{"id":121555,"date":"2020-05-13T12:41:46","date_gmt":"2020-05-13T12:41:46","guid":{"rendered":"https:\/\/wordpress.org\/plugins\/threatpoint-email-validator\/"},"modified":"2023-10-25T11:19:49","modified_gmt":"2023-10-25T11:19:49","slug":"threatpoint-email-validator","status":"publish","type":"plugin","link":"https:\/\/bal.wordpress.org\/plugins\/threatpoint-email-validator\/","author":17827313,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","version":"1.4","stable_tag":"trunk","tested":"6.3.8","requires":"3.5.2","requires_php":"5.4","requires_plugins":null,"header_name":"ThreatPoint Email Validator","header_author":"ThreatPoint","header_description":"Provides email validation for contact forms. The email validation uses the ThreatPoint email verification restAPI. A real time check is performed on the email address.","assets_banners_color":"573f7f","last_updated":"2023-10-25 11:19:49","external_support_url":"","external_repository_url":"","donate_link":"https:\/\/threatpoint.co.uk\/donate\/","header_plugin_uri":"https:\/\/threatpoint.co.uk","header_author_uri":"https:\/\/threatpoint.co.uk","rating":5,"author_block_rating":0,"active_installs":0,"downloads":1300,"num_ratings":1,"support_threads":0,"support_threads_resolved":0,"author_block_count":0,"sections":["description","installation","faq","changelog"],"tags":{"1.3":{"tag":"1.3","author":"threatpointuk","date":"2023-10-24 13:23:55"},"release-1.0":{"tag":"release-1.0","author":"threatpointuk","date":"2020-09-14 18:24:47"},"release-1.1":{"tag":"release-1.1","author":"threatpointuk","date":"2021-03-14 19:05:59"},"release-1.2":{"tag":"release-1.2","author":"threatpointuk","date":"2021-03-20 11:05:28"}},"upgrade_notice":{"1.2":"<p>Nothing to see here<\/p>","1.1":"<p>Removed issue where plugin is active during admin user creation<\/p>","1.0":"<p>First release<\/p>"},"ratings":{"1":0,"2":0,"3":0,"4":0,"5":"1"},"assets_icons":{"icon-256x256.png":{"filename":"icon-256x256.png","revision":2304160,"resolution":"256x256","location":"assets","locale":""}},"assets_banners":{"banner-772x250.png":{"filename":"banner-772x250.png","revision":2304160,"resolution":"772x250","location":"assets","locale":""}},"assets_blueprints":{},"all_blocks":[],"tagged_versions":["1.3","release-1.0","release-1.1","release-1.2"],"block_files":[],"assets_screenshots":{"screenshot-1.png":{"filename":"screenshot-1.png","revision":2304160,"resolution":"1","location":"assets","locale":""}},"screenshots":{"1":"Plugin Settings Page"},"jetpack_post_was_ever_published":false},"plugin_section":[],"plugin_tags":[358,26758,2182,8375,12929],"plugin_category":[41,54],"plugin_contributors":[186546],"plugin_business_model":[],"class_list":["post-121555","plugin","type-plugin","status-publish","hentry","plugin_tags-contact-form","plugin_tags-email-checker","plugin_tags-email-validation","plugin_tags-spambots","plugin_tags-stop-spam","plugin_category-communication","plugin_category-security-and-spam-protection","plugin_contributors-threatpointuk","plugin_committers-threatpointuk"],"banners":{"banner":"https:\/\/ps.w.org\/threatpoint-email-validator\/assets\/banner-772x250.png?rev=2304160","banner_2x":false,"banner_rtl":false,"banner_2x_rtl":false},"icons":{"svg":false,"icon":"https:\/\/ps.w.org\/threatpoint-email-validator\/assets\/icon-256x256.png?rev=2304160","icon_2x":"https:\/\/ps.w.org\/threatpoint-email-validator\/assets\/icon-256x256.png?rev=2304160","generated":false},"screenshots":[{"src":"https:\/\/ps.w.org\/threatpoint-email-validator\/assets\/screenshot-1.png?rev=2304160","caption":"Plugin Settings Page"}],"raw_content":"<!--section=description-->\n<p>This plugin validates email in realtime using live connections and aggregated data, by leveraging the ThreatPoint email verification API service. One use of this is to prevent spam bots inputting content into comments, easily and effectively<\/p>\n\n<h3>External Service<\/h3>\n\n<p>This plugin allows administrators include email validation using a real time verification service provided by the ThreatPoint email verification API. \nThe Plugin uses existing is_email functionality and passes manually entered email addresses to the restAPI service at ThreatPoint. \nThe response back from the ThreatPoint API provides information related to the email validity(valid email, valid domain, disposable, free, role, risk score). Automatically stop spam bots from entering comments onto your posts by verifying the email address first.<\/p>\n\n<p>The plugin calls the rest API (requires an API KEY) at <a href=\"https:\/\/verify.threatpoint.co.uk\/api\/v1\/resources\/\">this ThreatPoint api endpoint<\/a>\nThe rest API is only passed the email address from the contact form via the is_email function.\nThis external service is called whenever a form using is_email is used. By default the Contact Form 7 is supported. You can include any form field name (email address field) in the plugin to override the default.\nAn API key is required to utilise the service, although the plugin will operate without one it will not be able to pass the email address or call any data from the API. \nYour email addresses will not be validated without a valid API key.<\/p>\n\n<h3>Privacy Policy<\/h3>\n\n<p>The privacy policy for the api services is viewable here <a href=\"https:\/\/threatpoint.co.uk\/privacy-policy\">privacy policy<\/a>\nThis plugin only passes the email address information - no other PII is transferred. The email address is analysed across the aggregated data within the ThreatPoint email verification reputation service and a risk score with email properties (valid, free, role, disposable) to the plugin. Simple rules within the plugin dictate whether the email address is considered valid(set through the plugin settings). The email address is stored in the email address aggregated data and used as part of email address consortium for all customers. No other data such as originating website is stored. Only the email address  is held, with date, time and risk scores associated with the request.<\/p>\n\n<h3>Plugin Features<\/h3>\n\n<ul>\n<li>Validates email addresses in real time including:<\/li>\n<li>Valid email<\/li>\n<li>Valid domain<\/li>\n<li>Disposable Addresses (One time Use)<\/li>\n<li>Role\/Group Addresses<\/li>\n<li>Free Email Addresses<\/li>\n<li>Breached Email Addresses<\/li>\n<li>Email Addresses known to be high risk (spam)<\/li>\n<li>API Documentation is available here: <a href=\"https:\/\/threatpoint.co.uk\/documentation\">documentation<\/a><\/li>\n<li>Video is here [youtube https:\/\/youtu.be\/YD9CAx4f3FM]<\/li>\n<\/ul>\n\n<h3>Special Features<\/h3>\n\n<ul>\n<li>Provide real time email validation and decisions through configuration to allow an administrator the correct flow for their site.<\/li>\n<\/ul>\n\n<h3>Configuration Items<\/h3>\n\n<ul>\n<li>API Key - An API key is required to access the email address validation service as explained above - (api@threatpoint.co.uk)<\/li>\n<li>Blacklisted domains - a list of domains that you would not wish to have entered into your forms<\/li>\n<li>Email Field Name - the field name to pick the email address values from. Defaults to 'your-email' which is the contact form 7 default<\/li>\n<li>Allow Free Email addresses?  - Option to allow or deny free email addresses (gmail, yahoo, hotmail etc.)<\/li>\n<li>Allow disposable Email addresses? - Option to allow or deny one time use email addresses<\/li>\n<li>Allows Role\/Group Email Addresses? - Option to allow role and group email addresses (sales@company.com) for example<\/li>\n<\/ul>\n\n<h3>Localization<\/h3>\n\n<ul>\n<li>English (default) - only language currently supported<\/li>\n<\/ul>\n\n<h3>Feedback<\/h3>\n\n<ul>\n<li>Many thanks for taking the time to look at the plugin<\/li>\n<li>Drop the ThreatPoint team a line <a href=\"http:\/\/twitter.com\/#!\/threatuk\">@threatuk<\/a> on Twitter<\/li>\n<li>Email questions or suggestions via (info@threatpoint.co.uk)<\/li>\n<li>Api key requests via info@threatpoint.co.uk<\/li>\n<\/ul>\n\n<h3>Translations<\/h3>\n\n<ul>\n<li>English - default, currently the only language supported<\/li>\n<\/ul>\n\n<h3>Contributors &amp; Developers<\/h3>\n\n<ul>\n<li>The ThreatPoint team are often asked to investigate attacks on web sites and other services. More often than not these attacks begin from IP addresses that should be considered before access is granted.<\/li>\n<li>ThreatPoint UK provide IP reputation, email verification, device reputation, dark web monitoring and password monitoring services as part of the API service layer. Please contact info@threatpoint.co.uk to find out more about these additional services.<\/li>\n<li>The ThreatPoint IP Reputation WordPress plugin is also available from the WordPress official site.<\/li>\n<\/ul>\n\n<h3>Credits<\/h3>\n\n<ul>\n<li>Many credits go to the fraud and analytics team at ThreatPoint UK and the team behind the API services<\/li>\n<li>Credits to numerous wordpress tutorials used to understand the plugin creation process. notably this article https:\/\/www.sitepoint.com\/real-world-example-wordpress-plugin-development\/<\/li>\n<\/ul>\n\n<!--section=installation-->\n<ol>\n<li>Download plugin from WordPress! or manually upload the entire 'ThreatPoint-email' folder to the '\/wp-content\/plugins\/' directory<\/li>\n<li>Activate the plugin through the 'Plugins' menu in WordPress<\/li>\n<li>The ThreatPoint-Email settings menu will appear<\/li>\n<li>Fill in the API Key and other options<\/li>\n<li>Save the settings<\/li>\n<li>Save the page<\/li>\n<\/ol>\n\n<!--section=faq-->\n<dl>\n<dt id='does%20this%20plugin%20work%20with%20newest%20wp%20versions%20and%20also%20older%20versions%3F'><h3>Does this plugin work with newest WP versions and also older versions?<\/h3><\/dt>\n<dd><p>Yes, this plugin works with 3.5.2 and above.\nWe tested on versions 3.5.2, 4.9.5 up to 5.3.2. As the plugin is simply a way of calling the api and consuming the response the plugin should function in most versions, although we tested mainly on the two versions listed.<\/p><\/dd>\n<dt id='we%20have%20new%20feature%20suggestions%20for%20the%20configuration%20page%2C%20how%20do%20we%20contact%20you%3F'><h3>We have new feature suggestions for the configuration page, how do we contact you?<\/h3><\/dt>\n<dd><p>Please send the ThreatPoint team an email at [info@threatpoint.co.uk]. We know that the risk decision process can vary - we are interested to hear feedback.<\/p><\/dd>\n<dt id='can%20i%20access%20the%20api%20documentation%3F'><h3>Can I access the API documentation?<\/h3><\/dt>\n<dd><p>Yes, please use the following link to the ThreatPoint API documentation: <a href=\"https:\/\/threatpoint.co.uk\/documentation\">documentation<\/a><\/p><\/dd>\n\n<\/dl>\n\n<!--section=changelog-->\n<h4>1.4<\/h4>\n\n<p>added admin url input to stop event firing on admin functions<\/p>\n\n<h4>1.3<\/h4>\n\n<ul>\n<li>Top 10 Email stats added<\/li>\n<\/ul>\n\n<h4>1.2<\/h4>\n\n<ul>\n<li>fixed broken image url<\/li>\n<\/ul>\n\n<h4>1.1<\/h4>\n\n<ul>\n<li>Removed issue where plugin is active during admin user creation<\/li>\n<\/ul>\n\n<h4>1.0<\/h4>\n\n<ul>\n<li>Initial release<\/li>\n<\/ul>","raw_excerpt":"This plugin validates email in realtime using live connections and aggregated data, by leveraging the ThreatPoint email verification API service.","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin\/121555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin"}],"about":[{"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/types\/plugin"}],"replies":[{"embeddable":true,"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/comments?post=121555"}],"author":[{"embeddable":true,"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wporg\/v1\/users\/threatpointuk"}],"wp:attachment":[{"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/media?parent=121555"}],"wp:term":[{"taxonomy":"plugin_section","embeddable":true,"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_section?post=121555"},{"taxonomy":"plugin_tags","embeddable":true,"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_tags?post=121555"},{"taxonomy":"plugin_category","embeddable":true,"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_category?post=121555"},{"taxonomy":"plugin_contributors","embeddable":true,"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_contributors?post=121555"},{"taxonomy":"plugin_business_model","embeddable":true,"href":"https:\/\/bal.wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin_business_model?post=121555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}