 194px\" \/><br \/><br \/><br \/>Now that we&#8217;ve completed the mandatory steps for verifying an email address (which, overall, classify emails into 3 categories: <b>SAFE \/ RISKY \/ UNSAFE<\/b>), we&#8217;re going to list here <strong>the additional steps used by some of the best-quality email verifier<\/strong>, which bring more accuracy into the classification process:<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Inbox full detection :<\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">This step allows us to determine which email addresses are technically valid but have exceeded their maximum storage quota. They will generate a &#8220;soft bounce&#8221; if an email is sent to them, and some of them<b> <\/b>may even become later a type of marketing trap known as &#8220;recycled spamtrap&#8221;.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Detection of disabled email :<\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt;\"><br \/><\/span><span style=\"font-size: 14pt;\">Some emails are technically valid, but their owners have not logged in for too long (or have had an abnormal behavior), resulting in their temporary deactivation. These boxes will make a soft or hard bounce depending on the requested domains, and even if they can be reactivated at any moment, they must be considered as invalid at the present time.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Classification of role-type email address :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">This step makes it possible to distinguish and sub-classify valid &#8220;function&#8221; emails from valid &#8220;individual&#8221; emails. This enables users to send role-based emails and individuals emails differently, as the engagement rates and related risks are different between these two types of emails (despite the fact that they are both technically valid).<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Analysis of the domain creation date :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">This step verify the creation date of the domain hosting the email address, in order to adjust the trust of the checked email according to this result.<br \/><\/span><span style=\"font-size: 14pt;\">Indeed, <b>a <\/b><b>recently <\/b><b>created <\/b> <b>domain <\/b><b>will tend <\/b><b>to <\/b><b>be more suspect than a long-established one<\/b>, as many spammers buy and use new domains every day to send large quantities of unwanted emails.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Verification of blacklist membership :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-family: Liberation Serif, serif;\"><span style=\"font-size: large;\"><br \/><span style=\"font-size: 14pt;\">Some email verifiers <strong>can also detect whether an email address has recently been used in a spam or phishing email campaign<\/strong>, and can identify this aspect during email verification.<\/span><br \/><span style=\"font-size: 14pt;\">Although this step can be useful, in reality spammers and hackers change email addresses very quickly, which makes it relatively difficult to keep blacklists up to date in real time. Nevertheless, this step can make it possible to avoid sending emails to these bogus email addresses, which would not be of any commercial interest to use anyway.<\/span><\/span><\/span><\/p>\r\n<p><span style=\"font-size: 14pt;\">\u00a0<\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>False-catchall domain detection :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">As we saw earlier, domains identified as catchall are sometimes &#8220;false-catchall&#8221; and can lead to a significant hard bounce rate if these emails are used. Some email verifiers can determine which catchall domains are most at risk (and give a bounce rate estimation on these one) to help customers make the right choice according to their sending strategy.<br \/><\/span><span style=\"font-size: 14pt;\">At Mailnjoy, we offer this specific classification of fake-catchall domains, which are called &#8220;protected emails&#8221; on our email verifier.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Cross-check validation of catchall emails:<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">In order to reduce the risk of catchall emails (and false catchall), some email verifiers use cross-checks with other tools (internal or external) to certify some email addresses of these statuses. These cross-checks often enable an additional percentage of email addresses to be certified with a good level of confidence (&lt; 5% bounce), thereby reducing the risk of using email catchalls by targeting only those that have <\/span><span style=\"font-size: 14pt;\">been certified.<br \/><\/span><span style=\"font-size: 14pt;\">Please note that <b>these cross-checks remain <\/b><b>theoretical<\/b><b> (without any email being sent), which <\/b><b>means that<\/b><b> it is impossible to have 100% reliability on these <\/b><b>addresses <\/b>(in reality, with a good email verifier, we&#8217;re talking about 95% reliability on these cross-checks).<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-check-circle\" style=\"color: green;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Catchall email validation with true email sending:<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">Because of the risky nature of catchall emails, some unscrupulous email verifiers have specialized in this technical niche of catchall email verification, by <b>implementing a validation technique that is normally totally banned from the operating principle: the actual sending of an email to the <\/b><b>tested mailboxes<\/b>.<br \/><\/span><span style=\"font-size: 14pt;\">This method, which violates all the rules of good practices and the laws of various countries, is often very expensive (and takes a long time to process), but can provide a greater confidence in detecting emails that are truly valid on these catchall domains.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Even if we mention how they work, so that the reader knows that they exist, <b>we absolutely do not recommend this type of solution<\/b>, which is not legal in itself, generates nuisance, and puts the people who use them at legal risk.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Differentiate_a_technically_valid_email_address_from_a_real_person\"><\/span><span style=\"color: #000000;\"><br \/>Differentiate a technically valid email address from a real person<br \/><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-size: 14pt;\"><br \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-818\" src=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/anonyme-1-300x245.jpg\" alt=\"person protecting real identity\" width=\"240\" height=\"196\" srcset=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/anonyme-1-300x245.jpg 300w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/anonyme-1.jpg 574w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><br \/><br \/>The previous steps have made it possible to classify email addresses, with varying degrees of accuracy and reliability, depending on the email verifier used.<br \/><\/span><span style=\"font-size: 14pt;\">The following steps, which are only carried out by good quality email verifiers, <b>go beyond simple technical validation, and <\/b><b>can <\/b><b>help identify email addresses that may not be truly associated with a human<\/b>.<br \/><\/span><span style=\"font-size: 14pt;\">These email addresses are generally of low marketing value, and have lower engagement metrics than those that may have been associated with a real person.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">The following analyses can be offered by some email verification tools to go beyond the technical criteria seen above:<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-shield-alt\" style=\"color: black;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Username reliability checking :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">The aim here is to <b>recognize suspicious patterns in email addresses<\/b>, by taking a closer look at the username part. If a suspicious keyword appears or if the format seems abnormally constructed, then it&#8217;s possible to indicate that the email address is suspicious despite the fact that, technically speaking, it passed the SMTP connection test.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">For example, if these three email addresses were technically valid, would you still think they could be used in your email marketing campaign?<\/span><\/p>\r\n<p><span style=\"font-size: 14pt;\">noreply @ example.com<br \/><\/span><span style=\"font-size: 14pt;\">spam @ example.com<br \/><\/span> l<span style=\"font-size: 14pt;\">.e.m.o.i.p.e.p.u.j.o.p.i.p.a.k.o.i.b.i.r.o.p.t.y @ example.com<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Here<b>,<\/b> it is obvious that these emails are not to be trusted and should not be used, as you would take higher risk to damage your own reputation.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-shield-alt\" style=\"color: black;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Disposable email detection :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">So-called &#8220;disposable&#8221; emails are emails belonging to<b> <\/b><b>specific domains that offer temporary email creation services<\/b>.<br \/><\/span><span style=\"font-size: 14pt;\">The aim of these services is to provide an email address that appears to be technically &#8220;valid&#8221;, so that it can be used by a person to sign-up on a website and gain the benefits associated with registration (time limited free usage of the service, free credits, free white paper, etc.), without the person having to give their real email address to do so.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">These services, <span class=\"--l --r sentence_highlight\">that boast about privacy and spam prevention<\/span> for their users&#8217; own email addresses, <b>make it easy for bad people to multiply registrations on sites to abuse free services<\/b>.<br \/><\/span><span style=\"font-size: 14pt;\">Usually benefiting from a very short lifespan (a few minutes to a few hours), these email addresses are then abandoned by their users and pollute companies&#8217; email lists.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">As new disposable email services are created every day, and as they regularly change the domains used to send their emails, their detection requires a high level of expertise from email verifiers in order to be able to recognize them correctly.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-shield-alt\" style=\"color: black;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Autogenerated email detection :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">In the same way as disposable emails, some bad users create multiple email addresses on free public ESPs (like gmail, outlook, yahoo, aol, etc.) <b>with the aim of abusing <\/b><b>a service without <\/b><b>paying for <\/b><b>it <\/b>, then abandon these mailboxes shortly afterwards.<br \/><\/span><span style=\"font-size: 14pt;\">Email address verification tools can therefore offer to detect and classify valid emails in a sub-category of &#8220;autogenerated&#8221; emails for the ones which display suspicious attributes.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">For example, the following emails (if technically valid) could quite easily be classified in this category by a good email verifier:<\/span><\/p>\r\n<p><span style=\"font-size: 14pt;\">l.e.m.o.i.p.e.p.u.j.o.p.i.p.a.k.o.i.b.i.r.o.p.t.y @ outlook.com<br \/><\/span> <span style=\"font-size: 14pt;\">james123456789@ gmail.com<br \/>xwbntgzwaploikjgtfrvbn@ aol.com<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-shield-alt\" style=\"color: black;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Marketing spam or spamtrap email detection :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">Detecting spamtrap<b> is a complex analysis, due to the multiple and difficult-to-identify nature of such emails<\/b>.<br \/><\/span><span style=\"font-size: 14pt;\">Most email verifiers are able to detect some types of spamtrap (mainly typographical spamtrap or recycled spamtrap), but they can hardly detect all those present on a given email list.<br \/><\/span><span style=\"font-size: 14pt;\">It is therefore advisable to be cautious about false claims made by some email checkers to detect all spamtrap, which in reality are more often marketing arguments than a true ability to perform this<b> <\/b>action.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-shield-alt\" style=\"color: black;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Cross-referencing and cross-analyses :<\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt;\"><br \/><br \/><\/span><span style=\"font-size: 14pt;\">To go beyond the technical validity of an email address, another possibility is to look at the connections it<b> <\/b>may have with other platforms. <b>Data cross-analysis, for example, can reveal whether an email address is associated with one or more social networks<\/b>, or even one or more e-commerce platforms, video platforms, etc.<br \/><\/span><span style=\"font-size: 14pt;\">The presence of an email in one or more specific categories can help to determine whether the address belongs to a person, thus increasing confidence in its commercial value.<br \/><br \/><\/span><\/p>\r\n<h3><b><i class=\"fas fa-shield-alt\" style=\"color: black;\"><\/i><\/b>\u00a0 <span style=\"font-size: 14pt; color: #000000;\"><b>Look at last open value or the last click value of an email :<br \/><\/b><\/span><\/h3>\r\n<p><span style=\"font-size: 14pt; color: #000000;\"><b><br \/><\/b><\/span><span style=\"font-size: 14pt;\">Thanks to partnership with various email routers, some email verification tools have recently been able to <b>provide informations on the &#8220;last open&#8221; or &#8220;last click&#8221; date associated with a specific email address<\/b>.<br \/><\/span><span style=\"font-size: 14pt;\">Although this data is subjective (as it relates to a specific router which only has its own personal view on opens and clicks), this metric can also help gain confidence in the email addresses tested.<br \/><\/span><span style=\"font-size: 14pt;\">However, the reliability of this new technique must be balanced against the fact that even bots can easily open or click on links, and so <b>these metrics in no way rule out the possible presence of a bot on an email address with a recent open or click date<\/b>.<\/span><br \/><br \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Behavioral_attributes_of_email_addresses\"><\/span><span style=\"color: #000000;\">Behavioral attributes of email addresses<\/span><br \/><br \/><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-size: 14pt;\">Among the criteria used by email routers to determine whether a list of email contacts presents a risk (and whether it should be rejected or blocked when a customer uploads it onto their platform), we find both technical criteria and more subjective criteria linked to <\/span><span style=\"font-size: 14pt;\">behavioral <\/span><span style=\"font-size: 14pt;\">aspects<\/span><span style=\"font-size: 14pt;\">.<br \/><\/span><span style=\"font-size: 14pt;\">So<b> a list <\/b><b>in which the contacts <\/b><b>are all valid (technically speaking), and <\/b><b>therefore <\/b><b>presenting<\/b><b> <\/b><b>only a very low risk of hard bounce, can sometimes be rejected by an email router for no apparent reason<\/b>. This situation is often misunderstood by customers who don&#8217;t understand why this particular list, which is of good quality, is not accepted by a router (notably Sendinblue \/ Brevo router, which is quite sensitive on that point), but will be<b> <\/b>accepted and routed<b> <\/b>correctly by a competing router.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">The explanation lies in <b>factors internal to each router, through the history of behavior that these email addresses have had up to now<\/b>.<br \/><\/span><span style=\"font-size: 14pt;\">If, for example, there are enough email addresses in your list that the router has already tried to send an email to X times before, and their open\/click rate is below the median threshold for conventional email addresses, then the router may consider that the contacts provided are not of good quality and freely decide not to accept this list.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Similarly, if the contacts on this list contain several emails on which the router has so far observed<b> <\/b>an excessively high complaint rate (in comparison with the average for other email addresses), the router may decide that these contacts could be detrimental to it, and prefer to block the list import by indicating that it is not of good quality.<br \/><\/span><span style=\"font-size: 14pt;\"><b>Unlike the technical elements of email validation, these are far more subjective criteria<\/b>, as the email addresses are all technically valid.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">To overcome this type of blockage, some email verifiers also offer to carry out a &#8220;behavioral&#8221; level of verification through partnerships with email routers.<br \/><\/span><span style=\"font-size: 14pt;\">Mailnjoy offers this specific analysis on request<b> <\/b>for those who continue to have persistent blockages of their email lists with a router, despite a technical clean-up previously carried out.<\/span><br \/><br \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Can_you_create_your_own_email_verification_tool\"><\/span><span style=\"color: #000000;\">Can you create your own email verification tool ?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-size: 14pt;\">A question we&#8217;re often asked is: &#8220;Is it really that difficult to make our own email address verification tool?&#8221;.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">Well, to answer that question, I&#8217;d say that nothing is impossible for anyone who&#8217;s willing to really put in the time and has the motivation!<br \/><\/span><span style=\"font-size: 14pt;\"><b>Building an email address verification tool is therefore entirely feasible, but it will all depend on the amount of time and resources you&#8217;re willing to allocate to the project<\/b>. As you will have seen from this article, it will also very much depend on the level of reliability and accuracy you want to have on your email verifier, and the volume of emails you need to check every day.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">If your interest is only an internal need for your own company (which processes data on a daily basis), then you&#8217;ll probably be better off using an already existing tool specialized in email address verification, as the total cost will be much lower.<br \/><\/span><span style=\"font-size: 14pt;\">If, on the other hand, you want to become a new player in the Emailing ecosystem and offer an email verification service to your own customers, then the article you&#8217;ve just read should have given you a significant source<b> <\/b>of useful technical information to get you started.<br \/><\/span><span style=\"font-size: 14pt;\">Depending on the level of accuracy \/ granularity of the planned email verifier, and whether you choose to build your own technical engine (or use the engine of another white-label solution), <b>the time and effort required to build your email verifier can vary greatly<\/b>.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">In any case, keep in mind that emailing takes time to grasp the concepts, and that like any other profession, it&#8217;s only with time and persistent commitment that you&#8217;ll achieve your goals.<\/span><br \/><br \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"Synthesis_about_how_to_verify_an_email_address\"><\/span><span style=\"color: #000000;\">Synthesis about how to verify an email address<br \/><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><br \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-817\" src=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/solution-1-1024x809.jpg\" alt=\"article conclusion\" width=\"608\" height=\"480\" srcset=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/solution-1-1024x809.jpg 1024w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/solution-1-300x237.jpg 300w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/solution-1-768x607.jpg 768w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/solution-1-1536x1213.jpg 1536w, https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/solution-1.jpg 1595w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><br \/><br \/><\/p>\r\n<p><span style=\"font-size: 14pt;\">This article is now drawing to a close, and I hope it will have allowed the more curious among you (if you have come this far, that means you are!) to really understand the different layers behind email verification, and thus to demystify the concept somewhat.<br \/><br \/><\/span><span style=\"font-size: 14pt;\"><b>There&#8217;s nothing magical about email verification, it&#8217;s a profession, an expertise that can be learned and honed with time and passion<\/b>. So I hope I&#8217;ve passed on a little of that passion for a job well done that we have at Mailnjoy, and our daily commitment to helping people who work in emailing to do so with joy and pleasure. Because not only can emailing be fun and enjoyable, as long as you understand the concepts behind it and know how to use it in the <\/span><span style=\"font-size: 14pt;\">right way, it&#8217;s also highly profitable, and will probably remain a wonderful communication and marketing channel for a long time to come.<br \/><br \/><\/span><span style=\"font-size: 14pt;\">And as always, don&#8217;t hesitate to <a href=\"https:\/\/mailnjoy.com\/blog\/en\/contact-us\/\">contact us<\/a> if you&#8217;d like to talk to our technical teams or benefit from our expertise to verify your email addresses.<br \/><br \/><\/span><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>In-house email verification expertise &nbsp; At Mailnjoy, we have technical expertise in verifying email addresses. Nowadays, even if it&#8217;s easy to find many articles on any subject, especially thanks to the Internet and books, we nevertheless believe that the best person to answer a specific question is someone who has made the subject his speciality, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":816,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"no","footnotes":""},"categories":[29],"tags":[],"class_list":["post-823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to verify an email address<\/title>\n<meta name=\"description\" content=\"Full report : how to verify an email address. All the techniques and tips explained in detail about email verification\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to verify an email address\" \/>\n<meta property=\"og:description\" content=\"Full report : how to verify an email address. All the techniques and tips explained in detail about email verification\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Mailnjoy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Mailnjoy\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-16T06:46:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T09:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1125\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Renaud Garelli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Renaud Garelli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/\"},\"author\":{\"name\":\"Renaud Garelli\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/#\/schema\/person\/20e33e4550051bf4aae4790b49bea965\"},\"headline\":\"How to verify an email address\",\"datePublished\":\"2024-09-16T06:46:24+00:00\",\"dateModified\":\"2026-04-24T09:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/\"},\"wordCount\":4458,\"publisher\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg\",\"articleSection\":[\"Technical\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/\",\"url\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/\",\"name\":\"How to verify an email address\",\"isPartOf\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg\",\"datePublished\":\"2024-09-16T06:46:24+00:00\",\"dateModified\":\"2026-04-24T09:30:00+00:00\",\"description\":\"Full report : how to verify an email address. All the techniques and tips explained in detail about email verification\",\"breadcrumb\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage\",\"url\":\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg\",\"contentUrl\":\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg\",\"width\":1125,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/mailnjoy.com\/blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to verify an email address\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/#website\",\"url\":\"https:\/\/mailnjoy.com\/blog\/\",\"name\":\"Blog Mailnjoy\",\"description\":\"R\u00e9flexions et analyses dans le monde de l&#039;emailing\",\"publisher\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailnjoy.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/#organization\",\"name\":\"Mailnjoy\",\"url\":\"https:\/\/mailnjoy.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/logo-mailnjoy.jpg\",\"contentUrl\":\"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/logo-mailnjoy.jpg\",\"width\":702,\"height\":496,\"caption\":\"Mailnjoy\"},\"image\":{\"@id\":\"https:\/\/mailnjoy.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Mailnjoy\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/#\/schema\/person\/20e33e4550051bf4aae4790b49bea965\",\"name\":\"Renaud Garelli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/mailnjoy.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcb4b8a318451630dea41495666edae0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcb4b8a318451630dea41495666edae0?s=96&d=mm&r=g\",\"caption\":\"Renaud Garelli\"},\"description\":\"Renaud est un expert en d\u00e9livrabilit\u00e9 des emails. Il vous livre ici divers dossiers et conseils techniques pour que l'Emailing n'ait plus aucun secret pour vous!\",\"sameAs\":[\"https:\/\/mailnjoy.com\"],\"url\":\"https:\/\/mailnjoy.com\/blog\/author\/renaud-garelligmail-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to verify an email address","description":"Full report : how to verify an email address. All the techniques and tips explained in detail about email verification","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/","og_locale":"fr_FR","og_type":"article","og_title":"How to verify an email address","og_description":"Full report : how to verify an email address. All the techniques and tips explained in detail about email verification","og_url":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/","og_site_name":"Blog Mailnjoy","article_publisher":"https:\/\/www.facebook.com\/Mailnjoy","article_published_time":"2024-09-16T06:46:24+00:00","article_modified_time":"2026-04-24T09:30:00+00:00","og_image":[{"width":1125,"height":1125,"url":"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg","type":"image\/jpeg"}],"author":"Renaud Garelli","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Renaud Garelli","Dur\u00e9e de lecture estim\u00e9e":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#article","isPartOf":{"@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/"},"author":{"name":"Renaud Garelli","@id":"https:\/\/mailnjoy.com\/blog\/#\/schema\/person\/20e33e4550051bf4aae4790b49bea965"},"headline":"How to verify an email address","datePublished":"2024-09-16T06:46:24+00:00","dateModified":"2026-04-24T09:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/"},"wordCount":4458,"publisher":{"@id":"https:\/\/mailnjoy.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg","articleSection":["Technical"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/","url":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/","name":"How to verify an email address","isPartOf":{"@id":"https:\/\/mailnjoy.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage"},"image":{"@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg","datePublished":"2024-09-16T06:46:24+00:00","dateModified":"2026-04-24T09:30:00+00:00","description":"Full report : how to verify an email address. All the techniques and tips explained in detail about email verification","breadcrumb":{"@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#primaryimage","url":"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg","contentUrl":"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/email-check-front-version-1.jpg","width":1125,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/mailnjoy.com\/blog\/en\/how-to-verify-an-email-address\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/mailnjoy.com\/blog\/es\/"},{"@type":"ListItem","position":2,"name":"How to verify an email address"}]},{"@type":"WebSite","@id":"https:\/\/mailnjoy.com\/blog\/#website","url":"https:\/\/mailnjoy.com\/blog\/","name":"Blog Mailnjoy","description":"R\u00e9flexions et analyses dans le monde de l&#039;emailing","publisher":{"@id":"https:\/\/mailnjoy.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailnjoy.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/mailnjoy.com\/blog\/#organization","name":"Mailnjoy","url":"https:\/\/mailnjoy.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/mailnjoy.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/logo-mailnjoy.jpg","contentUrl":"https:\/\/mailnjoy.com\/blog\/wp-content\/uploads\/2024\/08\/logo-mailnjoy.jpg","width":702,"height":496,"caption":"Mailnjoy"},"image":{"@id":"https:\/\/mailnjoy.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Mailnjoy"]},{"@type":"Person","@id":"https:\/\/mailnjoy.com\/blog\/#\/schema\/person\/20e33e4550051bf4aae4790b49bea965","name":"Renaud Garelli","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/mailnjoy.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcb4b8a318451630dea41495666edae0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcb4b8a318451630dea41495666edae0?s=96&d=mm&r=g","caption":"Renaud Garelli"},"description":"Renaud est un expert en d\u00e9livrabilit\u00e9 des emails. Il vous livre ici divers dossiers et conseils techniques pour que l'Emailing n'ait plus aucun secret pour vous!","sameAs":["https:\/\/mailnjoy.com"],"url":"https:\/\/mailnjoy.com\/blog\/author\/renaud-garelligmail-com\/"}]}},"modified_by":"Renaud Garelli","lang":"en","translations":{"en":823,"fr":328,"es":871},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/posts\/823"}],"collection":[{"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/comments?post=823"}],"version-history":[{"count":29,"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/posts\/823\/revisions"}],"predecessor-version":[{"id":1540,"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/posts\/823\/revisions\/1540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/media\/816"}],"wp:attachment":[{"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/media?parent=823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/categories?post=823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailnjoy.com\/blog\/wp-json\/wp\/v2\/tags?post=823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}