What is the isMalicious API?
Programmatic access to our threat intelligence graph: real-time domain, IP, URL, and hash reputation with enrichment designed for security workflows — not a generic WHOIS wrapper.
One REST surface for lookups, bulk jobs, streaming enrichment, and enterprise workflows — documented, versioned, and ready for your SIEM, SOAR, or product backend.
{ "query": "example.com", "reputation": "suspicious", "score": 0.87 }
Illustrative response — fields vary by plan and target type.
Base64-encode apiKey:apiSecret as X-API-KEY. Same pattern in every SDK.
# X-API-KEY = base64(apiKey:apiSecret)
curl -G "https://api.ismalicious.com/check" \
--data-urlencode "query=example.com" \
--data-urlencode "enrichment=standard" \
-H "X-API-KEY: $(echo -n 'YOUR_API_KEY:YOUR_API_SECRET' | base64)"Deep dives per topic — or jump straight into the canonical reference.
Routes, auth modes, public vs dashboard endpoints, TAXII, bulk, streaming — kept in sync with api.ismalicious.com.
Import into Postman, Insomnia, or codegen pipelines.
Real-time entity checking and risk scoring with instant results.
Read guideHigh-throughput batch processing for checking thousands of entities.
Read guideSSE progressive checks: /check/stream?query= on api.ismalicious.com.
Read guideEvent-driven notifications for alerts and monitoring changes.
Read guideOfficial SDKs for Python, Node.js, Go, and Rust.
Read guideNewInteractive testing environment to try the API without code.
Read guideUnderstanding rate limits and optimizing API usage.
Read guideAPI key management and authentication methods.
Read guideLatest API updates, features, and deprecations.
Read guideClear product boundaries for security teams comparing API-first threat intelligence vendors.
Supporting material for buyers comparing threat intelligence APIs, IP/domain reputation APIs, and enrichment pipelines.
Compare API coverage, limits, freshness, and workflow fit before choosing a vendor.
Read guideHow to evaluate IP risk signals without over-blocking legitimate traffic.
Read guideDomain age, infrastructure patterns, phishing signals, and confidence scoring.
Read guideEnrichment patterns for SOC queues, incident response, and SIEM/SOAR pipelines.
Read guideHow to reason about AWS, Azure, GCP, VPN, proxy, and datacenter IP context.
Read guideDetailed comparisons against VirusTotal, AbuseIPDB, Shodan, AlienVault OTX, and others.
Read guideProgrammatic access to our threat intelligence graph: real-time domain, IP, URL, and hash reputation with enrichment designed for security workflows — not a generic WHOIS wrapper.
Free tier includes 30 requests per month. Create an account, issue keys from the dashboard, and use official SDKs or curl. The playground and OpenAPI spec help you explore without guesswork.
Infrastructure aimed at mission-critical use cases: high availability targets, low-latency responses, and clear rate-limit semantics so you can scale integrations confidently.
Endpoints are documented with examples and field explanations. Paid plans include prioritized support channels; status and incidents are communicated on our public status page.
Patterns for integrating threat intel at scale
30 free requests per month. No card required — upgrade when you outgrow the sandbox.
Create account