What is the isMalicious API?
Programmatic access to our threat intelligence graph: real-time domain, IP, URL, and hash reputation with enrichment designed for security workflows — not a generic WHOIS wrapper.
One REST surface for lookups, bulk jobs, streaming enrichment, and enterprise workflows — documented, versioned, and ready for your SIEM, SOAR, or product backend.
{ "query": "example.com", "reputation": "suspicious", "score": 0.87 }
Illustrative response — fields vary by plan and target type.
Base64-encode apiKey:apiSecret as X-API-KEY. Same pattern in every SDK.
# X-API-KEY = base64(apiKey:apiSecret)
curl -G "https://api.ismalicious.com/check" \
--data-urlencode "query=example.com" \
--data-urlencode "enrichment=standard" \
-H "X-API-KEY: $(echo -n 'YOUR_API_KEY:YOUR_API_SECRET' | base64)"Deep dives per topic — or jump straight into the canonical reference.
Routes, auth modes, public vs dashboard endpoints, TAXII, bulk, streaming — kept in sync with api.ismalicious.com.
Import into Postman, Insomnia, or codegen pipelines.
Real-time entity checking and risk scoring with instant results.
Read guideHigh-throughput batch processing for checking thousands of entities.
Read guideSSE progressive checks: /check/stream?query= on api.ismalicious.com.
Read guideEvent-driven notifications for alerts and monitoring changes.
Read guideOfficial SDKs for Python, Node.js, Go, and Rust.
Read guideNewInteractive testing environment to try the API without code.
Read guideUnderstanding rate limits and optimizing API usage.
Read guideAPI key management and authentication methods.
Read guideLatest API updates, features, and deprecations.
Read guideProgrammatic access to our threat intelligence graph: real-time domain, IP, URL, and hash reputation with enrichment designed for security workflows — not a generic WHOIS wrapper.
Free tier includes 1,000 requests per month. Create an account, issue keys from the dashboard, and use official SDKs or curl. The playground and OpenAPI spec help you explore without guesswork.
Infrastructure aimed at mission-critical use cases: high availability targets, low-latency responses, and clear rate-limit semantics so you can scale integrations confidently.
Endpoints are documented with examples and field explanations. Paid plans include prioritized support channels; status and incidents are communicated on our public status page.
Patterns for integrating threat intel at scale
1,000 free requests per month. No card required — upgrade when you outgrow the sandbox.
Create account