Built for SaaS founders & app developers

Stop bots, VPN abusers & fake accounts at signup.

Lookup lets you verify IPs, emails and phone numbers in real time, so free trials, OTPs and verification emails only go to real humans.

  • Detect VPN, Tor, crawlers and server IPs before granting freebies.
  • Validate emails and block disposable / spam-trap addresses.
  • Verify phone numbers before sending expensive SMS OTPs.

In a world with more bots than humans, Lookup is your first line of defense at signup.

You're not just onboarding users. You're onboarding risk.

AI-generated bots, spammers and fraud rings sign up to your product every day. They drain your free trial, poison your email reputation, and burn your SMS budget.

Free trial abuse

The same person creates dozens of accounts using VPNs, Tor and rotating IPs to farm your free tier or redeem multiple “new user” promos.

  • Flag IPs from VPNs, Tor and hosting providers instantly.
  • Prioritize home / residential IPs for trials and promotions.
  • Combine IP signals with your own user IDs to block repeat abusers.

Email deliverability & spam traps

Malicious users can sign up with fake or honeytrap emails to deliberately hurt your domain and IP reputation.

  • Verify if an email address is real and deliverable before sending.
  • Detect disposable and temporary inboxes at signup.
  • Avoid spam-trap addresses that can tank deliverability.

Expensive, wasted SMS OTPs

Every SMS you send to a dead or invalid number is pure cost. At scale, unverified OTP messages become a serious line item.

  • Check if a phone number exists and is reachable before sending OTP.
  • Identify carriers and line types (mobile vs fixed) for routing.
  • Reduce fraud on phone-based signups and password resets.

One API. Three powerful checks.

Lookup combines IP intelligence, email validation and phone verification into a single, developer-friendly API. Plug it into your signup, login and checkout flows to keep the bad traffic out.

IP

IP Intelligence

Instantly detect whether a user is hiding behind a VPN, Tor, proxy or server before they touch your product.

  • Classify IPs as vpn, tor, server, crawler or lesserKnown.
  • Identify known hosting providers, data centers and suspicious ranges.
  • Allow good crawlers (Google, Bing) while blocking abuse.

Use at signup or promo redemption to block VPN users from claiming multiple freebies.

Email Validation

Verify that emails are real, deliverable and safe to send to before sending verification links or onboarding sequences.

  • Check syntax, MX records and mailbox existence.
  • Detect disposable and temporary email providers.
  • Spot likely spam-trap and honeytrap addresses.

Protect your sender reputation and keep your IPs off blacklists.

Phone Verification

Validate phone numbers before you send costly OTPs or transactional messages.

  • Confirm number format, existence and reachability.
  • Identify carrier and line type (mobile, VoIP, landline).
  • Reduce fraud in SMS-based signups and 2FA flows.

Only pay for OTPs that have a real destination.

Plug Lookup into every critical point of your funnel.

Don't wait until abuse hits your servers. Run checks the moment a user interacts with your product.

1. Signup & onboarding

  • Verify IP is not VPN / Tor / data center before creating the account.
  • Check email deliverability before sending the verification link.
  • Reject disposable emails and obvious spam traps at the door.

2. Free trials & promotions

  • Limit trials and coupons to home IPs and trusted networks.
  • Spot recurring signups coming from the same IP blocks.
  • Prevent VPN users from cycling through “free forever”.

3. Login, billing & high‑risk actions

  • Re-check IPs on login from new locations or devices.
  • Validate phone numbers before password resets and 2FA.
  • Score risk in real-time for payments and high‑value actions.

Developer‑first. Simple HTTP POST. Clean JSON.

No SDK lock‑in, no complicated handshakes. Send a POST request, get back structured risk signals you can act on immediately.

IP lookup example

Use the checkIP action to determine if an IP is a VPN, Tor, server or real user.

# Using cURL
curl -X POST "https://lookup.im/api.php" \
-d "action=checkIP&ip=8.8.8.8&token=YOUR_TOKEN"
// Using PHP
$url = 'https://lookup.im/api.php';
$post_data = array(
  'action' => 'checkIP',
  'ip'     => '8.8.8.8',
  'token'  => 'YOUR_TOKEN'
);
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, $post_data);
$response = curl_exec($ch);
curl_close($ch);
// Using Java
URL url = new URL("https://lookup.im/api.php");
HttpURLConnection con = (HttpURLConnection) url.openConnection();
con.setRequestMethod("POST");
con.setDoOutput(true);
String data = "action=checkIP&ip=8.8.8.8&token=YOUR_TOKEN";
con.getOutputStream().write(data.getBytes("UTF-8"));
InputStream response = con.getInputStream();

Response structure

{
"status": "found",
"type": "vpn"
}
  • statusfound if the IP is known; notfound for normal users.
  • type — one of: vpn, tor, server, crawler, lesserKnown.
  • crawler — legitimate bots like Google or Bing.
  • lesserKnown — servers likely to be used for VPNs and abuse, often before they appear in public VPN lists.

Email & phone lookups

Email and phone verification use the same endpoint pattern and token, returning JSON with deliverability and validity flags you can integrate into your signup logic, risk engine or internal tools.

Designed to be fast enough for real‑time checks on every signup, login and transaction.

Pricing that scales with your product.

Start free, ship your integration, then upgrade as your traffic grows. All plans include IP, email and phone lookups.

Billing

All paid plans include full API access, dashboard, logs and priority email support.

Ready to stop bots and bad data at the door?

It only takes a few lines of code to protect your trials, your sender reputation and your SMS budget.