<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: techslang</title>
    <description>The latest articles on DEV Community by techslang (@realtechslang).</description>
    <link>https://dev.to/realtechslang</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F445893%2Fa4d84014-b40d-4b59-af6c-089ca0743bd2.jpg</url>
      <title>DEV Community: techslang</title>
      <link>https://dev.to/realtechslang</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/realtechslang"/>
    <language>en</language>
    <item>
      <title>Public and Private IP Addresses: A Beginner’s Guide</title>
      <dc:creator>techslang</dc:creator>
      <pubDate>Mon, 13 Sep 2021 14:03:46 +0000</pubDate>
      <link>https://dev.to/realtechslang/a-beginner-s-guide-to-public-and-private-ip-addresses-7pj</link>
      <guid>https://dev.to/realtechslang/a-beginner-s-guide-to-public-and-private-ip-addresses-7pj</guid>
      <description>&lt;p&gt;By now, you probably know what an IP address is but for those who are truly new to the subject, it is simply a set of numbers that identifies a device (computer, mobile device, or IoT device) on the Internet. In this guide, let’s talk about the different types of IP addresses, how they differ from one another, and dive into public and private IP addresses and how they work.&lt;/p&gt;

&lt;h2&gt;
  
  
  IP Address Types
&lt;/h2&gt;

&lt;p&gt;Before we get started with public and private addresses, we need to understand the types of IP addresses. Classifying IP addresses can be done in three ways.&lt;/p&gt;

&lt;h3&gt;
  
  
  IPv4 or IPv6
&lt;/h3&gt;

&lt;p&gt;IPv4 addresses are more widely used than IPv6 addresses today. In fact, &lt;a href="https://www.guru99.com/difference-ipv4-vs-ipv6.html"&gt;94% of Internet-connected devices&lt;/a&gt; are identified by IPv4 addresses. IPv4 uses a 32-bit address scheme to store more than 4 billion addresses. It is made up of four sets of numeric characters, ranging from 1 to 255, separated by periods. An example would be 127.255.255.255.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--G5MtsHyU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tuh9f9luwqag0617icbd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--G5MtsHyU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tuh9f9luwqag0617icbd.png" alt="IPv4 address distribution worldwide using data from Wikipedia."&gt;&lt;/a&gt;&lt;br&gt;
As more devices accessed the Web, experts began worrying about running out of available IPv4 addresses, and so entered IPv6.&lt;/p&gt;

&lt;p&gt;An IPv6 address comprises eight sets of alphanumeric characters (with four characters per set), separated by colons, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334. And because of its 128-bit address space, users now have an additional 340 undecillion IPv6 addresses to use. You can take a closer look at the IPv6 address allocations at this &lt;a href="https://www.iana.org/assignments/ipv6-unicast-address-assignments/ipv6-unicast-address-assignments.xhtml"&gt;Internet Assigned Numbers Authority (IANA) page&lt;/a&gt; or learn about their distribution across countries compared to IPv4 addresses by using a &lt;a href="https://ip-geolocation.whoisxmlapi.com/statistics"&gt;list of IP addresses by country&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Static or Dynamic
&lt;/h3&gt;

&lt;p&gt;A static IP address does not change, a dynamic address does. When a device with a static IP address accesses the Internet, its identifier never changes. Most devices, though, use dynamic IP addresses that are assigned by their ISPs. These can change periodically, depending on which IP address (from the ones the ISP owns) is not in use at a given time. Static and dynamic IP addresses can fall under either the IPv4 or IPv6 address space.&lt;/p&gt;

&lt;p&gt;Note, however, that you can’t control which of the IP address types mentioned above get assigned to your network. Users’ IP addresses are determined by availability.&lt;/p&gt;

&lt;h3&gt;
  
  
  Public and Private
&lt;/h3&gt;

&lt;p&gt;IP addresses, whether IPv4 or IPv6 and static or dynamic, can also be categorized as either public or private. Simply put, a public IP address is one which anyone on the Internet can see while a private IP address is only accessible to users who are connected to the same network (either home or corporate). Read on to find out more about how they work in the next section.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Public and Private IP Addresses Work
&lt;/h2&gt;

&lt;p&gt;Public IP addresses are directly accessible over the Internet. Your ISP assigns them to your network routers. Each time you visit a website, this public IP address gets picked up by the site owner’s network log. Think of it as a post office box number that you wouldn’t mind giving out to almost anyone as opposed to letting them know your home address. Similarly, public IP addresses don’t tell network owners as much about your location and personal details, as their records would point to your ISP.&lt;/p&gt;

&lt;p&gt;Private IP addresses, on the other hand, are those that your network router assigns to each of your devices. Each private address is unique so your connected devices can talk to each other (and not get confused) within the network. When router-connected devices access the Internet, their private IP addresses won’t be visible to others. What website owners will see is your public or router’s IP address.&lt;/p&gt;

&lt;p&gt;The following diagram shows how they differ from each other:&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MlrGAaBF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/idbbtnkg2bz2y1mh1dv2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MlrGAaBF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/idbbtnkg2bz2y1mh1dv2.png" alt="Public and private IP addresses in a home network"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Public and Private IP Address Ranges
&lt;/h2&gt;

&lt;p&gt;Not all IP addresses are publicly seen on the Internet. The IP ranges reserved for private use are:&lt;/p&gt;

&lt;p&gt;-10.0.0.0–10.255.255.255&lt;br&gt;
-172.16.0.0–172.31.255.255&lt;br&gt;
-192.168.0.0–192.168.255.255&lt;/p&gt;

&lt;p&gt;All other IP addresses excluded from the ranges above are public IP addresses.&lt;/p&gt;

&lt;p&gt;To recap, no one sees private IP addresses on the Internet. They don’t get recorded in network logs. Network owners only see your public IP address when you visit their websites, purchase something on their e-commerce platforms, or download files from their sites.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Knowing Public and Private IP Addresses Matters
&lt;/h2&gt;

&lt;p&gt;At the end of the day, any home or corporate router is identifiable by its public IP address. If your business goal is to determine where your traffic comes from, then you need to pay attention to your site visitors’ public IP addresses. It doesn’t matter if it's an IPv4 or IPv6 address or if it’s a static or dynamic IP address. Given their public IP address and armed with a list of IP addresses by country or an IP geolocation database, you can already identify where they are based.&lt;/p&gt;

&lt;p&gt;If you’re a network administrator for a company or complex home network, you also need to pay attention to all connected devices’ private IP addresses. Each system must have a unique private IP address. Your printer should not share the same private IP address as your Voice over Internet Protocol (VoIP) phone. If they do and you want to print a document from your laptop, your computer may not be able to correctly identify the printer from the phone and you’d fail at accomplishing that task.&lt;/p&gt;




&lt;p&gt;In this article, you’ve learned about public and private IP addresses and their difference from other types. To reiterate, whether you use a static or dynamic IPv4 or IPv6 address, anyone with access to a list of IP addresses by country or an IP geolocation database can track the traffic coming from your network via your public IP address. And if you want to maintain the security of your home network and your privacy, you may want to ensure that only your public IP address is visible to everyone.&lt;/p&gt;

</description>
      <category>ipaddress</category>
      <category>privateip</category>
      <category>publicip</category>
    </item>
    <item>
      <title>How to Keep Track of Newly Registered Domains for Brand Protection</title>
      <dc:creator>techslang</dc:creator>
      <pubDate>Wed, 01 Sep 2021 11:50:14 +0000</pubDate>
      <link>https://dev.to/realtechslang/how-to-keep-track-of-newly-registered-domains-for-brand-protection-1o2g</link>
      <guid>https://dev.to/realtechslang/how-to-keep-track-of-newly-registered-domains-for-brand-protection-1o2g</guid>
      <description>&lt;p&gt;Brand protection covers a wide range of activities that prevent other entities from using a brand name and intellectual property. Digitalization has further increased the scope of brand protection to include preserving one’s domain brand reputation. With this improvement, developers and security specialists could be asked to implement various domain brand protection measures, which cover monitoring newly registered domains.&lt;/p&gt;

&lt;p&gt;In this post, we answer questions relevant to domain brand protection and monitoring newly registered domains. We also tackle how API integration works compared to using newly registered domains data feed. &lt;/p&gt;

&lt;h2&gt;
  
  
  What Is Domain Brand Reputation?
&lt;/h2&gt;

&lt;p&gt;Domain brand reputation refers to how your brand name is used in the domain name space, which ultimately affects your overall brand reputation. For example, if your brand name repeatedly appears in a list of phishing domains, your reputation and business can suffer. Multiple studies, such as those of &lt;a href="https://www.comparitech.com/blog/information-security/data-breach-share-price-analysis/"&gt;Comparitech&lt;/a&gt; and &lt;a href="https://info.arcserve.com/en/ransomwares-stunning-impact-on-consumer-loyalty-and-purchasing-behavior"&gt;ArcServe&lt;/a&gt;, have established that consumers and investors tend to walk away from companies that have been involved in a cyber attack.&lt;/p&gt;

&lt;p&gt;And since most cyber attacks start with phishing, it’s vital to ensure that your brand name is not used in this or any other malicious campaigns. Why is that so? Threat actors often register domains that contain the names of legitimate companies to make their campaigns more believable. Here’s a recent example. Between 1 July and 3 August 2021 &lt;a href="https://circleid.com/posts/20210809-whats-the-domain-attack-surface-of-the-top-10-most-impersonated-brands-in-q2-2021"&gt;thousands of cybersquatting domains&lt;/a&gt; that contain the names of the top 10 impersonated brands were registered, and about 32% of these domains have been reported “malicious.”&lt;/p&gt;

&lt;p&gt;Aside from being used in cyber attacks, trademark infringers and counterfeiters also use domain names. These actors bank on a brand’s reputation and legitimacy to lure consumers into buying cheaper but lower-quality products.&lt;/p&gt;

&lt;h2&gt;
  
  
  Monitoring Newly Registered Domains
&lt;/h2&gt;

&lt;p&gt;Newly registered domains are among the weapons threat actors use in their attacks. Hence, monitoring domain name registrations could be an integral part of a company’s overall brand protection strategy. It can be done in several ways, including integrating an &lt;a href="https://brand-alert.whoisxmlapi.com/api"&gt;API that monitors domain registrations&lt;/a&gt; or using a &lt;a href="https://newly-registered-domains.whoisxmlapi.com/"&gt;newly registered domains data feed&lt;/a&gt;. We describe both options below.&lt;/p&gt;

&lt;h3&gt;
  
  
  Brand Monitor API
&lt;/h3&gt;

&lt;p&gt;The brand monitor API we tested for this post monitors all newly registered and deleted domains that contain a selected brand name. To illustrate, let’s say you want to keep track of newly registered domains containing the word “google.” The API returned 1,437 domains added and dropped within the past 21 days.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hwY1J6yJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oksziqx8bdphkgkcsoax.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hwY1J6yJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/oksziqx8bdphkgkcsoax.png" alt="unnamed (7)"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This particular API can be integrated using client libraries in Python or other languages. And since all API calls rely on the provider’s existing infrastructure, there's no need to set up or maintain your own database. Of course, functionality may vary depending on a provider, but overall using a brand monitor API wouldn’t demand too much from your company’s resources. Businesses looking for cost-effective solutions can therefore choose to integrate it into their brand protection strategies.&lt;/p&gt;

&lt;h3&gt;
  
  
  Newly Registered Domains Data Feed
&lt;/h3&gt;

&lt;p&gt;Another way to monitor newly registered domains is by subscribing to and downloading data feeds via HTTPS or FTP. As with any database integration, you would need to analyze the data in your local environment before integrating it into your backend systems. The goal of the data processing is to extract brand-related domain names. &lt;/p&gt;

&lt;p&gt;Additionally, you would need to regularly download the most updated data feed to ensure accuracy.&lt;/p&gt;

&lt;p&gt;Here’s an example of the newly registered domains data feed we mentioned earlier for the .com TLD space for 29 August 2021, which contains 96,619 domains. Eleven of them contain the word “google.”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--f06b_Q7I--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f1mszr9e6klbj5vmtfd1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--f06b_Q7I--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/f1mszr9e6klbj5vmtfd1.png" alt="unnamed (8)"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While this monitoring method takes time and more human resources, analyzing the data shouldn’t be too tricky since these databases come in comma-separated values (CSV) format. &lt;/p&gt;

&lt;p&gt;Using newly registered domains data feed might be more suitable for entities with strict firewall rules and those that can’t communicate through API calls, such as governmental entities, for instance.&lt;/p&gt;




&lt;p&gt;If you’re developing brand protection solutions, incorporating newly registered domain monitoring functionality could make your product more inclusive. The additional functionality allows your product to detect potential typosquatting or cybersquatting domains. These domain names can turn out to have been registered by trademark infringers or, worse, cybercriminals.&lt;/p&gt;

</description>
      <category>newlyregisterreddomains</category>
      <category>domains</category>
      <category>nrds</category>
    </item>
    <item>
      <title>7 Best Email Verification APIs to Choose From</title>
      <dc:creator>techslang</dc:creator>
      <pubDate>Fri, 23 Jul 2021 11:21:01 +0000</pubDate>
      <link>https://dev.to/realtechslang/7-best-email-verification-apis-to-choose-from-2ij2</link>
      <guid>https://dev.to/realtechslang/7-best-email-verification-apis-to-choose-from-2ij2</guid>
      <description>&lt;p&gt;Some may say that email marketing is the way to go. For developers, that means creating products that can help organizations boost their marketing performance. One way to do that is by producing an email verification API their fellow developers can implement in their respective companies while keeping these &lt;a href="https://www.hubspot.com/marketing-statistics"&gt;latest stats&lt;/a&gt; in mind:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The worldwide email user base in 2019 was 3.9 billion, which is slated to reach 4.5 billion by 2024.&lt;/li&gt;
&lt;li&gt;A 2019 Campaign Monitor study of 1,000 small business owners ranked email marketing as the second most effective means to build brand awareness. Email marketing, in fact, had the highest return on investment (ROI) for small businesses.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An effective email verification API should help users clean up their distribution lists to avoid high bounce rates. Why? Because high bounce rates could land their domains on spam blocklists, which could affect their reputation and, consequently, bottom line significantly. For the companies’ development team, that translates to failure as well.&lt;/p&gt;

&lt;p&gt;One way to keep invalid email addresses (i.e., those that lead to hard bounces) out of distribution lists is by employing an email verification API. But that’s not all email validation is good for. It’s also useful for ramping up cybersecurity, keeping freemium abusers out of product pages, and avoiding spam traps, which are a few of the goals developers are hired for as well.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is an Email Verification API Good For?
&lt;/h2&gt;

&lt;p&gt;Email verification APIs validate if an email address exists and can receive messages through various checks. Using them can help companies enjoy several benefits. But creating your own email verification API can take months. Pooling the data required to build a database and updating it daily isn’t easy. Instead of building one from scratch, you can opt to integrate a reliable API into your existing systems and solutions instead to get the advantages cited below.&lt;/p&gt;

&lt;h2&gt;
  
  
  Help Keep Your Organization’s Bounce Rate to a Minimum
&lt;/h2&gt;

&lt;p&gt;You probably know that the higher a company’s bounce rate is, the lower its email-sending reputability is. In fact, your email-sending reputation has a lot to do with how effective your marketing efforts are. The lower your bounce rate, the more likely your intended recipients are to receive and read your emails. The opposite, however, is bound to land your domain on a spam blocklist. That means none of your customers, current and potential, may never even have a chance to see your emails in their inboxes.&lt;/p&gt;

&lt;p&gt;An effective email verification API uses email-sending simulation techniques to ensure the validity of an address. It checks if it has all the necessary components (e.g., a corresponding inbox, a mail exchanger [MX] server and records, the proper format, etc.) to receive messages. All these checks help ensure your marketing messages get to their intended destinations.&lt;/p&gt;

&lt;h2&gt;
  
  
  Help Your Organization Keep Catch-All Email Addresses Out
&lt;/h2&gt;

&lt;p&gt;A catch-all email address is designed to catch all messages for a number of users. Some of these users may no longer be part of the company. Others rarely, if at all, check the catch-all inbox much less read or respond to emails sent to it.&lt;/p&gt;

&lt;p&gt;Sending emails to a catch-all email address could translate to a high bounce rate and so on and so forth. You can avoid this cycle by using an email verification API that flags catch-all email addresses on the fly.&lt;/p&gt;

&lt;h2&gt;
  
  
  Help Your Organization Keep Potential Freemium Abusers and Fraudsters Out
&lt;/h2&gt;

&lt;p&gt;While not everyone who uses an invalid or temporary email address is a freemium abuser or cybercriminal, some could be. A potential scenario could be that the user mistyped his or her email address while signing up for an account. And disposable email address users could just be protecting their privacy.&lt;/p&gt;

&lt;p&gt;An email verification API can lessen the likelihood that your distribution list contains addresses that could potentially belong to free trial abusers who use disposable addresses to sign up multiple times so they can keep using your product without ever having to pay. It can also keep threat actors who use temporary email addresses containing legitimate brand names out of your network. An example would be microsoft@[disposable domain].[TLD]. This address could trick you into thinking you’re communicating with a user from Microsoft when you’re actually not.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Do You Need to Consider When Choosing an Email Verification API?
&lt;/h2&gt;

&lt;p&gt;An effective email verification API should run various checks to validate an email address. These tests include the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Format check:&lt;/strong&gt; All valid email addresses follow this format:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Local-part (owner’s or department name) + @ + domain name (company or email service provider’s name)&lt;/p&gt;

&lt;p&gt;An invalid email address doesn’t follow this format and will get the following result from an email verification API format check:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;formatCheck: String
"false"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Simple Mail Transfer Protocol (SMTP) check:&lt;/strong&gt; All valid email addresses should have connected mailboxes to receive messages. An invalid email address that doesn’t have one will get this result from an email verification API’s SMTP check:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;smtpCheck: String
"false"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Domain Name System (DNS) and MX record check:&lt;/strong&gt; All valid email addresses should have existing domains or a working MX server to receive messages. An invalid email address will get this result from an email verification API’s DNS and MX record check:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;dnsCheck: String
"false"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;mxRecords: Array
0: 
1:
2:
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Free check:&lt;/strong&gt; Just like legitimate users, threat actors can also get email addresses from free email services like Gmail, Yahoo, and many others. If you want to keep them out of your subscription list, watch out for email addresses that get this result from an email verification API’s free check:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;freeCheck: String
"true"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Disposable check:&lt;/strong&gt; Many freemium abusers use temporary email addresses so they can sign up for free trials multiple times thereby being able to use products without paying for them ever. Be wary of email addresses then that get this result from an email verification API’s disposable check:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;disposableCheck: String
"true"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Catch-all check:&lt;/strong&gt; Messages sent to catch-all addresses rarely or never get opened. Watch out for email addresses then that give this result for an email verification API’s catch-all check:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;catchAllCheck: String
"true"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Most email verification APIs give results in JavaScript Object Notation (JSON) or eXtensible Markup Language (XML) format. But some provide more readable and shareable reports via custom URLs that when clicked opens the report specifically for the email address queried.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Email Verification APIs Should Be on Your Selection List?
&lt;/h2&gt;

&lt;p&gt;We compared seven email verification APIs based on the six tests we believe an effective tool should perform to validate email addresses so you can spend less time and effort looking for the right fit for your company.&lt;/p&gt;

&lt;h3&gt;
  
  
  Email Verification API
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CYSJldDx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zqkkc4wnmebneuxqfypp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CYSJldDx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zqkkc4wnmebneuxqfypp.png" alt="Email Verification API Homepage"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://emailverification.whoisxmlapi.com/api"&gt;Email Verification API&lt;/a&gt; performs comprehensive checks on email addresses that website visitors use for registration. As such, it helps reduce email bounces, block spam, and more. It ensures that an email address follows the correct format and has a working SMTP connection and an MX server. It also alerts users if the email address is a free, disposable, and/or catch-all address. &lt;/p&gt;

&lt;p&gt;Users can enjoy the tool’s benefits for as little as US$18 for 10,000 queries a month. &lt;/p&gt;

&lt;p&gt;Results come in JSON format or a more readable report with a shareable custom link.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;emailAddress: String
"support@whoisxmlapi.com"
formatCheck: String
"true"
smtpCheck: String
"true"
dnsCheck: String
"true"
freeCheck: String
"false"
disposableCheck: String
"false"
catchAllCheck: String
"true"
mxRecords: Array
0: 
"alt1.aspmx.l.google.com."
,
1: 
"aspmx2.googlemail.com."
,
2: 
"aspmx.l.google.com."
,
3: 
"aspmx3.googlemail.com."
,
4: 
"alt2.aspmx.l.google.com."
,
audit: Object
auditCreatedDate: 
"2021-07-21 01:01:48.000 UTC"
,
auditUpdatedDate: 
"2021-07-21 01:01:48.000 UTC"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  QuickEmailVerification
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6BwHfr64--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/94rtqbq49mhejjawomrf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6BwHfr64--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/94rtqbq49mhejjawomrf.png" alt="QuickEmailVerification Homepage"&gt;&lt;/a&gt;&lt;br&gt;
QuickEmailVerification performs five of the six email validation checks mentioned earlier. It prevents email addresses with the incorrect format and without an SMTP connection from ending up in your distribution list. It flags free, disposable, and catch-all email addresses, too. &lt;/p&gt;

&lt;p&gt;Using the tool costs US$420 monthly and allows for 15,000 queries a day. However, more plans are available as well. &lt;/p&gt;

&lt;p&gt;It gives results in JSON format.&lt;/p&gt;
&lt;h3&gt;
  
  
  Mailgun
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fYfOBMPF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yoq8kwa42ymfnk439nb2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fYfOBMPF--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/yoq8kwa42ymfnk439nb2.png" alt="Mailgun Homepage"&gt;&lt;/a&gt;&lt;br&gt;
Mailgun targets developers who want to integrate email validation into their products. It performs two of the six tests to validate email addresses—format and free checks. &lt;/p&gt;

&lt;p&gt;Users can harness the tool’s power by paying a minimum of US$35 for 50,000 queries a month. &lt;/p&gt;

&lt;p&gt;It gives results in JSON format.&lt;/p&gt;
&lt;h3&gt;
  
  
  Email Verifier API
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--C5HWBGBK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/byy2clwscdxvf7etcyle.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--C5HWBGBK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/byy2clwscdxvf7etcyle.png" alt="Email Verifier API Homepage"&gt;&lt;/a&gt;&lt;br&gt;
Email Verifier API checks if an email address follows the required format, ensures that it isn’t from a free service provider, and determines if it is a disposable and/or catch-all address. &lt;/p&gt;

&lt;p&gt;Users can use the tool for a one-time payment of US$70 for 10,000 queries. &lt;/p&gt;

&lt;p&gt;Results come in JSON and XML formats.&lt;/p&gt;
&lt;h3&gt;
  
  
  Trumail
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ieBPenN8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o71gl6kuw7k0u0nl7ab4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ieBPenN8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/o71gl6kuw7k0u0nl7ab4.png" alt="Trumail Homepage"&gt;&lt;/a&gt;&lt;br&gt;
Trumail performs four checks—format, free, disposable, and catch-all—on a given email address and provides JSON, JSONP, and XML results. &lt;/p&gt;

&lt;p&gt;Users can enjoy the benefits the tool provides at US$69 for 10,000 queries.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{
    "address": "support@whoisxmlapi.com",
    "username": "support",
    "domain": "whoisxmlapi.com",
    "md5Hash": "02364a441d5b4021790e20e84c214131",
    "suggestion": "",
    "validFormat": true,
    "deliverable": true,
    "fullInbox": false,
    "hostExists": true,
    "catchAll": true,
    "gravatar": false,
    "role": true,
    "disposable": false,
    "free": false
}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  SendGrid
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GhghBYdC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/famyl5tigtd28hgs31df.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GhghBYdC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/famyl5tigtd28hgs31df.png" alt="SendGrid Homepage"&gt;&lt;/a&gt;&lt;br&gt;
SendGrid checks if an email address meets required formatting specifications, if it has a corresponding MX server and DNS records, and if it was created via a free email service. &lt;/p&gt;

&lt;p&gt;Users can make 10,000 basic queries for US$14.95 a month. &lt;/p&gt;

&lt;p&gt;Results come in JSON format.&lt;/p&gt;

&lt;h3&gt;
  
  
  Email Validator
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ld1EN6mc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gp4yaovrfiwygjiwongz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ld1EN6mc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/gp4yaovrfiwygjiwongz.png" alt="Email Validator Homepage"&gt;&lt;/a&gt;&lt;br&gt;
Email Validator performs all six checks—format, SMTP, DNS and MX, free, disposable, and catch-all—on a given email address, providing results in JSON format. &lt;/p&gt;

&lt;p&gt;Querying 10,000 email addresses costs US$59 a month.&lt;/p&gt;




&lt;p&gt;Given the ideal list of checks an email verification API is expected to perform, we hope you find the right fit for your requirements from among the choices listed in this post.&lt;/p&gt;

</description>
      <category>email</category>
      <category>emailverification</category>
      <category>emailvalidation</category>
    </item>
  </channel>
</rss>
