An extensive and current repository of malicious domains, IPs & URLs curated by domain industry veterans. Flexible access methods + APIs, filters or logic to accommodate your use case.
The size of the repository differs from day to day, but contains over 2 million active abuse reports and over 14 million historical reports.
Our repository only contains reports from curated sources and currently contains eight main categories including phishing, malware, botnets, spam, and scams.
The abuse feed is constantly maintained and watched to detect anomalies and ward off data pollution by a dedicated team of domain industry veterans.
Current reports for Domain Names, URLs, and IPs that are posing a threat now!
Abuse Reports
Unique Domains
TLDs
Historical reports that have been resolved, but can be used for forensics and research.
Abuse Reports
Unique Domains
TLDs
The iQ Abuse Feed contains reports for the following categories.
Fraudulent attempt to obtain sensitive information
Distribution of software intended to damage systems or networks
Networks of devices used to carry out scams and cyberattacks
Fraudulent or deceptive act or operation, fake webshops
Unsolicited emails sent to multiple recipients
Sites that have been compromised by hackers
Signs of suspicious traits detected
The iQ Abuse Feed can be accessed in several different ways. We can also easily customize APIs, Filters or Logic to accommodate your use case.
Flexible access plans to address small or large scale needs
API Direct Scan | Hash Database | Full Feed Access | |
---|---|---|---|
Lookup single IP, URL or Domains (for low volumes) | Local database for matching, Lookup API for Full Details. | Access to the full iQ Abuse Repository | |
API Access | |||
Current and Historical Reports | |||
Local Lookups | Partial | ||
Full Feed Access | |||
Pricing | Per API Call | Per API Call | Fixed Fee |
Find Out More! | Request Quote! | Contact us! |
The iQ Abuse Feed is curated and maintained by iQ Global AS. We are a global team of domain industry veterans that provide trusted cybersecurity, business intelligence, and consulting services.
Learn More
Contact us at [email protected] and let's discuss how we can work together.