Check Malicious
IPs & DomainsTRY IT FREE 👇
isMalicious is a cybersecurity API that helps protect your web applications from malicious or suspicious actors.
Advanced Features
We've built the most advanced aggregator that gathers all the information about the latest scams and malicious actors identified by an ip address or a domain name.
We check if an IP address or domain is malicious or suspicious. You can use our API or use our website to check IPs and domains.
Protect your assets by watching them and getting notified when something malicious or suspicious related to it. Our aggregator engine is getting updated every day.
Use our API to benefits from our research and detection. This is especially useful if you are a security researcher or a SOC analyst.
Improve risk management and threat detection
isMalicious helps you improve your risk management and threat detection by providing you with the latest malicious IPs and domains in its massive database.
Check IPs & domains instantly
Quickly determine if a specific IP address or domain is suspicious or malicious and get access to immediate threat reports providing crucial intelligence for your security operations.
Search for alternative malicious actors
Use our powerful search endpoint to find potential malicious alternative domains across our entire database using similarity and fuzzy matching techniques.
Asset monitoring and notifications
Receive email alerts and notifications when watched IP addresses and domains are updated, ensuring you stay informed about potential threats.
Real-time updated threat database
Access an extensive, constantly updated database of known malicious actors, phishing attempts, and malware sources.
Seamless API integration
Easily incorporate isMalicious into your existing security infrastructure with our user-friendly API.
Customizable alert system
Set up personalized alerts for specific types of threats or suspicious activities relevant to your business.
Encrypted and secure
Bank-level encryption ensures that your queries and data remain confidential and protected at all times.
Scalable performance
Handle millions of queries per second, ensuring robust protection for businesses of all sizes.
Contribute to the security community
Submit new sources of malicious activities through our community-driven platform to help improve the security of the internet.
Stories from the blog
Harnessing Public Sources for IP and Domain Maliciousness Detection
Learn how public sources like IP sets and blocklists can enhance your cybersecurity defenses by providing actionable insights into IP and domain maliciousness. Discover how to integrate these resources into WAF solutions like Fortinet and Imperva.
Detecting malicious domain names: a guide to safer browsing
Explore the world of domain name maliciousness and learn how to identify, assess, and protect against harmful domains. Discover tools and techniques to safeguard your online presence.
Understanding IP Maliciousness: A new way to protect your network.
Discover how assessing the potential maliciousness of an IP can safeguard your systems against cyber threats. Learn about the indicators, methods, and tools that help identify malicious IPs and take proactive measures.
Understanding phishing and how to stay protected
Phishing is a growing cybersecurity threat that tricks individuals into providing sensitive information. Learn how to identify phishing attempts and implement strategies to stay safe online.
What cyber security professionals are saying about isMalicious
The best way to understand how can we improve our product is to listen to our users.
Frequently asked questions
If you have anything else you want to ask, reach out to us.
What's the data distributed by the API?
Security score, threat reputation, whois, geolocation, certificates, vulnerabilities, identifiers lists, similar suspicious entities...What's the data retention duration limits?
All data are refreshed 1 time a day to ensure data accuracy on a daily basis.API Usage Limits & Restrictions
- Unauthenticated API requests are limited to 1 request per 60 seconds.
- Authenticated requests are limited to 1 per 10 seconds.
- API key requests are limited to 3 per 10 seconds.
Unlock unlimited requests by upgrading to a paid plan by contacting us: contact@ismalicious.comWhy is the API rate limited?
The API is rate limited to prevent abuse. If you need a higher rate limit, please contact us at contact@ismalicious.com
What about the cancel & refund policy?
We do not offer refunds for any of our plans. If you have any issues with our service, please contact us at contact@ismalicious.com and we will do our best to assist you.What integrations are available?
We are currently working on integrations with top cybersecurity companies to provide a seamless experience to our users. Keep an eye on our roadmap to see what's coming next. Currently, we support CORTEX, offer a CLI version of isMalicious for on-premise use, and provide firewall exportable blocklist features.Where is isMalicious based?
isMalicious is a French company based in Europe.
Disclaimer of Responsibility for Usage
isMalicious provides information and cyber threat scores based on aggregated and analyzed public datasets. However, we disclaim any responsibility for decisions made or actions taken based on this information. Users are encouraged to use this data as a supplement to their own security measures and to exercise their own professional judgment to assess risks and make appropriate decisions. isMalicious does not guarantee the complete absence of threats and cannot be held liable for any damages resulting from the use of our service.How do I get support?
If you need support, please contact us at contact@ismalicious.com
This website uses cookies to enhance your browsing experience, analyze site traffic, and serve better user experiences. By continuing to use this site, you consent to our use of cookies. Learn more in our cookie policy