5 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
DestroyList is an open-source tool that provides a curated list of phishing and scam domains, allowing users to block malicious sites effectively. It offers real-time risk scoring and various download formats for integration into firewalls and DNS resolvers. The service uses community reports and advanced detection methods to identify threats.
If you do, here's more
Destroylist is a project aimed at combating phishing and scams by providing a comprehensive blocklist of malicious domains. The service offers various download formats, including JSON, TXT, and Dnsmasq, which cater to different user needs such as firewalls and DNS resolvers. Users can access primary and community content, with updates every 12 hours for primary lists and every 24 hours for community feeds. The platform includes a real-time risk scoring system that evaluates domains based on multiple signals, with scores ranging from 0 to 100. A higher score indicates a greater threat level, with thresholds clearly defined for critical, high, medium, and low risks.
The system employs a variety of methods for domain verification, including checking for active HTTP content rather than just DNS records. Destroylist utilizes a network of over 30 parsers to detect threats early, analyzing factors like malvertising, SEO manipulation, and community-reported threats. When a domain is flagged, the project sends complaints to registrars and hosting providers, demanding action under ICANN rules. If a registrar fails to respond to multiple abuse reports, Destroylist documents this in a public manner, holding them accountable for allowing malicious activity on their platforms.
Users can interact with the API for single or bulk checks of domains, with options for searching by keyword and downloading full feeds. The platform is open-source and does not require an API key, making it accessible to anyone interested in enhancing their cybersecurity measures. Transparency is emphasized throughout the process, with users able to request information on abuse reports publicly, ensuring equal access to data. This approach not only helps protect users but also pressures registrars and hosts to take responsibility for the domains they manage.
Questions about this article
No questions yet.