The Problem with Static Lists
The vast majority of email validation solutions rely on static blacklists: a database of known disposable domains (Yopmail, Mailinator, Guerrilla Mail…) updated periodically.
This approach works for established and popular domains. But it has a critical blind spot: new domains.
Every week, hundreds of new disposable domains appear. Some are operational within hours. If your solution only updates its lists daily or weekly, there’s an exposure window during which addresses from newly created domains go undetected.
The solution: don’t just recognize known domains, but analyze the DNS behavior of any unknown domain to determine whether it exhibits the characteristics of a disposable domain.
What Is MX Fingerprinting?
MX fingerprinting is a technique that involves analyzing the configuration of a domain’s MX (Mail Exchanger) records to extract a revealing “fingerprint” of its nature.
An MX record indicates which mail server is responsible for receiving emails for a domain. Its value goes far beyond a simple yes/no on email-receiving capability.
What MX reveals:
-
The messaging provider identity: an MX pointing to
aspmx.l.google.comindicates Google Workspace; an MX tomailinator.comindicates a known disposable mail service. -
Shared infrastructure: many disposable mail services share their infrastructure. A single MX server may handle thousands of different disposable domains.
-
Configuration consistency: a legitimate domain typically has multiple MX records (redundancy), consistent SPF and DMARC records, and a stable TTL.
The DNS Signals Analyzed
MX Record
; Typical disposable domainsuspicious-temp.xyz. 3600 IN MX 10 mail.shared-disposable-mx.net.
; Typical legitimate domaincompany.com. 3600 IN MX 1 aspmx.l.google.com. 3600 IN MX 5 alt1.aspmx.l.google.com. 3600 IN MX 10 alt2.aspmx.l.google.com.The first example shows two signals: a single MX (no redundancy) and a hostname that doesn’t match any recognized legitimate provider.
SPF Record
; Missing SPF (risk signal); No TXT record of type "v=spf1" found
; Generic disposable SPF"v=spf1 include:mail.shared-disposable-mx.net ~all"
; Legitimate SPF"v=spf1 include:_spf.google.com include:sendgrid.net ~all"Missing SPF is relatively rare for legitimate domains active for more than 30 days. For a newly created domain, it’s an ambivalent signal — but combined with other factors, it weighs into the score.
DMARC Record
; Missing DMARC; No TXT record at _dmarc.domain.
; Minimal DMARC (often found on suspicious domains)"v=DMARC1; p=none;"
; Solid DMARC (mature domain)"v=DMARC1; p=reject; rua=mailto:[email protected]; pct=100"Domain Age (WHOIS)
A domain created less than 24 hours ago is statistically very suspicious. Less than 7 days: high probability of disposable or malicious domain. Less than 30 days: vigilance signal.
Multi-Signal Analysis
No single signal in isolation is determinative. It’s their combination that reveals the nature of a domain.
An unknown domain created 3 hours ago, without SPF or DMARC, with a single unrecognized MX can reach a high risk score — long before appearing in any blacklist. That’s the essence of fingerprinting: identifying a behavioral fingerprint rather than simply recognizing an already-catalogued domain.
The risk score (0–100) and deliverability score (0–100) are produced by the analysis engine. They’re not the result of simple point addition — they reflect a qualification of the domain’s actual infrastructure at the time of the request.
The Real-Time Advantage vs. Static Lists
Let’s compare the two approaches on a concrete scenario: a disposable mail service launches a new domain at 2:00 PM.
Static list approach:
- 2:00 PM: domain created, not yet in lists
- 3:00 PM: first fraudulent uses
- 2:00 AM next day: nightly list update
- → 24 hours of exposure
DNS fingerprinting approach:
- 2:00 PM: domain created
- 2:01 PM: first request to Syvel → real-time DNS analysis → score 70/100 → blocked
- → 0 hours of exposure
The difference is fundamental for SaaS services, e-commerce platforms, and lead generation tools where thousands of forms are submitted every hour.
Latency and Caching
DNS fingerprinting is a network I/O operation. To guarantee imperceptible latency in your forms, results are transparently cached — already-analyzed domains return a near-instant response, indicated by the cached field in the API.
For a never-seen domain, the complete analysis is performed in real time. That’s the cost of immediate detection — and it’s precisely what differentiates fingerprinting from a simple list lookup.
Limits and Edge Cases
No technique is perfect. There are edge cases to know:
Potential false positives:
- A very recent company domain (startup created yesterday) may score high without being disposable
- Some regional or niche domains have atypical MX configurations without being suspicious
Our approach to limiting them:
- Score 100 is reserved for confirmed blacklist entries — domains scored high by fingerprinting alone never reach 100
- You can configure your blocking threshold (we recommend 80+ for silent blocking, 60–79 for warnings)
- A whitelist lets you exclude legitimate domains that would be incorrectly flagged
Potential false negatives:
- A disposable service using legitimate infrastructure (Gmail aliases, Outlook throwaway addresses) won’t be detected by MX fingerprinting alone — that’s why we combine multiple approaches
Why This Matters for Your Product
If you’re building a SaaS with a free plan, a marketplace, or a lead generation tool, real-time fingerprinting is an essential defense layer.
Malicious users don’t stay on known domains — they constantly adapt. The only response to this adaptation is detection that’s equally adaptive, based on behavioral patterns rather than static lists.
Syvel combines both approaches: continuously maintained blacklist and real-time DNS fingerprinting for unknown domains. The API returns a risk_score, a deliverability_score, the identified mx_provider_label, and also detects privacy alias services (SimpleLogin, AnonAddy, Apple Hide My Email) that mask the real address. You get the best possible coverage, no matter how quickly new threats emerge.
To understand all the available email validation methods, see our guide on regex, DNS, and SMTP validation techniques.