All FAQ

1. What is Checker? Checker is an API-based tool designed to identify and block disposable email addresses during user registration. Its primary purpose is to ensure that only valid and legitimate users can sign up for your platform, preventing fake accounts.

2. How does Checker work? Checker leverages a constantly updated database of over 170,000 disposable email domains. When an email address is submitted during registration, Checker instantly verifies if it’s disposable and flags or blocks it accordingly.

3. Who can use Checker? Checker is ideal for SaaS platforms, e-commerce sites, and any business that wants to protect their user registration processes from fake or abusive accounts.

4. Can I use Checker without technical expertise? Absolutely. While developers can easily integrate Checker, our team also provides free setup support to assist users without technical knowledge during the integration process.

5. What platforms is Checker compatible with? Currently, Checker operates via API integration. A dedicated WordPress plugin is in development and will be available soon.

6. How does Checker prevent fake users? Checker detects and blocks disposable and fake email addresses during the registration process, preventing these accounts from accessing your platform. This improves the quality of your user data and reduces the risk of misuse.

7. Which industries is Checker best suited for? Checker is particularly beneficial for SaaS businesses, e-commerce platforms, and any industry where accurate and reliable user data is critical.

8. Will Checker slow down my registration process? Not at all. Checker operates with a response time of approximately 100ms, ensuring that disposable email detection happens in real-time without impacting the user experience.

9. Is my data secure with Checker? Yes, your data is completely secure. Checker uses HTTPS for all connections and strictly adheres to data security standards to protect your information.

10. Does Checker provide customer support? Yes, Checker offers 24/7 support to all users. Lifetime support is included free of charge for LTD (Lifetime Deal) customers.

11. Does Checker block vendor-specific emails? Checker does not currently block vendor-specific or temporary forwarding emails (e.g., noreply@company.com). Its focus is on detecting disposable domains specifically designed for abuse.

12. When will app integrations be available? Which apps will come first? The first integration will be for WordPress, and it is scheduled for release soon. Additional integrations with marketing platforms and CMS tools are planned in the roadmap.

13. Are the only differences between LTD plans the number of requests per second? Not exactly. The differences between LTD plans include:

  • Requests per second: Determines how many validation requests can be processed simultaneously.

  • API connections: Indicates how many different platforms or environments Checker can be integrated with. For example, 2 API connections allow you to use Checker with two separate SaaS platforms or systems.

14. Can Checker work with email marketing platforms? Currently, Checker does not have direct integrations with email marketing platforms. However, you can use the API to validate email addresses collected from these platforms. Future updates may include specific integrations for marketing tools.

15. Does this mean my site’s form submissions will be free of disposable emails? Yes! Once integrated, Checker ensures that any form submissions on your site are free of disposable email addresses by blocking or flagging them in real-time.

16. Can Checker be used on squeeze pages for lead generation? At the moment, Checker is not optimized for squeeze pages or marketing campaigns. Its primary focus is on blocking disposable emails during the registration process to prevent abuse.

17. Is Checker compliant with GDPR, CCPA, or other data protection regulations? Yes, Checker is fully compliant with GDPR, CCPA, and other data protection regulations. It does not store or share email data and uses secure, encrypted communication protocols for all operations.

Last updated