SlideShare a Scribd company logo
https://www.fraudlabspro.com/
 An email address must comes with two parts separated by an at-sign (@), namely
the local part and domain part.
 The characters allowed in both parts are different based on several conditions and
restrictions.
 The local part can contain up to 64 character and also contain some special
characters without any restrictions:
 Any special character that are not listed, should be used in the quotes.
 For example,
 Be in mind that the period sign (.) can be used in local part with the following
restrictions:
! # $ % & ‘ * + – / = ? ^ _ ` . { | } ~
 Abc@def@example.com
 Fred Bloggs@example.com
 Not in the first or last of the local part
 Cannot be used consecutively.
 The length of domain part has up to 255 characters
 It must follow the requirement for hostname and a list of dot-separated DNS
labels limitation of 63 characters length with the requirements of:
 Note: The dotless domain name(xxx@example) is prohibited by the Internet
Corporation for Assigned Names and Numbers(ICANN) due to security and
stability risks.
• uppercase and lowercase Latin letters a to z;
• Number digits 0-9, with the condition of top-level domains cannot be all
numeric;
• The hypen symbol(-), provided that it should not be the first or the last
character.
 Below is the sample of regular expression:
 This regular expression will first check the first character in email address if the
double quote found, it will make sure the character embraced inside the double
quote is valid as according to the standard.
/^([!#-'*+/-9=?A-Z^-~-]{1,64}(.[!#-'*+/-9=?A-Z^-~-]{1,64})*|"([]!#-[^-~
t@]|([t -~]))+")@([0-9A-Z]([0-9A-Z-]{0,61}[0-9A-Za-z])?(.[0-9A-Z]([0-9A-Z-
]{0,61}[0-9A-Za-z])?))+$/i
 There are some exception cases. For example, the following cases will not pass the
regular expression checking although it’s correct.
 “test”test”@example.com
 “test”.”test”@example.com
 “test”.test@example.com
 “test”@example.com
 “test”@example.com
 Please note that although RFC standards allows the use of IP address in domain
part, but this is not cover in this regular expression checking.
https://www.fraudlabspro.com

More Related Content

More from BenHamminton

How to use mailbox validator symfony bundle to validate email
How to use mailbox validator symfony bundle to validate emailHow to use mailbox validator symfony bundle to validate email
How to use mailbox validator symfony bundle to validate email
BenHamminton
 
How to create map visualization in kibana using ip2location
How to create map visualization in kibana using ip2locationHow to create map visualization in kibana using ip2location
How to create map visualization in kibana using ip2location
BenHamminton
 
Preventing click fraud
Preventing click fraudPreventing click fraud
Preventing click fraud
BenHamminton
 
What is ship forwarder
What is ship forwarderWhat is ship forwarder
What is ship forwarder
BenHamminton
 
10 measures to reduce credit card fraud for Internet Merchants
10 measures to reduce credit card fraud for Internet Merchants10 measures to reduce credit card fraud for Internet Merchants
10 measures to reduce credit card fraud for Internet Merchants
BenHamminton
 
How to define email marketing roi
How to define email marketing roiHow to define email marketing roi
How to define email marketing roi
BenHamminton
 
How to use ip2 location in r language
How to use ip2 location in r languageHow to use ip2 location in r language
How to use ip2 location in r language
BenHamminton
 

More from BenHamminton (7)

How to use mailbox validator symfony bundle to validate email
How to use mailbox validator symfony bundle to validate emailHow to use mailbox validator symfony bundle to validate email
How to use mailbox validator symfony bundle to validate email
 
How to create map visualization in kibana using ip2location
How to create map visualization in kibana using ip2locationHow to create map visualization in kibana using ip2location
How to create map visualization in kibana using ip2location
 
Preventing click fraud
Preventing click fraudPreventing click fraud
Preventing click fraud
 
What is ship forwarder
What is ship forwarderWhat is ship forwarder
What is ship forwarder
 
10 measures to reduce credit card fraud for Internet Merchants
10 measures to reduce credit card fraud for Internet Merchants10 measures to reduce credit card fraud for Internet Merchants
10 measures to reduce credit card fraud for Internet Merchants
 
How to define email marketing roi
How to define email marketing roiHow to define email marketing roi
How to define email marketing roi
 
How to use ip2 location in r language
How to use ip2 location in r languageHow to use ip2 location in r language
How to use ip2 location in r language
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

How to validate an email address syntax

  • 2.  An email address must comes with two parts separated by an at-sign (@), namely the local part and domain part.  The characters allowed in both parts are different based on several conditions and restrictions.
  • 3.  The local part can contain up to 64 character and also contain some special characters without any restrictions:  Any special character that are not listed, should be used in the quotes.  For example,  Be in mind that the period sign (.) can be used in local part with the following restrictions: ! # $ % & ‘ * + – / = ? ^ _ ` . { | } ~  Abc@def@example.com  Fred Bloggs@example.com  Not in the first or last of the local part  Cannot be used consecutively.
  • 4.  The length of domain part has up to 255 characters  It must follow the requirement for hostname and a list of dot-separated DNS labels limitation of 63 characters length with the requirements of:  Note: The dotless domain name(xxx@example) is prohibited by the Internet Corporation for Assigned Names and Numbers(ICANN) due to security and stability risks. • uppercase and lowercase Latin letters a to z; • Number digits 0-9, with the condition of top-level domains cannot be all numeric; • The hypen symbol(-), provided that it should not be the first or the last character.
  • 5.  Below is the sample of regular expression:  This regular expression will first check the first character in email address if the double quote found, it will make sure the character embraced inside the double quote is valid as according to the standard. /^([!#-'*+/-9=?A-Z^-~-]{1,64}(.[!#-'*+/-9=?A-Z^-~-]{1,64})*|"([]!#-[^-~ t@]|([t -~]))+")@([0-9A-Z]([0-9A-Z-]{0,61}[0-9A-Za-z])?(.[0-9A-Z]([0-9A-Z- ]{0,61}[0-9A-Za-z])?))+$/i
  • 6.  There are some exception cases. For example, the following cases will not pass the regular expression checking although it’s correct.  “test”test”@example.com  “test”.”test”@example.com  “test”.test@example.com  “test”@example.com  “test”@example.com  Please note that although RFC standards allows the use of IP address in domain part, but this is not cover in this regular expression checking.