Email Intelligence
Email fraud detection and risk scoring. Verify email reputation, detect disposable emails, and check breach exposure for KYC onboarding.
About service
Email Intelligence is an email fraud detection check. It scores the fraud risk of a customer’s email address using reputation and threat signals.
Use it to reduce sign-up abuse and improve KYC onboarding quality. It also helps stop customers using disposable or breached email addresses.
Common use cases
Use Email Intelligence anywhere an email address is a key identifier:
KYC onboarding and account opening: Flag high-risk emails before running identity checks.
New account and sign-up fraud: Stop disposable emails and mass-created accounts.
Account takeover (ATO): Treat sudden email changes or risky emails as a step-up signal.
Promo and referral abuse: Detect disposable email reuse across promotions.
Analysis performed
The check runs an email verification and email reputation assessment. It combines multiple indicators to produce an overall fraud risk score.
Detailed verification checks
Risk Analysis
Risk level analysis: Assigns a fraud risk score based on patterns linked to suspicious or malicious activity.
Data leak analysis: Checks whether the email has appeared in known data breaches or leak databases.
Disposable email: Detects if the email is temporary or from a disposable email provider.
Format analysis: Confirms the email address is syntactically valid and follows correct formatting standards.
Domain validity: Verifies that the domain exists and is active.
Check duration
An Email Intelligence Check takes an average of 2 seconds to complete.
Related checks
Combine Email Intelligence with other fraud intelligence signals:
Device Intelligence for session-level device and network risk signals, including VPN/proxy usage, emulators, rooted/jailbroken devices, and automation.
Mobile Intelligence for phone number risk scoring and reputation signals.
Related topics
Use these to integrate Email Intelligence within a broader KYC and fraud decision flow:
Workflows to orchestrate Email Intelligence as a step in onboarding.
Compliance Policies to apply consistent rules using the returned risk signals.
Advanced Case Management to review edge cases and keep audit-ready decisions.

