Production-ready detection rules, step-by-step integration guides, and incident response playbooks—many wired to the public REST API at https://api.ismalicious.com.
Guides reference the same contract as our OpenAPI documentation. Try live calls in the API Playground, or read Bulk API and blocklist data product pages for context.
https://api.ismalicious.com/checkFull threat analysis (query + optional enrichment level)
https://api.ismalicious.com/check/reputationAggregated reputation counts (lighter than full /check)
https://api.ismalicious.com/bulk/checkPlan limits and usage for batch lookups
https://api.ismalicious.com/bulk/checkBatch domains, IPs, and URLs in one JSON request
https://api.ismalicious.com/blocklist/statsEntry counts and last-updated times (no auth)
https://api.ismalicious.com/blocklist/download/blocklist-ips-critical.txtPlain-text blocklists (plan-gated full vs sample)

A clear decision tree for API calls: faster reputation polling for high-volume paths, full /check for triage, and narrow endpoints for geo or WHOIS-only questions.

A scheduled job that downloads the correct blocklist file for your plan, detects changes, and feeds only deltas into downstream controls—aligned with the public HTTP API.

A repeatable batch pipeline that classifies hundreds of IOCs per run with per-entity malicious flags, confidence, source counts, and categories—without hammering single-entity endpoints.

An automated daily scan that detects typosquatting domains targeting your brand, with live reputation checking and alerting when a suspicious domain becomes active.

A cron-driven pipeline that automatically blocks malicious IPs at the network edge, updated every 6 hours from live threat intelligence.

Every SIEM alert automatically enriched with threat reputation, category, and confidence score — cutting triage time by up to 60%.

A set of production-ready YARA rules that detect Cobalt Strike, Sliver, and Metasploit C2 beacons, integrated into your SIEM pipeline.
Quick answers about playbooks and the isMalicious API.
Step-by-step guides for security teams: detection rules (YARA, SIEM), incident response workflows, and integrations that call the public threat intelligence API at https://api.ismalicious.com. Each playbook includes copy-paste examples you can adapt.
Use the X-API-KEY header with a Base64-encoded string of your apiKey:apiSecret from the dashboard (Account → API). The same pattern is used across /check, /bulk/check, and blocklist downloads.
Interactive documentation and OpenAPI are at ismalicious.com/api-docs. You can also try requests in the API Playground at ismalicious.com/api/playground.
No. The dashboard and one-off reports are for analysts; playbooks show how to automate the same intelligence in your SIEM, firewalls, or scripts using the REST API.
Guides reference documented endpoints such as GET /check, GET /check/reputation, POST /bulk/check, GET /blocklist/stats, and GET /blocklist/download/{filename}. Exact URLs and parameters match the OpenAPI spec.
Yes. API access and monthly quotas depend on your subscription; the OpenAPI description summarizes burst and monthly limits. Use GET https://api.ismalicious.com/bulk/check to read your current bulk batch limits.
We publish new detection playbooks regularly. Subscribe to stay ahead.