Threat Intelligence Center
Sender Support
Understanding BlacklistsISP Filtering Reference
Threat Level Guide
Threat Classifications
Spam Traps & HoneypotsRecycled Traps & Moles
Oversight Seeds
Typo & Fake Emails
Black Holes
Dormant Accounts
Parked Resources
Threat Keys ►
Role Accounts
Disposable Emails
Bots/ Proxies
Blacklist Profiles
URIBL Advisory SitesRBL Advisories
Blacklist Removal
Recent Articles
Spam Trap Hit?Suspended ESP account?
Anti-Spam Blogs
Word-to-the-Wise BlogAl Iverson Blog
Threat Keys
Protect against high-risk traffic sources. Our digital forensics analytics is designed to identify complex, non-human, machine-generated email accounts that historically use a variety of tactics to generate massive amounts of non-converting impressions.
Methodology Reference
Threat key or string. System-generated email addresses that are randomly generated phrases or words, aiming to make each look different and fool automated email filters. Additional detection techniques are applied in filtering of offensive words, phrases and non-natural email addresses like 1e49cs1pb6@company.com.
Non-memorable machine language-based recipient example:
hus5i3bdgd@gmail.com
bfd7edjfj@aol.com
fgfu998k@yahoo.com
fhf08kr6@b2b.com
Complex, non-human, pattern fingerprint example:
x12345@abc.com
5x1234@abc.com
45x123@abc.com
345x12@xyz.com
Suspicious, multi-platform recipient pool example:
j0nis1funy43@gmail.com
j0nis1funy43@aol.com
j0nis1funy43@yahoo.com
j0nis1funy43@b2b.com
Our data scientists take great care in the development and testing our machine learning technology to avoid false positives while clearly identifying all varieties of non-human traffic sources.
Questions? Please feel free to reach out with any questions you may have about our cleansing process or your results, and we look forward to you experiencing the results that truly set Impressionwise apart!