The check tests whether the address provided is known as a spam trap:
Syntax | …/svc/2.0/address/spamtrap/<address> |
Example | …/svc/2.0/address/spamtrap/foo@bar.com |
Parameter | An ASCII email address as last part of the URL |
<spamtrapStatus> <infoId>a:foo@bar.com</infoId> <result>1</result> <trapType>1</trapType> </spamtrapStatus>
or
{"infoId": "a:foo@bar.com", "result": 1}
The result document contains:
The service tests the address against the contents of the configured data sources. If there is a match it returns a positive result and the resource ID of the spam trap that matched. First it is checked whether the adress mailexchangers are known for spamtraps, afterwards the email address and domain.
Each execution of the check will be documented as a business event (database table business_event) with type 110.
The botrisk info API call returns information about spam trap resources.
Syntax | .../svc/2.0/info/spamtrap/<id> |
Example | .../svc/2.0/info/spamtrap/a:foo@bar.com |
Parameter | An ID (string) as the last part of the URL (with prefix `a:` for an address and `m:` for a mailexchanger name) |
<spamtrapInfo> <id>foo@bar.com</id> <trapType>1</trapType> <owner>Spamtrap ... GmbH</owner> <remarks>Sending to spam traps of this kind leads to the following reactions ...</remarks> <url>spam110trap.de/x1</url> </spamtrapInfo>
or
{ "id":"foo@bar.com", "trapType":1, "owner":"Spamtrap ... GmbH", "remarks":"Sending to spam traps of this kind leads to the following reactions ...", "url":"spam110trap.de/x1" }
The structure of the result document is: