Documentation
Getting Started
Free AnalysisPricing
FAQ
Threat Level Guide
Result Codes ►
List Profile Report
Threat Intelligence Center
Best Practices
Data Export Specs
Country Disposition
API
API OverviewVerification/Threats API
Threats API
Credits Balance API
Bulk FTP Transfer
Bulk API List Submission
Verification Plus Threats Result Codes
Impressionwise’s data intelligence platform is based on policy-driven rule sets and real-time scanning algorithms that use a multi-layered approach to identify, validate and protect against a wide range of e-mail-based threats. These threats, ranging in severity, are broken down into the following categories for flexibility in customized export usage options while providing unprecedented, detailed insight.
Threat Intelligence |
||
Trap. Purpose-built, Spam-trap, or Honeypot e-mail address, any e-mail messages sent to this address are immediately considered unsolicited. Email address has known association of having direct ownership or control over the resources involved with the reception of a message leading to its submission to one or more DNSBL sites. | ||
Mole. Collaborating recipient submission-based or domain-level, anti-spam solution with no current, direct ownership of resources involved. Yet historical evidence firmly establishes a relationship to one or more DNSBL sites. | ||
Quarantine. Once active traps gone dormant may become reactivated during a 90 day period. Yet actively considered certified. | ||
Seed. Third party oversight email address used for general monitoring of company's network resources. Removal of litigators and collaborative anti-spam activists historically known to purposely seed their email address(es) for the purpose of litigation. | ||
Key. Complex pattern recognition and threat string algorithms designed to remove intra-domain recipients employed by that domain for use as spam traps. | ||
Proxies/ Bots.. Protect against high-risk traffic sources (bad actors) and guard against ad-fraud in the form of Non-Human Invalid Traffic (IVT). Our sophisticated machine learning algorithms identify traffic originating from botnets, data center traffic, click farms, proxies, malicious script injectors and hijacked devices. | ||
Delivery Intelligence |
||
Invalid. Defined as the inability to actually deliver an email message to intended recipient's receiving domain per RFC standards. | ||
Parked Resources.. Avoiding sending email traffic to millions of unused and parked domains. Since parked domains have previously not been configured for email or web service by the owner, any email sent to these domains is by definition, invalid and considered unsolicited or spam. All email received is often auto-forwarded to a central catch-all account to be black-holed or distributed to various blacklist providers. | ||
Dormant Account. TLD account with no login activity for a long period of time, the recipient account is defined by the provider as “inactive” and turned into a form of unknowing collaborator with no non-delivery report (NDR) indicating “no such user” or “mailbox not found” being sent as a response. | ||
Discretionary. We are able to conclude that these email addresses do not represent a threat to your online reputation, yet we are unable to conclusively verify that these addresses are deliverable. In order to provide to you additional detail and insight into the results obtained, we also include the following sub-classifications: Catch-All, Greylisted, Connection Timeout and Indeterminate. We advise sending this group initially on a separate network (domain/IP) to confirm bounce ratio is within acceptable norms before sending through your main sending network. | ||
Certified Good to Send. Email address with no known reason to expect a delivery failure or harm to email sender's online reputation. |