
Accuracy Rate: 99.9%
Detection accuracy in identifying malicious IPs and domains thanks to our advanced aggregation engine.
99.9%
Accuracy Rate
Comprehensive threat intelligence database with 500M+ malicious IPs, domains, phishing sites, malware, adware, and tracking domains. Our real-time cybersecurity blocklist API protects against vulnerabilities and cyber threats instantly.
Our platform delivers actionable intelligence that helps organizations stay ahead of cyber threats








Detection accuracy in identifying malicious IPs and domains thanks to our advanced aggregation engine.
99.9%
Accuracy Rate

Continuous monitoring and database updates to ensure you always have the latest threat intelligence.
24/7
Real-Time Updates

250M IPs, 200M domains, 50M hashes, and more malicious entities across the globe.
500M+
Threat Records

Identify threats faster than traditional methods, reducing response time and potential damage.
80%
Faster Detection
Aggregate data from Shodan, GreyNoise, AbuseIPDB, AlienVault OTX, and 50+ more providers. One query, comprehensive results.
LLM-generated analysis transforms raw enrichment data into actionable intelligence with context-aware threat summaries.
Automatically map IOCs to MITRE ATT&CK techniques based on threat tags and enrichment findings.
Query any IP or domain through our API and get instant results with enrichment from multiple security sources.
We check if an IP address or domain is malicious or suspicious. You can use our API or use our website to check IPs and domains.
Protect your assets by watching them and getting notified when something malicious or suspicious related to it. Our aggregator engine is getting updated every day.
Use our API to benefits from our research and detection. This is especially useful if you are a security researcher or a SOC analyst.
Real-time threat intelligence from 523+ verified industry-leading providers







If you have anything else you want to ask, reach out to us.
500M+ verified malicious IPs, domains, and cyberthreat records from 600+ intelligence sources. Real-time blocklist API designed for modern cybersecurity teams.
45M+ phishing domains and credential harvesting sites. Detect fake login pages, brand impersonation, and social engineering attacks in real-time.
120M+ malware distribution IPs and domains. Block ransomware, trojans, viruses, and zero-day malware before they infect your systems.
100M+ malicious IP addresses involved in DDoS attacks, brute force attempts, botnet C2 servers, and network abuse.
28M+ invasive advertising networks, unwanted software promotions, and aggressive marketing domains that degrade user experience.
67M+ tracking domains, analytics scripts, and surveillance networks. Protect user privacy and comply with GDPR requirements.
Comprehensive vulnerability intelligence including CVEs, exposed services, weak SSL certificates, and security misconfigurations.
Every threat is verified across multiple intelligence sources. Our cross-referencing system eliminates false positives and provides confidence scores for each detection.
Unlike static blocklists updated weekly, our database receives hourly updates. New phishing sites, malware domains, and malicious IPs are added within minutes of discovery.
Beyond simple blocklists, get rich threat intelligence including geolocation, ASN data, WHOIS information, SSL certificates, and historical behavior patterns.
Sub-100ms response times, 99.9% uptime SLA, and unlimited scalability. Our cybersecurity API integrates seamlessly with firewalls, SIEM systems, and custom applications.
Join thousands of security professionals using our threat intelligence database. Free tier available - no credit card required.
Limited FREE API calls • No credit card • Instant access
Enterprise-grade threat intelligence CLI built for maximum performance. Deploy in air-gapped environments, integrate with your CI/CD pipeline, or run automated security checks at scale.
# Update threat intelligence database from 500+ sources
$ ismalicious update
Database update started.
Fetching source 1 of 500 - 00:01.234s
Fetching source 2 of 500 - 00:00.987s
Fetching source 3 of 500 - 00:01.456s
...
Fetching source 500 of 500 - 00:00.823s
Cleaning false positives...
Fetching legitimate domains lists...
Processing legitimate domains...
Loaded 2,000,000 legitimate domains
Starting domain cleanup...
Removed 1,234 legitimate domains
False positives cleaning completed in 00:15.789s
Database update completed in 05:23.456s
# Check if a domain is malicious with full category details
$ ismalicious get malicious-site.ru
Found entry in domains.json: malicious-site.ru
Categories: malware phishing c2 botnet
# Check an IP address
$ ismalicious get 192.168.1.100
Found entry in ips.json: 192.168.1.100
Categories: tor-exit-node proxy
# Deploy in Docker with persistent data volume
$ docker run -v $(pwd)/data:/app/data ismalicious/cli update
Database update started...Run threat intelligence checks completely offline with local JSON databases. No internet dependency once synchronized, perfect for air-gapped environments.
ismalicious get domain.comAutomatically fetches and combines data from 500+ threat intelligence sources. Single command updates your entire local database with the latest threats.
ismalicious updateAdvanced curation using Cloudflare Radar and top-1M domains lists. Removes legitimate domains automatically to ensure zero false positives in your threat database.
Auto-cleans during updateSmart regex-based extraction supporting domains, IPv4, and IPv6 addresses. Handles multiple formats and automatically categorizes entities by threat type.
Supports all IP/domain formatsBuilt for maximum speed and efficiency. Optimized network operations with libcurl, parallel processing, and minimal memory footprint.
Processes millions of entitiesNative binaries for Linux, macOS, and Windows. Docker images available for containerized deployments and seamless CI/CD integration.
docker run ismalicious/cliEach threat is tagged with specific categories like malware, phishing, botnet, C2, and more. Enables precise filtering and threat-specific response workflows.
JSON output with categoriesEnterprise license validation system with online verification. Supports offline grace periods and flexible licensing for team deployments.
Secured with license.txtBuilt-in benchmarking tools with --debug flag. Track fetch times, processing speeds, and database operations for optimization and troubleshooting.
ismalicious --debug updateThe best way to understand how can we improve our product is to listen to our users.
Whether you're an individual security researcher or a large organization, we have a plan that fits your needs.
Get started with basic threat intelligence. Perfect for individuals and small projects.
Ideal for professionals and small businesses requiring more robust protection.
Comprehensive solution for organizations with advanced security needs. Custom limits and maximum protection.
Instead of spear-phishing individuals, APTs infect websites their targets routinely visit. Learn how watering hole campaigns work and how to harden web supply chains and detection.
Cognitive hacking targets the user, not the machine. It manipulates perception and decision-making through disinformation and psychological triggers.
Attackers who control your mobile number can bypass SMS-based 2FA and reset passwords. Learn how SIM swap fraud works and how to reduce reliance on SMS one-time codes.
Malicious ads and manipulated search results push users toward malware and phishing without email. Learn how malvertising and SEO poisoning work and how teams can reduce risk.
Attackers increasingly abuse built-in OS binaries and scripts to avoid dropping traditional malware. Understand LOTL tradecraft and what to log, detect, and hunt for.
The global internet is fracturing into regional, regulated intranets. We explore the rise of the "Splinternet" and its impact on cybersecurity and global business.
Internationalized domain names and look-alike characters let attackers spoof trusted brands in the address bar. Learn how homograph attacks work and how to defend users and SOC teams.
DNS is easy to ignore until it routes your users to malware. Learn how cache poisoning, hijacking, and secure DNS practices fit together.
A playbook nobody has run is fiction. Learn how to build IR phases, roles, and communications that work under pressure—and how to test them.
Steganography hides data within innocent-looking files like images or audio. Learn how hackers use digital steganography to smuggle malware and steal data.
Passwords are still everywhere, but phishing-resistant credentials and tight session controls are the real front line. Here is a practical identity roadmap.
Software bills of materials are not paperwork for compliance alone. Learn how SBOMs reduce third-party risk and speed response when a dependency blows up.
Attackers target backups first. Learn how immutable storage, the 3-2-1 rule, and recovery drills turn ransomware from a business-ending event into a manageable incident.
Traditional antivirus relies on signatures, but polymorphic malware changes its code every time it replicates. Discover how this shapeshifting threat evades detection.
Synthetic identity fraud is the fastest-growing financial crime. Learn how criminals combine real and fake data to create "ghost" identities and how to detect them.
Quantum computers threaten to break the encryption that secures the internet. Discover what Post-Quantum Cryptography (PQC) is and how to prepare for the quantum future.
Insider threats are notoriously difficult to detect because the actor already has legitimate access. Learn how UEBA can help spot the subtle signs of malicious intent.
Botnets are networks of infected devices controlled by cybercriminals. Find out how they work, what they do, and how to check if your IP is involved.
Cloud security is full of acronyms. We break down the difference between CSPM and CWPP and why you likely need both.
APIs are the connective tissue of the modern web, and they are under attack. Explore the unique vulnerabilities of APIs and how to secure them.
Zero Trust is not a product; it is a philosophy. Learn how to move beyond the marketing hype and implement a true "Verify Explicitly" architecture.
Typosquatting relies on your fingers slipping. Learn how attackers register look-alike domains to steal your data and how to check URLs before you click.
Machine Learning is transforming how we classify threats. Discover how AI models can analyze vast amounts of data to categorize attacks instantly.
Bridge the gap between strategic frameworks and tactical defense. Learn how to map real-time threat feeds directly to the MITRE ATT&CK matrix.
Threat intelligence has moved beyond simple blocklists. Explore how AI, context, and real-time integration are shaping the future of cyber defense.
Confused by the Dark Web and Deep Web? We explain the difference and where cyber threats like stolen credentials and malware actually live.
The MITRE ATT&CK framework is the gold standard for understanding adversary behavior. Discover how to map your defenses to specific techniques.
Effective threat classification is the cornerstone of a modern SOC. Learn how to categorize threats to streamline incident response and reduce alert fatigue.
Learn why email reputation matters for security and deliverability, and how to check if an email address is compromised or malicious.
Discover how hackers control infected devices using Command and Control (C2) servers and how to detect these hidden threats.
As space becomes accessible, it becomes a target. From satellite hijacking to ground station jamming, we analyze the unique threats to orbital assets and how threat intelligence secures the new space race.
Once malware establishes a C2 channel, attackers have a persistent foothold in your environment. Understand how C2 infrastructure is built, how beacons evade detection, and how to identify malicious outbound connections using threat intelligence.
As the enterprise Metaverse expands, so does the attack surface. From avatar impersonation to spatial data theft, we explore the new frontier of virtual threats and how IP reputation protects digital assets.
No single organization can monitor every threat alone. Learn how information sharing communities (ISACs), standard protocols like STIX/TAXII, and commercial threat feeds form a collaborative shield against adversaries.
Legitimate users rarely hide behind Tor or anonymous proxies. Discover how attackers exploit anonymization layers to bypass defenses, and how IP intelligence helps you unmask high-risk traffic in real-time.
Billions of breached username/password pairs are actively weaponized every day. Learn how credential stuffing differs from brute force, why it succeeds at scale, and how to stop it using IP reputation and anomaly detection.
Unauthorized drones pose a threat to critical infrastructure, stadiums, and prisons. This post explores Counter-Unmanned Aircraft Systems (C-UAS), detection methods, and how strict "no-fly" zones are enforced electronically.
Enhance your Security Operations Center visibility. A step-by-step guide to aggregating threat data, enriching logs, and building custom security dashboards using modern Threat Intelligence APIs.
Disposable and temporary email addresses are the gateway for fraud, spam, and abuse. Learn how implementing a robust email verification API protects your user base and improves your sender reputation.
Stop relying on static blocklists. Learn how to integrate real-time threat intelligence APIs into your firewalls and application logic to automatically detect and block malicious IP addresses before they strike.
Connected traffic lights, sensors, and water systems create a vast attack surface in modern cities. We examine the vulnerabilities of smart city infrastructure and the cascading failures a cyberattack could cause.
Not all domains are created equal. Discover how real-time domain reputation scoring helps organizations proactively identify and block phishing infrastructure, fake websites, and parked domains used by cybercriminals.
Are fingerprints and facial recognition truly secure? We explore the techniques attackers use to spoof biometric sensors, from 3D-printed faces to synthetic voice cloning.
Operational Technology (OT) environments are under siege. We analyze the latest ICS-specific malware strains targeting PLCs and SCADA systems, and offer defense strategies for critical infrastructure.
Attack surfaces expand vertically as LEO constellations integrate with enterprise networks. This post details orbital jamming, ground station spoofing, and the lack of encryption standards in commercial satellite systems for security engineers.
As quantum supremacy nears, the threat to RSA and ECC encryption becomes existential. This analysis explores Post-Quantum Cryptography (PQC) migration strategies for security teams and the immediate risks of Harvest Now, Decrypt Later (HNDL) attacks.
Often confused, these two security practices serve very different purposes. Discover when to use automated scanning and when to invest in a manual penetration test.
Comparing isMalicious and VirusTotal for threat intelligence. Discover which IP and domain reputation API is right for your security stack — from pricing and features to real-time streaming and monitoring.
When a cyberattack strikes, panic is your enemy. Learn how to create and test an incident response plan to ensure your team knows exactly what to do.
AbuseIPDB is the go-to for IP reputation, but what about domains and URLs? Compare isMalicious and AbuseIPDB across coverage, API features, pricing, and monitoring to find the right threat intelligence tool for your stack.
A beginner's guide to common cyber threats. Understand malware, viruses, and hackers, and learn how to protect yourself online.
Learn how to check if an IP address is malicious. A simple guide for beginners to understand IP reputation and stay safe online.
Identity is the new perimeter. Discover specific best practices for Identity and Access Management (IAM) to prevent unauthorized access and privilege escalation.
Can you tell a malicious domain from a safe one? Learn the key differences and tools to verify website safety instantly.
What is phishing? Learn how to spot fake websites and check domains for threats before you enter your personal information.
Don't click that link yet! Learn how to check URLs for hidden threats and ensure safe browsing on any device.
AlienVault OTX offers a free threat intelligence community, but full value requires the AT&T ecosystem. Compare isMalicious and OTX on API access, integrations, and vendor independence for your security stack.
Connected medical devices (IoMT) introduce life-critical vulnerabilities into hospital networks. From MRI machines to insulin pumps, this guide analyzes the unique challenges of securing legacy firmware and unpatched operating systems.
Shodan maps internet-connected devices. isMalicious checks if IPs and domains are malicious. Compare these complementary threat intelligence tools across features, use cases, and pricing to choose the right one.
AI-generated video and audio are becoming indistinguishable from reality. Explore the rising threat of deepfakes to enterprise security and how to defend against synthetic media attacks.
Peel back the layers of a modern phishing attack. From spoofed domains to SSL certificates, understand the infrastructure attackers use and how to detect it.
Manual analysis cannot keep up with machine-speed attacks. Learn how to automate threat data ingestion and response to block threats in milliseconds, not minutes.
Static IP blacklists are no longer enough. Discover the power of contextual threat intelligence—connecting IPs, domains, and behavior to see the full attack picture.
Newly registered domains (NRDs) are a favorite tool for threat actors. Learn why domain age is a critical signal in your threat intelligence stack and how to use it effectively.
Discover how poor IP reputation impacts more than just security—it affects email deliverability, ad spend, and customer trust. Learn why proactive monitoring is a financial necessity.
A comprehensive comparison of the top threat intelligence APIs in 2026 — isMalicious, VirusTotal, AbuseIPDB, AlienVault OTX, Shodan, and URLhaus. Feature matrices, pricing breakdowns, and recommendations by use case.
Privacy regulations are reshaping cybersecurity strategies. Understand the key requirements of GDPR and CCPA and how to align your security program with privacy compliance.
With cars becoming data centers on wheels, the attack surface expands into the powertrain, infotainment, and OTA update systems. We analyze CAN bus injection vulnerabilities and the security risks of V2X communication protocols.
APIs are the backbone of modern applications but are often left vulnerable. Learn how to secure your APIs against common attacks like broken object level authorization and injection.
Waiting for alerts means waiting for attacks to succeed. Learn how proactive threat hunting helps security teams discover hidden threats, improve defenses, and stay ahead of sophisticated adversaries.
Employees use unauthorized apps and services that IT cannot see. Learn how to discover shadow IT, assess risks from unsanctioned tools, and implement governance without stifling innovation.
Security should not be an afterthought. Learn how to implement DevSecOps to automate security testing and vulnerability scanning within your development workflow.
After initial compromise, attackers move laterally to reach valuable targets. Learn how to detect lateral movement techniques, implement segmentation, and stop attackers before they reach critical assets.
Internet of Things devices are increasingly targeted by cybercriminals. Learn how to identify IoT vulnerabilities, secure smart devices, and protect your network from IoT-based attacks.
Insider threats pose unique challenges to organizational security. Learn how to detect malicious insiders, prevent data leakage, and build an effective insider threat program.
Email spoofing enables phishing and business email compromise attacks. Learn how DMARC, SPF, and DKIM authentication protocols protect your domain from being impersonated in cyberattacks.
Traditional antivirus is no longer enough. Explore why Endpoint Detection and Response (EDR) is essential for modern cybersecurity and how it differs from legacy solutions.
Distributed Denial of Service attacks can cripple your online presence. Learn how to identify DDoS threats, implement effective mitigation strategies, and maintain service availability during attacks.
Data theft can occur through countless channels. Learn how to detect and prevent data exfiltration, implement effective DLP strategies, and protect your organization most valuable assets from leaving your control.
Stolen credentials and sensitive data often surface on the dark web before being exploited. Learn how dark web monitoring helps detect breaches early and protect your organization from cybercriminal activities.
Container environments introduce unique security challenges. Learn how to secure Docker containers, Kubernetes clusters, and cloud-native applications from emerging threats and misconfigurations.
Social engineering has evolved beyond simple phishing emails. Discover the latest tactics used by attackers, including vishing, smishing, and pigmenting, and how to spot them.
Mobile applications are prime targets for cybercriminals. Learn about common mobile security threats and how to protect your iOS and Android apps from reverse engineering and malware.
Infostealers harvest credentials and sensitive data from infected systems, fueling a massive underground economy. Learn how these threats operate, how to detect them, and how to protect your organization from credential theft.
Master the reconnaissance phase of CTFs and bug bounties with these essential OSINT tools. From IP investigation to domain intelligence, build the toolbox that helps you find what others miss.
Small businesses face the same cyber threats as enterprises but with a fraction of the resources. Learn how affordable threat intelligence and smart security strategies can level the playing field.
The Web3 ecosystem faces unique threats from wallet drainers to rug pulls. Learn how to identify malicious crypto domains, detect scams, and protect yourself and your users from blockchain-based fraud.
Cloud environments face unique security challenges from misconfigurations to cryptomining attacks. Learn how to monitor cloud assets, detect threats, and protect your multi-cloud infrastructure with threat intelligence.
Automated bots drive credential stuffing, account takeover, and fraud at massive scale. Learn how IP reputation and threat intelligence can identify and block malicious automation before it compromises your users.
DNS is the first line of defense against malware and phishing. Learn how protective DNS and threat intelligence blocklists can stop threats before they reach your network, with integration guides for Pi-hole, AdGuard, and enterprise DNS.
BEC attacks cost organizations billions annually through sophisticated impersonation and social engineering. Learn how domain spoofing detection and threat intelligence can protect your organization from CEO fraud and invoice scams.
Supply chain attacks have become the weapon of choice for sophisticated threat actors. Learn how to detect compromised vendors, monitor third-party risk, and protect your organization before your suppliers become your vulnerability.
Cybercriminals are weaponizing artificial intelligence to launch sophisticated attacks at unprecedented scale. Learn how AI-powered threats work and how threat intelligence can help you defend against them.
Zero Trust security demands constant verification. Discover how integrating malicious IP and domain reputation checks strengthens your threat intelligence and prevents phishing.
A practical guide on detecting malicious domains and IPs using reputation data. Learn to spot phishing threats and secure your applications with real-time threat intelligence.
Shift from reactive to proactive cybersecurity. Learn how monitoring malicious IP and domain reputation helps identifying threats early and stopping phishing attacks before they succeed.
Learn why monitoring domain and IP reputation is essential for cybersecurity. Discover how to detect malicious threats, prevent phishing attacks, and leverage threat intelligence to protect your infrastructure.
Learn how to detect ransomware threats before they encrypt your data. Explore proven prevention techniques, early warning signs, and how threat intelligence can protect your organization from costly ransomware attacks.
SSL certificates are crucial for secure web communications, but misconfigurations and vulnerabilities can expose your users to serious risks. Learn how to identify, assess, and fix SSL certificate security issues before attackers exploit them.
Zero-day vulnerabilities pose one of the greatest cybersecurity challenges. Learn how to detect exploitation attempts, respond effectively, and leverage threat intelligence to protect your organization from unknown threats.
Learn how to build an effective Security Operations Center (SOC) powered by threat intelligence. Discover essential tools, processes, and best practices for detecting, analyzing, and responding to cyber threats in real-time.
Discover how integrating threat intelligence APIs can transform your security infrastructure. Learn best practices for automated threat detection, real-time monitoring, and seamless integration with your existing systems.
Learn how public sources like IP sets and blocklists can enhance your cybersecurity defenses by providing actionable insights into IP and domain maliciousness. Discover how to integrate these resources into WAF solutions like Fortinet and Imperva.
Explore the world of domain name maliciousness and learn how to identify, assess, and protect against harmful domains. Discover tools and techniques to safeguard your online presence.
Discover how assessing the potential maliciousness of an IP can safeguard your systems against cyber threats. Learn about the indicators, methods, and tools that help identify malicious IPs and take proactive measures.
Phishing is a growing cybersecurity threat that tricks individuals into providing sensitive information. Learn how to identify phishing attempts and implement strategies to stay safe online.