Email Intelligence - Overview

Telesign Email Intelligence helps with identifying potentially fraudulent activity by analyzing the transaction risk associated with an email address. You submit an email address, and optionally an IP address and/or phone number associated with the same email address, to the service. The individual identifiers are each evaluated, and then a risk recommendation is returned telling you how risky the current transaction is. You can use the risk recommendations in combination with other elements to decide whether to allow, flag, block a phone number, or take any other measures you deem appropriate including additional verifications.

How it works

Evaluates email related username structure

The service inspects the composition of submitted email related usernames to reveal potential indicators of risk. It flags repetitive character patterns, evaluates mixes of letters, numbers, and symbols, and identifies randomized or nonsensical naming conventions. It also detects machine-generated usernames and screens for common issues such as typos and homoglyphs.

Analyzes email address behavioral patterns

Behavioral analytics assess how a user’s email address interacts over time. The system monitors historical activity trends, evaluates interaction velocity and frequency, and detects unusual or inconsistent usage patterns. It also reviews whether email address behavior remains steady across sessions and considers contextual signals that may indicate suspicious activity.

Examples of atypical behavioral indicators include:

  • A single email address showing sudden spikes in action frequency that deviate from historical norms
  • Interaction sequences that appear automated or occur at irregular intervals

Assesses email address domain information

Email address domain-level insights help uncover risks associated with email or account creation domains. The service flags disposable or temporary domains and validates domain age, type, and legitimacy. It detects bulk or automated domain creation, evaluates the use of high-risk top-level domains, and uncovers registration connections between domains that may indicate coordinated or fraudulent activity.

Documentation by category

Docs

Reference