😈
isMalicious
  • 👋Welcome!
  • 📂Getting Started
  • Technical Docs
    • 📂API Reference
      • ✅Check ressource
        • Reputation
        • Vulnerabilities
        • Geolocation
        • Whois
      • 🔎Search resource
      • 📬Submit source
Powered by GitBook
On this page
  • IS IT MALICIOUS?
  • How does it work?
  • Want to jump right in?
  • Want to deep dive?

Welcome!

Welcome to the isMalicious API documentation. This API allows you to check for potential threats, search for malicious domains, and submit new sources of malicious activities.

NextGetting Started

Last updated 5 months ago

IS IT MALICIOUS?

Quickly secure anything by checking if [term] is malicious. It's based on available public malicious addresses lists sources.

How does it work?

Send an HTTPS request to the API endpoint you're interested in with the requested parameters. Get real-time data based on the latest cyber threat data.

Fast API Calls

Effortlessly make API calls and receive responses in a matter of milliseconds.

Real-Time Cyber Threat Data

Gain access to the latest cyber threat data to keep your platform secure.

Free & Secure

Take advantage of a secure platform that ensures your data is protected at all times.

Want to jump right in?

The fastest way is to and import the Postman collection.

Feeling like an eager beaver? Jump in to the quick start docs and get making your first request:

Want to deep dive?

Dive a little deeper and start exploring our API reference to get an idea of everything that's possible with the API:

👋
download
📂Getting Started
📂API Reference