a list of disposable and temporary email address domains
Go to file
2018-05-17 16:20:27 -07:00
.travis.yml add check for public suffix 2018-02-04 21:22:36 -05:00
disposable_email_blacklist.conf add nwytg.com 2018-05-17 16:20:27 -07:00
README.md shorten c# example code 2018-04-27 18:33:13 +02:00
requirements.txt use the altest version of PSL database 2018-02-04 23:55:37 -05:00
verify.py use the altest version of PSL database 2018-02-04 23:55:37 -05:00
whitelist.conf Move "nus.edu.sg" to whitelist 2018-04-09 21:09:52 -04:00

List of disposable email domains

Licensed under CC0

This repo contains a list of disposable and temporary email address domains often used to register dummy users in order to spam/abuse some services.

Originally collected to filter new user registration at https://usegalaxy.org and later merged with other lists found online. I cannot guarantee all of these can still be considered disposable but they probably were at one point in time.

Whitelist

The file whitelist.conf gathers email domains that are often identified as disposable but in fact are not.

Example Usage

Python

blacklist = ('disposable_email_blacklist.conf')
blacklist_content = [line.rstrip() for line in blacklist.readlines()]
if email.split('@')[1] in blacklist_content:
    message = "Please enter your permanent email address."
    return (False, message)
else:
    return True

Available as PyPI module thanks to @di

>>> from disposable_email_domains import blacklist
>>> 'bearsarefuzzy.com' in blacklist
True

PHP contributed by @txt3rob, @deguif and @pjebs

function is_disposable_email($email) {
  $path = realpath(dirname(__FILE__)) . '/disposable_email_blacklist.conf';
  $mail_domains_ko = file($path, FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES);
  $mail_domains_ko = array_fill_keys($mail_domains_ko, true);
  $domain = mb_strtolower(explode('@', trim($email))[1]);
  return (isset($mail_domains_ko[$domain]) || array_key_exists($domain, $mail_domains_ko));
}

Ruby on Rails contributed by @MitsunChieh

In resource model, usually it is user.rb

before_validation :reject_email_blacklist

def reject_email_blacklist
  blacklist = File.read('config/disposable_email_blacklist.conf').split("\n")

  if blacklist.include?(email.split('@')[1])
    errors[:email] << 'invalid email'
    return false
  else
    return true
  end
end

NodeJs contributed by @martin-fogelman

'use strict';

const readline = require('readline'),
  fs = require('fs');

const input = fs.createReadStream('./disposable_email_blacklist.conf'),
  output = [],
  rl = readline.createInterface({input});

// PROCESS LINES
rl.on('line', (line) => {
  console.log(`Processing line ${output.length}`);
  output.push(line);
});

// SAVE AS JSON
rl.on('close', () => {
  try {
    const json = JSON.stringify(output);
    fs.writeFile('disposable_email_blacklist.json', json, () => console.log('--- FINISHED ---'));
  } catch (e) {
    console.log(e);
  }
});

C#

private static readonly Lazy<HashSet<string>> _emailBlackList = new Lazy<HashSet<string>>(() =>
{ 
  var lines = File.ReadLines("disposable_email_blacklist.conf")
    .Where(line => !string.IsNullOrWhiteSpace(line) && !line.TrimStart().StartsWith("//"));
  return new HashSet<string>(lines, StringComparer.OrdinalIgnoreCase);
});

private static bool IsBlacklisted(string domain) => _emailBlackList.Value.Contains(domain);

...

var addr = new MailAddress(email);
if (IsBlacklisted(addr.Host)))
  throw new ApplicationException("Email is blacklisted.");

Contributing

Feel free to create PR with additions or request removal of some domain (with reasons).

Use

$ cat disposable_email_blacklist.conf your_file | tr '[:upper:]' '[:lower:]' | sort -f | uniq -i > new_file.conf

$ comm -23 new_file.conf whitelist.conf > disposable_email_blacklist.conf

to add contents of another file in the same format (only second level domains on new line without @). It also converts uppercase to lowercase, sorts, removes duplicates and removes whitelisted domains.

Changelog

  • 7/31/17 @deguif joined as a core maintainer of this project. Thanks!

  • 12/6/16 - Available as PyPI module thanks to @di

  • 7/27/16 - Converted all domains to the second level. This means that starting from this commit the implementers should take care of matching the second level domain names properly i.e. @xxx.yyy.zzz should match yyy.zzz in blacklist more info in #46