Unified ThreatIntelligence

Comprehensive threat intelligence database with 500M+ malicious IPs, domains, phishing sites, malware, adware, and tracking domains. Our real-time cybersecurity blocklist API protects against vulnerabilities and cyber threats instantly.

User
User
User
+81,040 generated reports by security analysts
206.168.34.44HIGH RISKLast detected: 2h ago
MAPPED TO T1071, T1566, T1583
Tactics: C&C, Initial Access, Resource Development
VirusTotal • Shodan • GreyNoise • + more
AI SUMMARY
"Known C2 infrastructure linked to Emotet campaigns. Active phishing operations detected across 23 domains. High confidence based on 12 threat intelligence sources."
Generated from 12 enrichment sources
REPUTATION ANALYSIS
42 malicious • 8 suspicious • 3 harmless
79% threat detection
Sources: VirusTotal, Shodan, GreyNoise +5
THREAT INDICATORS
• 12 CVEs detected
• Moscow, Russia 🇷🇺
• SSL expired 45 days ago
• Active in last 6 hours

Trusted by leading organizations

Our platform delivers actionable intelligence that helps organizations stay ahead of cyber threats

HKCERT
Houston University
ICS
Kimoshiro
National Grid
Tehtris
Xfinit

99.9%

Accuracy Rate

Detection accuracy in identifying malicious IPs and domains thanks to our advanced aggregation engine.

24/7

Real-Time Updates

Continuous monitoring and database updates to ensure you always have the latest threat intelligence.

500M+

Threat Records

250M IPs, 200M domains, 50M hashes, and more malicious entities across the globe.

80%

Faster Detection

Identify threats faster than traditional methods, reducing response time and potential damage.

Multi-Source Aggregation

Aggregate data from VirusTotal, Shodan, GreyNoise, AbuseIPDB, AlienVault, and more. One query, eight sources, comprehensive results.

AI-Powered Summaries

LLM-generated analysis transforms raw enrichment data into actionable intelligence with context-aware threat summaries.

MITRE ATT&CK Mapping

Automatically map IOCs to MITRE ATT&CK techniques based on threat tags and enrichment findings.

See How It Works

Query any IP or domain through our API and get instant results with enrichment from multiple security sources.

We check if an IP address or domain is malicious or suspicious. You can use our API or use our website to check IPs and domains.

Protect your assets by watching them and getting notified when something malicious or suspicious related to it. Our aggregator engine is getting updated every day.

Use our API to benefits from our research and detection. This is especially useful if you are a security researcher or a SOC analyst.

Integrated Sources

Real-time threat intelligence from 517+ verified industry-leading providers

VirusTotal

Active

Shodan

Active

GreyNoise

Active

AbuseIPDB

Active

AlienVault OTX

Active

IsMalicious

Active

Triage

Coming Soon

URLhaus

Active

Advanced Features for Security Teams

Built for security professionals who need detailed insights and seamless integration.

  • Instant Threat Detection

    Get real-time threat assessment in milliseconds. Query any IP or domain and receive comprehensive security intelligence including reputation scores, geolocation, and threat history instantly.

  • Advanced Similarity Search

    Discover related threats with fuzzy matching and similarity algorithms. Find malicious domains that mimic legitimate ones or identify coordinated attack patterns.

  • API-First Architecture

    RESTful API designed for developers. Comprehensive documentation, code examples in multiple languages, and straightforward integration with any tech stack.

  • Proactive Monitoring & Alerts

    Monitor your critical assets 24/7. Receive instant email notifications when watched IPs or domains show suspicious activity or threat status changes.

  • Comprehensive Threat Profiles

    Access detailed intelligence including WHOIS data, SSL certificates, vulnerabilities, ASN information, abuse contacts, and historical threat patterns for informed decision-making.

No credit card required · 14-day free trial · Cancel anytime

Frequently asked questions

If you have anything else you want to ask, reach out to us.

    • What's the data distributed by the API?

      Security score, threat reputation, whois, geolocation, certificates, vulnerabilities, identifiers lists, similar suspicious entities...
    • What's the data retention duration limits?

      All data are refreshed 1 time a day to ensure data accuracy on a daily basis.
    • API Usage Limits & Restrictions

      - Anonymous: 1 request per minute (100/month)
      - Free Account: 5 requests per minute (100/month)
      - Basic (API Key): 60 requests per minute (100/month)
      - Pro Plan: 60 requests per minute (10,000/month)
      - Enterprise: 100 requests per minute (1,000,000/month)

      Need higher limits? Contact us for custom plans: contact@ismalicious.com
    • Why is the API rate limited?

      The API is rate limited to prevent abuse. If you need a higher rate limit, please contact us at contact@ismalicious.com
    • What about the cancel & refund policy?

      We do not offer refunds for any of our plans. If you have any issues with our service, please contact us at contact@ismalicious.com and we will do our best to assist you.
    • What integrations are available?

      We are currently working on integrations with top cybersecurity companies to provide a seamless experience to our users. Keep an eye on our roadmap to see what's coming next. Currently, we support CORTEX, offer a CLI version of isMalicious for on-premise use, and provide firewall exportable blocklist features.
    • Where is isMalicious based?

      isMalicious is a French company based in Europe.
    • Disclaimer of Responsibility for Usage

      isMalicious provides information and cyber threat scores based on aggregated and analyzed public datasets. However, we disclaim any responsibility for decisions made or actions taken based on this information. Users are encouraged to use this data as a supplement to their own security measures and to exercise their own professional judgment to assess risks and make appropriate decisions. isMalicious does not guarantee the complete absence of threats and cannot be held liable for any damages resulting from the use of our service.
    • How do I get support?

      If you need support, please contact us at contact@ismalicious.com

The Most Comprehensive Threat Intelligence Database

500M+ verified malicious IPs, domains, and cyberthreat records from 600+ intelligence sources. Real-time blocklist API designed for modern cybersecurity teams.

Why Our Threat Intelligence Database Stands Out

Multi-Source Validation

Every threat is verified across multiple intelligence sources. Our cross-referencing system eliminates false positives and provides confidence scores for each detection.

Real-Time Blocklist Updates

Unlike static blocklists updated weekly, our database receives hourly updates. New phishing sites, malware domains, and malicious IPs are added within minutes of discovery.

Comprehensive Threat Context

Beyond simple blocklists, get rich threat intelligence including geolocation, ASN data, WHOIS information, SSL certificates, and historical behavior patterns.

Enterprise-Ready API

Sub-100ms response times, 99.9% uptime SLA, and unlimited scalability. Our cybersecurity API integrates seamlessly with firewalls, SIEM systems, and custom applications.

Start Protecting Your Infrastructure Today

Join thousands of security professionals using our threat intelligence database. Free tier available - no credit card required.

Limited FREE API calls • No credit card • Instant access

On-Premise CLI Solution

Enterprise-grade threat intelligence CLI built for maximum performance. Deploy in air-gapped environments, integrate with your CI/CD pipeline, or run automated security checks at scale.

terminal
# Update threat intelligence database from 500+ sources
$ ismalicious update
Database update started.
Fetching source 1 of 500 - 00:01.234s
Fetching source 2 of 500 - 00:00.987s
Fetching source 3 of 500 - 00:01.456s
...
Fetching source 500 of 500 - 00:00.823s
Cleaning false positives...
Fetching legitimate domains lists...
Processing legitimate domains...
Loaded 2,000,000 legitimate domains
Starting domain cleanup...
Removed 1,234 legitimate domains
False positives cleaning completed in 00:15.789s
Database update completed in 05:23.456s

# Check if a domain is malicious with full category details
$ ismalicious get malicious-site.ru
Found entry in domains.json: malicious-site.ru
Categories: malware phishing c2 botnet

# Check an IP address
$ ismalicious get 192.168.1.100
Found entry in ips.json: 192.168.1.100
Categories: tor-exit-node proxy

# Deploy in Docker with persistent data volume
$ docker run -v $(pwd)/data:/app/data ismalicious/cli update
Database update started...
  • Offline Database Operations

    Run threat intelligence checks completely offline with local JSON databases. No internet dependency once synchronized, perfect for air-gapped environments.

    ismalicious get domain.com
  • Multi-Source Aggregation

    Automatically fetches and combines data from 500+ threat intelligence sources. Single command updates your entire local database with the latest threats.

    ismalicious update
  • False Positive Filtering

    Advanced curation using Cloudflare Radar and top-1M domains lists. Removes legitimate domains automatically to ensure zero false positives in your threat database.

    Auto-cleans during update
  • Entity Extraction Engine

    Smart regex-based extraction supporting domains, IPv4, and IPv6 addresses. Handles multiple formats and automatically categorizes entities by threat type.

    Supports all IP/domain formats
  • High-Performance

    Built for maximum speed and efficiency. Optimized network operations with libcurl, parallel processing, and minimal memory footprint.

    Processes millions of entities
  • Cross-Platform Support

    Native binaries for Linux, macOS, and Windows. Docker images available for containerized deployments and seamless CI/CD integration.

    docker run ismalicious/cli
  • Category Classification

    Each threat is tagged with specific categories like malware, phishing, botnet, C2, and more. Enables precise filtering and threat-specific response workflows.

    JSON output with categories
  • License-Based Access

    Enterprise license validation system with online verification. Supports offline grace periods and flexible licensing for team deployments.

    Secured with license.txt
  • Debug & Performance Monitoring

    Built-in benchmarking tools with --debug flag. Track fetch times, processing speeds, and database operations for optimization and troubleshooting.

    ismalicious --debug update

Seamless Integration with Your Security Stack

isMalicious integrates effortlessly with leading firewalls, CDNs, and cloud platforms

Palo Alto

Firewall

Fortinet

Firewall

Cisco

Network Security

Check Point

Firewall

Cloudflare

CDN

AWS

Cloud

Azure

Cloud

Google Cloud

Cloud

Need a custom integration? Contact our team

This website uses cookies to enhance your browsing experience, analyze site traffic, and serve better user experiences. By continuing to use this site, you consent to our use of cookies. Learn more in our cookie policy