Detect typosquatting domain names right when they are registered. Our typosquatting domain intelligence covers copycats, misspellings, and other suspicious domain variants that could serve to impersonate big brands or abuse their trademarks. Our feed is structured to flag new lookalike domains on the day after they appear on the DNS and where similarity could be deceptive.
Access lists of disposable domains provided by more than 2,000+ temporary email services. Disposable email addresses may figure in abusive registrations and spam or phishing communications.
Know all confirmed phishing[1] URLs to better prevent credential and identify theft. Armed with that know-how, you can keep employees and all network users safe from accessing sites and pages that can put them and your company in harm’s way.
[1] Phishing is a cybercrime technique where an attacker uses digital means of communication, such as emails or social media posts, to fool victims into revealing sensitive or confidential credentials.
Check the reputation and risks associated with any domain or IP address. Our reputation data feed covers 120+ parameters that include host and server responses, configurations, and other potential issues; notable domain registration events; Secure Sockets Layer (SSL) certificate validity and possible vulnerabilities; malware database checks; and more.
Get a list of website URLs that are known hosts of malicious files or redirect to dangerous pages. Some of them may even be rigged to drop harmful executable files on visitors’ systems.
Botnets gather user data and distribute commands through common-and-control (C&C) servers. Obtaining a list of all known C&C URLs is one way to prevent unauthorized network access from remote users.
We provide URLs that may be part of an ongoing distributed denial-of-service (DDoS) attack[2] as well as their botnet controller locations and decoded commands used for attacks.
[2] A DDoS attack utilizes a massive flow of non-human/bot traffic generated to disrupt a web server's normal operations until it crashes. DDoS attacks lead to business downtime and revenue loss.
Taking a more proactive stance on preventing crime, theft, and fraud is possible with robust threat intelligence sources. Contact us if you are interested to apply for early access to Threat Intelligence Data Feeds.
Our threat data is available in the form of a series of enterprise-grade APIs designed for scalability and cover domain infrastructure analysis, SSL certificate chains and configuration, domain malware check, and more.
Enhance your domain research toolkit by our enterprise-grade web-based solution that helps you in searching...
Learn moreAssess the domain's or IP addresses reputation and risk profile with a simple score based on a comprehensive...
Learn moreGet well-parsed and normalized WHOIS information for any domain name, IP address or email.
Learn moreFind out the exact physical location of any IP address, email or domain name.
Learn moreMonitor exact matches, variations and common misspellings of your brand name & trademarks.
Learn moreWe provide complete and relevant domain WHOIS data which can be customized and easily integrated as per your business needs.
Learn moreEasily detect all typosquatting domain names as soon as they are registered each day.
Learn moreFind out which domains were added or dropped by registrants, with given search criteria.
Learn moreFind domains and subdomains related by specific terms in their hostnames.
Learn moreGet insights for the new business registered on the web.
Learn moreGet a complete daily list of all the registered domains and zone files.
Learn moreGet the most relevant data to be ahead of emerging security threats.
Learn moreGet data feeds of new registered domains along with their WHOIS data generated in real time.
Learn moreWe are here to listen. For a quick response, please select your request type or check our Contact us page for more information. By submitting a request, you agree to our Terms of Service and Privacy Policy.