Updating every 15 minutes

All the threat data.
One search.

We pull IOCs from 26 public feeds, deduplicate them, and give you a fast search and an API. Currently tracking 556,910 indicators.

live-feed
live
0
IOCs tracked
26
Data sources
7
IOC types
15min
Update interval

What you can do with it

Search, filter, export. Use the dashboard or the API.

📡

Aggregated feeds

Pulls from abuse.ch, AlienVault OTX, Spamhaus, Emerging Threats, Ransomware.live, PhishTank, and others. New data comes in every 15 minutes.

🔍

Search and filter

Look up any IP, domain, hash, or URL. Filter by type, threat category, confidence, or source.

JSON API

Token-based REST API for lookups, bulk searches, and data export. JSON responses, standard HTTP.

💀

Ransomware tracking

Victim domains, leak site URLs, group infrastructure. Data from Ransomware.live and Ransomwatch, updated automatically.

📊

Dashboard

See what's coming in. IOC distribution by type and threat category, active ransomware groups, today's new indicators.

📦

Export everything

Export as JSON, CSV, or plain text. Filter by any field. Your data is never locked in.

Where the data comes from

All public feeds. We normalize the formats, deduplicate across sources, and keep everything searchable in one place.

abuse.ch

Feodotracker, URLhaus, ThreatFox, MalwareBazaar

AlienVault OTX

Community pulses and IOCs

Spamhaus

DROP + EDROP blocklists

Emerging Threats

Compromised IPs

Ransomware.live

Victims, groups, leak sites

Ransomwatch

Group infrastructure, .onion domains

PhishTank + OpenPhish

Verified phishing URLs

Blocklist.de

Brute-force and attack IPs

DShield, CINSscore, IPsum

Aggregated blocklists

Current threat breakdown

What's in the database right now

389,026
malware
161,516
phishing
3,831
c2
1,484
spam
971
ransomware
33
botnet

Works with your tools

REST API with token auth. Look up a single indicator, search in bulk, or export a filtered feed. Use it from your SIEM, a Python script, or just curl.

GET /api/v1/iocs/lookup?value=8.8.8.8
POST /api/v1/iocs/bulk
GET /api/v1/export?type=ip&threat=c2
GET /api/v1/stats (public, no auth)
lookup.py
import requests

r = requests.get(
    "https://malware.channel/api/v1/iocs/lookup",
    params={"value": "evil.example.com"},
    headers={"Authorization": f"Bearer {token}"}
)

data = r.json()
if data.get("found"):
    print(f"Threat: {data['threat_type']}")
    print(f"Source: {data['source']}")

Try it out

Free account. Takes 30 seconds.