a list of disposable and temporary email address domains
Go to file
Martin Cech 170d0826ca
add payperex2.com
closes #129

thanks @ar-anvd
2017-11-09 10:48:15 -05:00
disposable_email_blacklist.conf add payperex2.com 2017-11-09 10:48:15 -05:00
README.md Fix C# sample 2017-10-23 00:20:57 +03:00
whitelist.conf whitelist also the full sneakemail.com domain 2017-08-28 09:46:13 -04:00

List of disposable email domains

Licensed under CC0

This repo contains a list of disposable and temporary email address domains often used to register dummy users in order to spam/abuse some services.

Originally collected to filter new user registration at https://usegalaxy.org and later merged with other lists found online. I cannot guarantee all of these can still be considered disposable but they probably were at one point in time.

Whitelist

The file whitelist.conf gathers email domains that are often identified as disposable but in fact are not.

Example Usage

Python

blacklist = ('disposable_email_blacklist.conf')
blacklist_content = [line.rstrip() for line in blacklist.readlines()]
if email.split('@')[1] in blacklist_content:
    message = "Please enter your permanent email address."
    return (False, message)
else:
    return True

Available as PyPI module thanks to @di

>>> from disposable_email_domains import blacklist
>>> 'bearsarefuzzy.com' in blacklist
True

PHP contributed by @txt3rob and @deguif

function is_temp_mail($mail) {
    $mail_domains_ko = file('disposable_email_blacklist.conf', FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES);

    //Need to ensure the mail contains an @ to avoid undefined offset
    return in_array(explode('@', $mail)[1], $mail_domains_ko);
}

Ruby on Rails contributed by @MitsunChieh

In resource model, usually it is user.rb

before_validation :reject_email_blacklist

def reject_email_blacklist
  blacklist = File.read('config/disposable_email_blacklist.conf').split("\n")

  if blacklist.include?(email.split('@')[1])
    errors[:email] << 'invalid email'
    return false
  else
    return true
  end
end

NodeJs contributed by @martin-fogelman

'use strict';

const readline = require('readline'),
  fs = require('fs');

const input = fs.createReadStream('./disposable_email_blacklist.conf'),
  output = [],
  rl = readline.createInterface({input});

// PROCESS LINES
rl.on('line', (line) => {
  console.log(`Processing line ${output.length}`);
  output.push(line);
});

// SAVE AS JSON
rl.on('close', () => {
  try {
    const json = JSON.stringify(output);
    fs.writeFile('disposable_email_blacklist.json', json, () => console.log('--- FINISHED ---'));
  } catch (e) {
    console.log(e);
  }
});

C#

private static readonly Lazy<HashSet<string>> _emailBlackList =
  new Lazy<HashSet<string>>(
    () =>
    {
      var result = new HashSet<string>(StringComparer.OrdinalIgnoreCase);
      using (var reader = new StreamReader("disposable_email_blacklist.conf"))
      {
        string line;
        while ((line = reader.ReadLine()) != null)
          if (!string.IsNullOrWhiteSpace(line) && !line.TrimStart().StartsWith("//"))
            result.Add(line);
      }
      return result;
    });

private static bool IsBlacklisted(string domain)
{
  var parts = domain.Split('.');
  var len = parts.Length;
  return
    len == 1 && _emailBlackList.Value.Contains(domain)
    || _emailBlackList.Value.Contains($"{parts[len - 2]}.{parts[len - 1]}")
    || len > 2 && _emailBlackList.Value.Contains($"{parts[len - 3]}.{parts[len - 2]}.{parts[len - 1]}");
}

...

var addr = new MailAddress(email);
if (IsBlacklisted(addr.Host)))
  throw new ApplicationException("Email is blacklisted.");

Contributing

Feel free to create PR with additions or request removal of some domain (with reasons).

Use

$ cat disposable_email_blacklist.conf your_file | tr '[:upper:]' '[:lower:]' | sort -f | uniq -i > new_file.conf

$ comm -23 new_file.conf whitelist.conf > disposable_email_blacklist.conf

to add contents of another file in the same format (only second level domains on new line without @). It also converts uppercase to lowercase, sorts, removes duplicates and removes whitelisted domains.

Changelog

  • 7/31/17 @deguif joined as a core maintainer of this project. Thanks!

  • 12/6/16 - Available as PyPI module thanks to @di

  • 7/27/16 - Converted all domains to the second level. This means that starting from this commit the implementers should take care of matching the second level domain names properly i.e. @xxx.yyy.zzz should match yyy.zzz in blacklist more info in #46