Data API

Overview

Trustfull Data APIs provide real-time access to individual trust and risk signals across email addresses, phone numbers, and IP addresses. Each endpoint is designed to be lightweight, fast, and composable, so you can use them independently or combine them into your own scoring and decision logic.

Below is an overview of each available Data API.

Email Disposable

The Email Disposable API identifies whether an email address belongs to a temporary or disposable email service commonly used for fake signups, account farming, and abuse. In addition to detecting known disposable providers, it validates email structure and domain characteristics to help distinguish low-quality or short-lived addresses from legitimate ones at signup or login.

Check the Email Disposable API Reference to learn how to set it up.

Phone Validation

The Phone Validation API verifies whether a phone number is structurally valid and reachable, returning key metadata such as line type, country, and carrier. This API helps prevent errors, reduce failed OTP delivery, and filter out invalid numbers before triggering downstream verification or messaging flows.

Check the Phone Validation API Reference to learn how to set it up.

Phone Disposable

The Phone Disposable API detects phone numbers associated with virtual, VoIP, or disposable services that are frequently used for short-lived accounts and automated abuse. It helps identify numbers that are unlikely to belong to real, long-term users and should be treated with higher risk or additional verification.

Check the Phone Disposable API Reference to learn how to set it up.

IP Proxy Detection

The IP Proxy Detection API determines whether an IP address is associated with anonymization or masking technologies such as VPNs, proxies, relays, or Tor. It also distinguishes between residential and datacenter infrastructure, helping identify high-risk access patterns commonly linked to fraud, bots, and abuse.

Check the IP Proxy Detection API Reference to learn how to set it up.

Phone Data Breaches

The Phone Data Breaches API checks whether a phone number appears in known historical data breaches. Breach presence, frequency, and recency provide valuable context about how long a phone number has been reused and whether it is likely tied to a real, persistent identity rather than a newly created or disposable one.

Check the Phone Data Breaches API Reference to learn how to set it up.

Phone Portability

The Phone Portability API retrieves mobile number portability information, including whether a phone number has been ported between carriers and when this occurred. Porting data helps detect SIM-swap risk, account takeover attempts, and suspicious changes in ownership or control.

Check the Phone Portability API Reference to learn how to set it up.

Phone to Name

The Phone to Name API attempts to associate a phone number with an owner name using open-source intelligence and aggregated data signals. This enrichment helps validate identity consistency and detect mismatches between declared user information and external signals.

Check the Phone to Name API Reference to learn how to set it up.