[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fu1ZuYbq-XV2l2utYP14aKj5rXq0h9GtfoU11YGJ2sOA":3},{"slug":4,"display_name":5,"profile_url":6,"plugin_count":7,"total_installs":8,"avg_security_score":9,"avg_patch_time_days":10,"trust_score":11,"computed_at":12,"plugins":13},"threatpointuk","ThreatPoint UK","https:\u002F\u002Fprofiles.wordpress.org\u002Fthreatpointuk\u002F",2,10,85,30,84,"2026-05-20T03:57:12.500Z",[14,38],{"slug":15,"name":16,"version":17,"author":5,"author_profile":6,"description":18,"short_description":19,"active_installs":8,"downloaded":20,"rating":21,"num_ratings":22,"last_updated":23,"tested_up_to":24,"requires_at_least":25,"requires_php":26,"tags":27,"homepage":33,"download_link":34,"security_score":9,"vuln_count":35,"unpatched_count":35,"last_vuln_date":36,"fetched_at":37},"threatpoint-api","ThreatPoint IP Reputation","2.7","\u003Cp>This plugin protects WordPress Sites from unwanted malicious access attempts by leveraging IP reputation data provided by the ThreatPoint IP reputation service.\u003C\u002Fp>\n\u003Ch3>External Service\u003C\u002Fh3>\n\u003Cp>This plugin allows administrators to protect their WordPress Sites from unwanted access attempts by leveraging IP reputation data provided by the ThreatPoint IP reputation service. This plugin invokes a restAPI call to the ThreatPoint API, consumes the response and acts based on configuration options in the plugin. This allows ip reputation data to be placed in front of pages (wp-admin and custom pages for example) – without interrupting normal access.\u003Cbr \u002F>\nTo communicate with the restAPI an API KEY is required from ThreatPoint.\u003C\u002Fp>\n\u003Cp>The plugin calls the rest API (requires an API KEY) at \u003Ca href=\"https:\u002F\u002Fverify.threatpoint.co.uk\u002Fapi\u002Fv1\u002Fresources\u002F\" rel=\"nofollow ugc\">this ThreatPoint api endpoint\u003C\u002Fa>\u003Cbr \u002F>\nThe rest API is only passed the IP address from the client or X-Forwarded-For address(es) is present.\u003Cbr \u002F>\nThis external service is called during any login attempts to the admin page. The plugin allows any page to be protected by simply entering the slug name on the setting page in the correct field (comma separated). Any custom page can be protected in this manner.\u003Cbr \u002F>\nAn API key is required to utilise the service, although the plugin will operate without one it will not be able to pass the IP or call any data from the API. Your pages are NOT protected without a valid API key.\u003C\u002Fp>\n\u003Ch3>Privacy Policy\u003C\u002Fh3>\n\u003Cp>The privacy policy for the api services is viewable here \u003Ca href=\"https:\u002F\u002Fthreatpoint.co.uk\u002Fprivacy-policy\" rel=\"nofollow ugc\">privacy policy\u003C\u002Fa>\u003Cbr \u002F>\nThis plugin only passes IP information – no other PII is transferred. The IP address is analysed across the aggregated data within the ThreatPoint IP reputation service and a risk score with geo location information is returned to the plugin. Simple rules within the plugin dictate whether traffic should be allowed to continue as normal or be redirected to an information URL of your choice (set by through the plugin settings). The IP address is stored in the IP aggregated data and used as part of the consortium. No other data such as originating website is stored. Only the IP address and geo location information is held, with date, time and risk scores associated with the request.\u003C\u002Fp>\n\u003Ch3>Plugin Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Detects activity and IP reputation from the following sources:\u003C\u002Fli>\n\u003Cli>Tor exit node traffic\u003C\u002Fli>\n\u003Cli>Proxy (paid)\u003C\u002Fli>\n\u003Cli>Proxy (free)\u003C\u002Fli>\n\u003Cli>VPN (paid)\u003C\u002Fli>\n\u003Cli>VPN (free)\u003C\u002Fli>\n\u003Cli>Known Malicious Behaviour (Consortium)\u003C\u002Fli>\n\u003Cli>Brute force detection\u003C\u002Fli>\n\u003Cli>API Documentation is available here: \u003Ca href=\"https:\u002F\u002Fthreatpoint.co.uk\u002Fdocumentation\" rel=\"nofollow ugc\">documentation\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Video is here \u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FMub-Oa24b10?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Special Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Provide risk based decisions through configuration to allow an administrator the correct flow for their site.\u003C\u002Fli>\n\u003Cli>Consortium model of malicious IP’s created from activity seen across the ThreatPoint network\u003C\u002Fli>\n\u003Cli>Detect and block bots, malware, trojans and aggregators as well as malicious human traffic\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Configuration Items\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>API Key – An API key is required to access the IP reputation service as explained above – (info@threatpoint.co.uk)\u003C\u002Fli>\n\u003Cli>Country Blacklist – 2 Character ISO country code csv format. Country codes in this list will cause IP addresses from those countries to issue a redirection. Allows you to block access from countries\u003C\u002Fli>\n\u003Cli>Country Whitelist – 2 Character ISO country code csv format. Country codes in this list will cause only IP addressed from these countries to be allowed. All others will be redirected. Allow all from UK for example.\u003C\u002Fli>\n\u003Cli>Country Blacklist is evaluated first – it makes little sense to have both blacklists and whitelists set although it is a supported option due to demand.\u003C\u002Fli>\n\u003Cli>Redirection URL – The web page you wish traffic to be redirected to – please feel free to use \u003Ca href=\"https:\u002F\u002Fthreatpoint.co.uk\u002Fthreatpoint-ip-failure\" rel=\"nofollow ugc\">Redirection URL\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Reject IP Risk >= – Redirect IP risk scores marked as Consider or High. Allow low risk only if consider is selected. The risk score is created by the IP reputation service based on the source, location, previous use and history across the IP consortium (velocity, reputation, tor, vpn, proxy)\u003C\u002Fli>\n\u003Cli>Pages to protect – a comma separated list of custom pages that you want to use the IP reputation service\u003C\u002Fli>\n\u003Cli>Disable XMLRPC endpoint by adding entry to .htaccess\u003C\u002Fli>\n\u003Cli>Add malicious IP’s directly to .htaccess to protect wp-login from brute force\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Localization\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>English (default) – only language currently supported\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Feedback\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Many thanks for taking the time to look at the plugin\u003C\u002Fli>\n\u003Cli>Drop the ThreatPoint team a line \u003Ca href=\"http:\u002F\u002Ftwitter.com\u002F#!\u002Fthreatuk\" rel=\"nofollow ugc\">@threatuk\u003C\u002Fa> on Twitter\u003C\u002Fli>\n\u003Cli>Email questions or suggestions via (info@threatpoint.co.uk)\u003C\u002Fli>\n\u003Cli>Api key requests via info@threatpoint.co.uk\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Translations\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>English – default, currently the only language supported\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Contributors & Developers\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>The ThreatPoint team are often asked to investigate attacks on web sites and other services. More often than not these attacks begin from IP addresses that should be considered before access is granted. The IP reputation API provides the intelligence to protect such services, simply and effective. The WordPress plugin framework allows this to be easily introduced into WordPress sites as an additional layer of protection.\u003C\u002Fli>\n\u003Cli>This is not a silver bullet, but it is a useful deterrent. Best efforts to redirect IP addresses based on IP reputation are made. The service should be used in conjunction with other layers of detection and with defined authentication and access rules as part of an overall security policy.\u003C\u002Fli>\n\u003Cli>ThreatPoint UK also provide email verification, device reputation, dark web monitoring and password monitoring services as part of the API service layer. Please contact info@threatpoint.co.uk to find out more about these additional services.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Credits\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Many credits go to the fraud and analytics team at ThreatPoint UK and the team behind the API services\u003C\u002Fli>\n\u003Cli>Credits to numerous wordpress tutorials used to understand the plugin creation process. notably this article https:\u002F\u002Fwww.sitepoint.com\u002Freal-world-example-wordpress-plugin-development\u002F\u003C\u002Fli>\n\u003C\u002Ful>\n","This plugin protects WordPress Sites from unwanted malicious access attempts by leveraging IP reputation data provided by the ThreatPoint IP reputatio &hellip;",3061,100,3,"2024-04-23T14:00:00.000Z","6.5.8","3.5.2","5.4",[28,29,30,31,32],"ip","reputation","tor","wp-admin","xmlrpc","https:\u002F\u002Fthreatpoint.co.uk","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fthreatpoint-api.zip",0,null,"2026-04-16T10:56:18.058Z",{"slug":39,"name":40,"version":41,"author":5,"author_profile":6,"description":42,"short_description":43,"active_installs":35,"downloaded":44,"rating":21,"num_ratings":45,"last_updated":46,"tested_up_to":47,"requires_at_least":25,"requires_php":26,"tags":48,"homepage":33,"download_link":54,"security_score":9,"vuln_count":35,"unpatched_count":35,"last_vuln_date":36,"fetched_at":37},"threatpoint-email-validator","ThreatPoint Email Validator","1.4","\u003Cp>This plugin validates email in realtime using live connections and aggregated data, by leveraging the ThreatPoint email verification API service. One use of this is to prevent spam bots inputting content into comments, easily and effectively\u003C\u002Fp>\n\u003Ch3>External Service\u003C\u002Fh3>\n\u003Cp>This plugin allows administrators include email validation using a real time verification service provided by the ThreatPoint email verification API.\u003Cbr \u002F>\nThe Plugin uses existing is_email functionality and passes manually entered email addresses to the restAPI service at ThreatPoint.\u003Cbr \u002F>\nThe response back from the ThreatPoint API provides information related to the email validity(valid email, valid domain, disposable, free, role, risk score). Automatically stop spam bots from entering comments onto your posts by verifying the email address first.\u003C\u002Fp>\n\u003Cp>The plugin calls the rest API (requires an API KEY) at \u003Ca href=\"https:\u002F\u002Fverify.threatpoint.co.uk\u002Fapi\u002Fv1\u002Fresources\u002F\" rel=\"nofollow ugc\">this ThreatPoint api endpoint\u003C\u002Fa>\u003Cbr \u002F>\nThe rest API is only passed the email address from the contact form via the is_email function.\u003Cbr \u002F>\nThis external service is called whenever a form using is_email is used. By default the Contact Form 7 is supported. You can include any form field name (email address field) in the plugin to override the default.\u003Cbr \u002F>\nAn API key is required to utilise the service, although the plugin will operate without one it will not be able to pass the email address or call any data from the API.\u003Cbr \u002F>\nYour email addresses will not be validated without a valid API key.\u003C\u002Fp>\n\u003Ch3>Privacy Policy\u003C\u002Fh3>\n\u003Cp>The privacy policy for the api services is viewable here \u003Ca href=\"https:\u002F\u002Fthreatpoint.co.uk\u002Fprivacy-policy\" rel=\"nofollow ugc\">privacy policy\u003C\u002Fa>\u003Cbr \u002F>\nThis plugin only passes the email address information – no other PII is transferred. The email address is analysed across the aggregated data within the ThreatPoint email verification reputation service and a risk score with email properties (valid, free, role, disposable) to the plugin. Simple rules within the plugin dictate whether the email address is considered valid(set through the plugin settings). The email address is stored in the email address aggregated data and used as part of email address consortium for all customers. No other data such as originating website is stored. Only the email address  is held, with date, time and risk scores associated with the request.\u003C\u002Fp>\n\u003Ch3>Plugin Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Validates email addresses in real time including:\u003C\u002Fli>\n\u003Cli>Valid email\u003C\u002Fli>\n\u003Cli>Valid domain\u003C\u002Fli>\n\u003Cli>Disposable Addresses (One time Use)\u003C\u002Fli>\n\u003Cli>Role\u002FGroup Addresses\u003C\u002Fli>\n\u003Cli>Free Email Addresses\u003C\u002Fli>\n\u003Cli>Breached Email Addresses\u003C\u002Fli>\n\u003Cli>Email Addresses known to be high risk (spam)\u003C\u002Fli>\n\u003Cli>API Documentation is available here: \u003Ca href=\"https:\u002F\u002Fthreatpoint.co.uk\u002Fdocumentation\" rel=\"nofollow ugc\">documentation\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Video is here \u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FYD9CAx4f3FM?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Special Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Provide real time email validation and decisions through configuration to allow an administrator the correct flow for their site.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Configuration Items\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>API Key – An API key is required to access the email address validation service as explained above – (api@threatpoint.co.uk)\u003C\u002Fli>\n\u003Cli>Blacklisted domains – a list of domains that you would not wish to have entered into your forms\u003C\u002Fli>\n\u003Cli>Email Field Name – the field name to pick the email address values from. Defaults to ‘your-email’ which is the contact form 7 default\u003C\u002Fli>\n\u003Cli>Allow Free Email addresses?  – Option to allow or deny free email addresses (gmail, yahoo, hotmail etc.)\u003C\u002Fli>\n\u003Cli>Allow disposable Email addresses? – Option to allow or deny one time use email addresses\u003C\u002Fli>\n\u003Cli>Allows Role\u002FGroup Email Addresses? – Option to allow role and group email addresses (sales@company.com) for example\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Localization\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>English (default) – only language currently supported\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Feedback\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Many thanks for taking the time to look at the plugin\u003C\u002Fli>\n\u003Cli>Drop the ThreatPoint team a line \u003Ca href=\"http:\u002F\u002Ftwitter.com\u002F#!\u002Fthreatuk\" rel=\"nofollow ugc\">@threatuk\u003C\u002Fa> on Twitter\u003C\u002Fli>\n\u003Cli>Email questions or suggestions via (info@threatpoint.co.uk)\u003C\u002Fli>\n\u003Cli>Api key requests via info@threatpoint.co.uk\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Translations\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>English – default, currently the only language supported\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Contributors & Developers\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>The ThreatPoint team are often asked to investigate attacks on web sites and other services. More often than not these attacks begin from IP addresses that should be considered before access is granted.\u003C\u002Fli>\n\u003Cli>ThreatPoint UK provide IP reputation, email verification, device reputation, dark web monitoring and password monitoring services as part of the API service layer. Please contact info@threatpoint.co.uk to find out more about these additional services.\u003C\u002Fli>\n\u003Cli>The ThreatPoint IP Reputation WordPress plugin is also available from the WordPress official site.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Credits\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Many credits go to the fraud and analytics team at ThreatPoint UK and the team behind the API services\u003C\u002Fli>\n\u003Cli>Credits to numerous wordpress tutorials used to understand the plugin creation process. notably this article https:\u002F\u002Fwww.sitepoint.com\u002Freal-world-example-wordpress-plugin-development\u002F\u003C\u002Fli>\n\u003C\u002Ful>\n","This plugin validates email in realtime using live connections and aggregated data, by leveraging the ThreatPoint email verification API service.",1311,1,"2023-10-25T11:19:00.000Z","6.3.8",[49,50,51,52,53],"contact-form","email-checker","email-validation","spambots","stop-spam","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fthreatpoint-email-validator.zip"]