URLAbuse — Cyber Threat Feeds

The Community
That Watches
the Internet.

URLAbuse is a community-based URL intelligence platform built to identify, verify, and share malicious URLs — phishing, malware, hacked websites, and online scams — in real time. Free, open, and actionable.

📡  URLAbuse Live Feed
LIVE
0 Malicious URLs detected
0 Abuse categories covered
0 Public access to feed
0 Continuous monitoring
About URLAbuse

URL Intelligence.
Built for Action.

URLAbuse is not just a blacklist. Every entry in the feed comes with evidence — a screenshot, metadata, IP and ASN data, registrar information, and abuse type classification. Enough to act, not just to know.


The platform collects URLs through honeypots, automated scanners, and community submissions. Each submission is verified before publication. Everything is free and publicly accessible — no account required to consume the feed.


Learn More →
🔍

Verified Intelligence

Every URL in the feed has been analyzed and confirmed malicious. Each entry includes a screenshot and full metadata — not just a raw URL.

🌍

Community-Powered

Trusted reporters — organizations, researchers, and automated systems — contribute URLs that are analyzed and published for everyone.

Real-Time Feed

New threats are added as they're identified — giving defenders the freshest intelligence without waiting for batch updates.

🔓

Free & Open

The public feed is available to anyone — no registration, no API key, no fee. Commercial access to deeper data available on request.

📋

Actionable Evidence

IP address, ASN, registrar, screenshot, abuse type, and target — everything needed to act, investigate, or escalate.

🔗

Ecosystem Integration

URLAbuse feeds directly into Karen IT's Domain Blocklist (DBL), used by Quad9. Confirmed threats flow automatically into the broader intelligence ecosystem.

Abuse Categories

Five Types of Threat.
One Feed.

URLAbuse covers the full range of URL-based abuse. Every entry is classified into one of five categories — enabling precise filtering for your specific use case.

🎣

Phishing

Pages designed to steal credentials, payment data, or personal information — impersonating banks, payment providers, government services, and technology platforms. Includes geofenced campaigns targeting specific countries.

🦠

Malware

URLs serving malware payloads — drive-by downloads, exploit kits, payload staging servers, and malspam landing pages distributing malicious files or scripts.

🔓

Hacked Websites

Legitimate websites that have been compromised and are being used to serve malicious content — redirect chains, hidden malware downloads, or injected phishing pages.

🎰

Illegal Gambling (Bet)

Unlicensed or illegal gambling platforms operating without regulatory approval — frequently used as fronts for fraud or operating in jurisdictions where online gambling is prohibited.

💸

Scam

Fraudulent websites operating fake online shops, advance-fee schemes, investment fraud, and other deceptive operations designed to defraud users through false promises or fake goods.

How It Works

From Submission
to Feed — Verified.

Every URL goes through the same process before it reaches the public feed. No unverified data, no false positives published without review.

01

Submission

URLs submitted via honeypots, automated scanners, community reporters, or API-connected partners with trusted tokens.

02

Analysis

The URL is fetched and analyzed. A screenshot is taken. IP, ASN, registrar, and abuse type are recorded. Target identified.

03

Verification

Standard submissions are manually verified by the URLAbuse team. Trusted reporter submissions may be published directly.

04

Publication

Verified entries published to the public feed with full evidence — available immediately via web, API, and downstream feeds.

05

Distribution

Confirmed threats shared with registries, registrars, and hosting providers. Flow automatically into the Karen IT DBL used by Quad9.

API Documentation

Integrate URLAbuse
Into Your Workflow.

Three API endpoints — two for trusted reporters, one internal. All return JSON. An API token is required for submission endpoints.

POST https://zapi.urlabuse.com/feed/report_url

Report a URL for manual verification by the URLAbuse team before publication. Available to trusted third-party reporters.

#ParameterRequiredDescription
1tokenYesYour API token — contact URLAbuse to request
2urlYesThe malicious or suspicious URL to report
3date_typeYesOne of: phishing malware hacked bet scam
4targetOptionalTarget of the attack (e.g. brand name, #pe32 for PE executables)
5geofencedOptionalTwo-letter country code if the URL is geofenced (e.g. US)
6reporterOptionalYour name or organization (max 30 characters)
Python
import requests, json, sys reported_url = 'https://example-phishing.xyz/login' api_url = "https://zapi.urlabuse.com/feed/report_url" params = { "token": "YOUR-TOKEN-HERE", "url": reported_url, "data_type": "phishing", "target": "PayPal", "geofenced": "US", "reporter": "YourOrg" } r = requests.get(api_url, params=params, timeout=10) result = json.loads(r.text) # {"success": true, "code": 200, "msg": "Reported successfully"} print(result)
POST https://urlabuse.com/get_trusted_report

Submit without manual verification — data published directly. Only available to highly trusted parties. Supports screenshot submission.

#ParameterRequiredDescription
1tokenYesYour trusted reporter token
2urlYesThe malicious URL to report
3rtypeYesOne of: phishing malware hacked bet scam
4targetOptionalTarget brand or platform
5screenshotOptionalBase64-encoded JPG screenshot
6reporterOptionalYour organization name (max 30 chars)
7is_publicOptional1 = public (default), 0 = private
Python
import requests, json, base64 api_url = "https://urlabuse.com/get_trusted_report" screenshot = base64.b64encode(open("/tmp/screenshot.jpg", "rb").read()) params = { "token": "YOUR-TOKEN-HERE", "url": "https://malicious-site.xyz/payload", "rtype": "phishing", "target": "AT&T", "screenshot": screenshot, "reporter": "YourOrg", "is_public": 1 } r = requests.post(api_url, data=params, timeout=10) # {"success": true} print(json.loads(r.text))
POST https://urlabuse.com/get_report_from_cti_data

Internal API for administrators. Ingests verified data directly from Karen IT's internal CTI infrastructure.

#ParameterRequiredDescription
1tokenAdmin onlyAdministrator token
2cti_urlYesPermanent URL from the internal CTI system
3rtypeYesOne of: phishing malware hacked bet scam
4targetOptionalTarget of the threat
5is_publicOptional1 = public (default), 0 = private

This endpoint is available to administrators only. Contact us for integration documentation.

Need an API Token?

Tokens are issued to trusted reporters — organizations, researchers, and automated systems with a legitimate security use case.

Request a Token →
Who Uses URLAbuse

Built for Everyone
Who Defends the Internet.

URLAbuse serves a wide range of organizations and individuals — from individual researchers to DNS resolvers handling billions of queries a day.

🔬

Security Researchers

Access verified phishing and malware URLs with full evidence for research, threat tracking, and campaign analysis. Contribute your own findings to the community.

🏢

Security Teams & SOCs

Consume the live feed or API to enrich SIEM alerts, update blocklists, and validate reported URLs against a community-verified source.

🌐

DNS Resolvers

URLAbuse data feeds the Karen IT Domain Blocklist (DBL), used by Quad9 to protect millions of DNS queries every day. The same intelligence, at scale.

📋

Registrars & Registries

Identify malicious domains registered through your platform and support takedown decisions with documented, verified evidence.

🏦

Banks & Payment Providers

Monitor for phishing campaigns targeting your brand. URLAbuse tracks phishing by target — including financial institutions — in real time.

🛡️

CERTs & Abuse Teams

Receive structured abuse reports for domains and hosting infrastructure in your constituency. URLAbuse distributes verified reports directly to responsible parties.

The Threats Are Real-Time.
So Is the Intelligence.

URLAbuse is free, open, and continuously updated. If you see something malicious on the internet — report it. If you want to integrate the feed into your security stack — the API is waiting.