# Email Intelligence

### Email Intelligence Overview

Email Intelligence is an **email fraud detection** check. It scores the fraud risk of a customer’s email address using reputation and threat signals.

Use it to reduce sign-up abuse and improve **KYC onboarding** quality. It also helps stop customers using disposable or breached email addresses.

{% hint style="info" %}
[Learn about the Email Intelligence Checks API.](/documentation/api-reference/check-types/email-intelligence-check.md)
{% endhint %}

### Common use cases

Use Email Intelligence anywhere an email address is a key identifier:

* **KYC onboarding and account opening**: Flag high-risk emails before running identity checks.
* **New account and sign-up fraud**: Stop disposable emails and mass-created accounts.
* **Account takeover (ATO)**: Treat sudden email changes or risky emails as a step-up signal.
* **Promo and referral abuse**: Detect disposable email reuse across promotions.

### Analysis performed

The check runs an **email verification** and **email reputation** assessment. It combines multiple indicators to produce an overall fraud risk score.

**Detailed verification checks**

<table><thead><tr><th width="204.53515625">Analysis</th><th>Verifications Performed</th></tr></thead><tbody><tr><td><strong>Risk Analysis</strong></td><td><ul><li><strong>Risk level analysis</strong>: Assigns a fraud risk score based on patterns linked to suspicious or malicious activity.</li><li><strong>Data leak analysis</strong>: Checks whether the email has appeared in known data breaches or leak databases.</li><li><strong>Disposable email</strong>: Detects if the email is temporary or from a disposable email provider.</li><li><strong>Format analysis</strong>: Confirms the email address is syntactically valid and follows correct formatting standards.</li><li><strong>Domain validity</strong>: Verifies that the domain exists and is active.</li></ul></td></tr></tbody></table>

### Sample result

The example below shows a representative Email Intelligence result for email risk, breach exposure, and domain validation outcomes.

Use it to see how fraud signals, reputation findings, and verification results may appear in an Email Intelligence report.

<figure><img src="/files/pLSFC1AdwifWQZ1GNVqC" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
This example is illustrative. Exact fields, values, and layout may vary by workflow, configuration, and result.
{% endhint %}

### Check duration

An Email Intelligence Check takes an average of **2 seconds** to complete.

### Frequently asked questions

<details>

<summary>Can Email Intelligence detect disposable email addresses?</summary>

Yes.

Email Intelligence can detect whether an email address belongs to a **disposable email provider**, which helps reduce fake sign-ups and abuse.

</details>

<details>

<summary>Can Email Intelligence check if an email appears in a data breach?</summary>

Yes.

It checks whether the email address has appeared in known **data breaches** or **leak databases**.

</details>

<details>

<summary>Does Email Intelligence verify email ownership?</summary>

No.

Email Intelligence assesses **risk** and **reputation**. It does not prove that the customer controls the inbox.

</details>

<details>

<summary>Can Email Intelligence help reduce sign-up fraud?</summary>

Yes.

It helps detect risky email patterns linked to **sign-up fraud**, **mass account creation**, and potential **account takeover** scenarios.

</details>

<details>

<summary>Should I combine Email Intelligence with other fraud checks?</summary>

Yes.

Email Intelligence works well with [Device Intelligence](/documentation/product-guides/digital-fraud-intelligence/device-intelligence-check.md), [Mobile Intelligence](/documentation/product-guides/digital-fraud-intelligence/mobile-intelligence-check.md), and identity verification checks when you need stronger onboarding controls.

</details>

### Related checks

Combine Email Intelligence with other fraud intelligence signals:

* [Device Intelligence](/documentation/product-guides/digital-fraud-intelligence/device-intelligence-check.md) for session-level device and network risk signals, including VPN/proxy usage, emulators, rooted/jailbroken devices, and automation.
* [Mobile Intelligence](/documentation/product-guides/digital-fraud-intelligence/mobile-intelligence-check.md) for phone number risk scoring and reputation signals.

### Related topics <a href="#related-topics" id="related-topics"></a>

Use these to integrate Email Intelligence within a broader KYC and fraud decision flow:

* [Workflows](/documentation/product-guides/compliance-studio/workflows.md) to orchestrate Email Intelligence as a step in onboarding.
* [Compliance Policies](/documentation/product-guides/compliance-studio/policies.md) to apply consistent rules using the returned risk signals.
* [Advanced Case Management](/documentation/product-guides/due-diligence-tools/advanced-case-management.md) to review edge cases and keep audit-ready decisions.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.complycube.com/documentation/product-guides/digital-fraud-intelligence/email-intelligence-check.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
