How verification works (the 9-step process)

Last updated May 19, 2026Email verification

Ever wondered what actually happens when you click Verify?

Behind the scenes, Valid Email Checker runs your email addresses through a sophisticated 9-step verification process. The whole thing happens in a matter of seconds — and we never send a single email to your contacts. Your list stays private, your contacts stay undisturbed, your sender reputation stays intact.

The 9-step verification process

When you verify an email address, here is exactly what happens.

Step 1 — Syntax validation

First, we check if the address is formatted correctly. An email has rules: an @ symbol, a valid domain structure, no weird characters where they should not be.

  • john.smith@company.com — perfect
  • john.smith@company — missing domain extension
  • john.smith.company.com — missing @ symbol
  • john @company.com — space in the wrong place

You would be surprised how many typos slip into lists. gmial.com instead of gmail.com. yahooo.com with an extra o. We catch them all.

Step 2 — Domain verification

Next, we check if the domain actually exists. Anyone can type john@totally-fake-company-12345.com, but if that domain does not exist, your email is going nowhere. We verify the domain is registered, active, and not expired.

Step 3 — MX record check

MX records (Mail Exchange records) tell the internet where to deliver mail for a domain. Think of them as a mailing address for email. A domain might exist (maybe it is a website) but have no email capability at all — no MX records, no email reception. We catch that.

Step 4 — SMTP verification

This is where the real magic happens. SMTP (Simple Mail Transfer Protocol) is the language email servers speak. We connect to the recipient mail server and have a polite conversation:

text
Us: "Hey, we would like to deliver an email to john@company.com"
Server: "Let me check... Yes, that mailbox exists."
Us: "Great, thanks. Goodbye."

We get the answer without sending anything. The server confirms whether the specific mailbox exists. This is how we know:

  • If the exact address is registered
  • If the mailbox is active and accepting mail
  • If the account has been deleted or disabled

Step 5 — Catch-all detection

Some domains are configured as catch-all — they accept emails sent to *any* address, even ones that do not exist.

text
You: "Could I send to random-gibberish-12345@catch-all-company.com?"
Server: "Sure, I will accept that."

But there is no actual mailbox. The message might land in a general inbox, or nowhere at all. Catch-all domains make verification tricky because the server always says yes. We detect them and flag them separately so you can decide how to handle them.

See What is a catch-all email domain? for the full breakdown of how to handle these.

Step 6 — Disposable email detection

Disposable emails are addresses people create once and forget. Services like Guerrilla Mail, 10MinuteMail, Temp Mail, and Mailinator let anyone create an instant email that expires after a short window.

These are problematic for senders because:

  • The person did not want to hear from you (that is the whole point of using a throwaway)
  • The address stops working soon — or already has
  • They will never convert, engage, or buy

We maintain a constantly updated database of disposable email providers and flag these addresses immediately.

Step 7 — Role account detection

Role-based emails belong to a function, not a person. Examples: info@company.com, support@company.com, sales@company.com, admin@company.com, billing@company.com. These addresses are valid and will receive your email, but they are often:

  • Monitored by multiple people (or no one specific)
  • Less likely to engage with marketing emails
  • More likely to mark you as spam

We flag them so you can segment appropriately.

Step 8 — Spam trap detection

Spam traps are addresses designed to catch spammers. They look like normal emails but are actually honeypots.

Pristine spam traps were created specifically to catch spammers — never used by a real person. If you are emailing them, you probably scraped or bought a bad list.

Recycled spam traps are old addresses that were abandoned, then repurposed as traps. That contact from 2018 who left the company? Their email might now be a trap.

Hitting spam traps can get your domain blacklisted. We identify known traps and flag them before they damage your reputation. See What is a spam trap? for the longer breakdown.

Step 9 — Additional checks

We also detect:

CheckWhat it means
Free Email ProviderGmail, Yahoo, Outlook, etc. Not bad, just useful to know.
Inbox FullThe mailbox exists but cannot receive new messages.
Disabled AccountThe account existed but has been deactivated.

All of this happens in seconds. You upload your list, we run every email through all 9 steps, you get clean, verified results.

What we never do

A few things we are deliberate about.

We never send emails to your contacts

Some sketchy services actually send test emails to verify addresses. We do not. Our verification is completely passive — your contacts have no idea they were verified.

We never store your data permanently

Your uploaded email lists are automatically deleted after 15 days. We verify, you download, we delete. The verification results themselves stay in your account so you can review history, but the raw lists are removed.

We never share your lists

Your data is yours. We do not sell it, share it, or use it for anything other than verification.

Why multi-server verification matters

Valid Email Checker uses multiple verification servers located around the world. Why does this matter?

  • Speed — we route verification requests to the optimal server, processing thousands of emails in minutes
  • Accuracy — different servers can get different responses; we use this to improve accuracy
  • Reliability — if one server is slow or blocked, we automatically route to another

This distributed approach is how we verify Gmail, Yahoo, Outlook, and corporate domains with consistently high accuracy.

The accuracy question

"How accurate is email verification?"

Here is the honest answer: no verification service is 100% accurate, 100% of the time. Email is complicated. Servers behave differently. Some domains are configured in ways that make verification uncertain.

What Valid Email Checker guarantees:

  • 99.5% overall accuracy
  • ≤3% bounce rate on emails we mark as Safe — or we refund the difference in credits

See Our Guarantee for how the bounce-rate guarantee works in practice.

Why 100% is impossible

Some situations make verification inherently uncertain:

SituationWhy it is tricky
Catch-all domainsServer accepts everything — cannot confirm the specific mailbox
GreylistingServer temporarily rejects to fight spam, then accepts later
Rate limitingSome servers limit verification attempts
Recent changesEmail deleted right after verification

When we cannot verify with certainty, we tell you. That is what Catch-All and Unknown results are for.

How long verification takes

Single email: instant (under 1 second in most cases).

Bulk verification: depends on list size:

List sizeApproximate time
100 emailsSeconds
1,000 emailsUnder 1 minute
10,000 emails5 to 10 minutes
100,000 emails15 to 30 minutes
1,000,000 emails1 to 2 hours

Speed depends on how quickly recipient mail servers respond. Gmail is fast. Some corporate servers are slower. We verify as quickly as the servers will allow.

Quick vs. Power verification

Valid Email Checker uses Power Mode for maximum accuracy on every verification. Power Mode includes all 9 verification steps, individual mailbox SMTP verification, detailed status for every email, and comprehensive results with confidence scores.

Some services offer a "quick" mode that skips the SMTP check. That is faster but less accurate — it might tell you an email is valid when the specific mailbox does not exist. We do not cut corners.

What happens to your results

After verification, each email gets:

  1. A status (Safe, Invalid, Catch-All, etc.)
  2. A confidence score (0-100)
  3. Detailed flags (Free email, Role account, etc.)

You can download results and filter by any of these attributes.

The bottom line

StepWhat we doWhy it matters
1Syntax checkCatches typos and formatting errors
2Domain verificationConfirms the domain exists
3MX record checkConfirms email capability
4SMTP verificationConfirms the specific mailbox exists
5Catch-all detectionFlags uncertain domains
6Disposable detectionRemoves throwaway addresses
7Role account detectionIdentifies group emails
8Spam trap detectionProtects your reputation
9Additional checksFull picture of each email

All of this happens automatically, in seconds, without ever contacting your email list.