End free trial abuse for good
Bad actors create dozens of accounts to use your product for free forever. VerifyWall detects the signals that link these fake signups.
The problem
Free trial abuse is one of the most common fraud patterns in SaaS. A single user creates multiple accounts using disposable emails, each time getting a fresh trial period. They might use VPNs to appear as different users or create accounts from datacenter IPs using automation scripts. The result: your trial conversion metrics are artificially depressed, your infrastructure costs rise, and legitimate trial users compete for resources with serial abusers.
The cost to your business
Trial abuse directly undermines your unit economics. Each fake trial account costs you in compute, storage, and support resources without any conversion potential. Worse, it pollutes your analytics — trial-to-paid conversion rates drop, making it harder to justify trial programs to stakeholders. Companies with generous trials often find that 20-40% of trial signups come from repeat abusers, representing thousands of dollars in wasted infrastructure costs monthly.
How VerifyWall solves it
VerifyWall identifies the hallmarks of trial abuse at signup. Disposable email detection catches throwaway addresses used for one-time trials. VPN and Tor detection reveals users masking their identity to appear as new customers. Datacenter IP detection flags automated signup scripts. By combining these signals into a risk score, you can enforce stricter verification for suspicious signups while keeping the trial experience frictionless for genuine prospects.
Detection signals that apply
Disposable Email
The primary tool for trial abuse — a new throwaway email for each signup
Free Email Provider
Serial abusers create multiple Gmail/Yahoo accounts for repeated trials
VPN / Tor
Used to bypass IP-based duplicate detection between trial accounts
Datacenter IP
Automated trial signup scripts running from cloud servers
Integration example
Add VerifyWall to your prevent trial abuse workflow with a single API call:
// During trial signup
$response = Http::withToken($apiKey)
->post('https://api.verifywall.com/v1/verify', [
'email' => $request->email,
'ip' => $request->ip(),
]);
$risk = $response->json('data.attributes');
if ($risk['risk_level'] === 'high') {
// Block trial or require phone verification
return back()->withErrors([
'email' => 'Please use a business email to start your trial.',
]);
}
// Grant trial access
$user->startTrial(days: 14);Frequently asked questions
How does VerifyWall detect repeat trial signups?
VerifyWall detects the signals that trial abusers rely on: disposable emails, VPNs for IP masking, and datacenter IPs for automation. While we don't track individual users across accounts, detecting these signals catches the vast majority of abuse patterns.
Will blocking disposable emails stop all trial abuse?
Blocking disposable emails eliminates the easiest abuse vector. Determined abusers may use free email providers like Gmail, which is why VerifyWall combines multiple signals. A Gmail signup from a VPN with a datacenter IP is much more suspicious than a Gmail signup from a residential connection.
Should I require business emails for all trial signups?
Not necessarily. Many legitimate individual users have free email addresses. VerifyWall helps you make nuanced decisions — you might allow free email trials but require business emails when other risk signals are present, or offer a shorter trial to higher-risk signups.
Related resources
Detection Methods
Integration Guides
Ready to prevent trial abuse?
Start protecting your platform in minutes with a single API call.