📬Submit source
The Submit endpoint allows you to submit new sources of malicious activities to the community.
We need you for a safer world 🌍
Request
POST https://ismalicious.com/api/submit
Query Parameters
sources
array
An array of sources to be submitted. Each source includes:
name
string
The name of the source.
type
string
The type of the source (e.g., ip, domain).
url
string
The URL of the source.
category
string
(Optional) The category of the source (e.g., spam, malware).
Example
Description
The feature enables users to submit new sources of threat intelligence to the existing sources API database. These submissions will undergo a moderation and validation process before being fully integrated into the system. This ensures that only credible and useful sources are added, enhancing the quality and reliability of the threat intelligence provided.
Why is this useful?
Crowdsourced Intelligence: Leverages the knowledge of the community to improve threat detection capabilities.
Enhanced Coverage: Expands the breadth of monitored sources, leading to more comprehensive threat intelligence.
Quality Control: Ensures that only validated and reliable sources are included, maintaining the integrity of the data.
Last updated