Awesome
<img src="https://github.com/Phishing-Database/assets/raw/master/phishing-logo.jpg" alt="Phishing Domain Status Testing Repo"/>Phishing Domain Database <a href="https://twitter.com/PhishFindR" ><img src="https://img.shields.io/twitter/follow/PhishFindR.svg?style=social&label=Follow" /></a>
The Phishing.Database project is a comprehensive and regularly updated repository designed to help the community identify and mitigate phishing threats.
We believe that threat intelligence on phishing, malware, and ransomware should always remain free and open-source. By openly sharing data about criminal activities, we aim to protect the internet users, help organizations mitigate threats, and contribute to a safer online environment for everyone by contributing to the global effort to identify and shutdown malicious sites. Unlike proprietary systems that sell access to phishing data, we focus and on transparency and collaboration for the greater good.
Join us in our mission to keep threat intelligence free and open-source by contributing to the project, sharing the data, and supporting the maintainers.
Repository | Become a Sponsor |
---|---|
We're seeking sponsors to help us grow and strengthen our infrastructure. By sponsoring this project, you'll have the opportunity to showcase your logo and link here, gaining visibility and supporting an open-source initiative that benefits the community. <br> 📧 Contact us at contact@phish.co.za to explore partnership opportunities. | |
<a href='https://twitter.com/PhishFindR'><img src='https://img.shields.io/twitter/follow/PhishFindR.svg?style=social&label=Follow' alt='Follow @PhishFindR'></a> | Help keep this project's infrastructure thriving by supporting the maintainers! |
Support @mitchellkrogza on Ko-fi!<br>Sponsor @funilrys via GitHub Sponsors! |
Version: V.2024-12-22.15
:boom: Latest Threats<br/>@ 15:31:54 | :boom: Active Threats<br/>Sunday 2024-12-22 | Total Links<br/>Discovered Today |
---|---|---|
:warning: 327745 | :warning: 0 | 479 |
Total Phishing Domains Captured: 775953 << (FILE SIZE: 6.5M tar.gz)
Total Phishing Links Captured: 1365584 << (FILE SIZE: 28M tar.gz)
DO NOT Clone The Repository
The repository undergoes a history reset every 24 hours, which will break your setup if you rely on cloning. breaking changes.
To ensure uninterrupted access to the data, please download the latest lists directly from the provided links below.
File Sources
The links below will direct you to the latest data files for this project.
The checksums for the files are available in the checksums repository.
File Name | Official Source |
---|---|
ALL-phishing-domains.lst | Download |
ALL-phishing-links.lst | Download |
ALL-phishing-domains.tar.gz | Download |
ALL-phishing-links.tar.gz | Download |
phishing-domains-ACTIVE.txt | Download |
phishing-domains-INACTIVE.txt | Download |
phishing-domains-INVALID.txt | Download |
phishing-IPs-ACTIVE.txt | Download |
phishing-IPs-INACTIVE.txt | Download |
phishing-IPs-INVALID.txt | Download |
phishing-links-ACTIVE.txt | Download |
phishing-links-INACTIVE.txt | Download |
phishing-links-INVALID.txt | Download |
The files are updated regularly.
Automated Testing
The testing of the domains and URLs is automated using the awesome PyFunceble Testing Suite written by Nissar Chababy (AKA @funilrys). Over many years in development, this tool has become a robust and reliable source of domain and URL status. We use it in an automated environment which actively retests domains and URLs on a regular basis.
Who do we define an active status?
We define an active status as a domain or URL that is currently active and serving phishing content. The status is determined by the HTTP status code returned by the server.
Active Status Codes
- 100, 101, 200, 201, 202, 203, 204, 205, 206
Potentially Active Status Codes
- 000, 300, 301, 302, 303, 304, 305, 307, 403, 405, 406, 407, 408, 411, 413, 417, 500, 501, 502, 503, 504, 505
Any of the status codes above are considered active until further investigation.
Potentially Inactive Status Codes
- 400, 402, 403, 404, 409, 410, 412, 414, 415, 416
Removal Requests
If your domain has been listed incorrectly due to hacking or other reasons, file a False Positive Report with proof of removal from other platforms (e.g., Phishtank, Openphish) to expedite processing.
Contributing
Contributions are welcome and encouraged.
Data Contributions
To contribute, please submit follow the matrix below to identify the correct file and repository to submit your data.
Action | Data Type | File to Edit |
---|---|---|
➕ Add | Domain | add-domain |
➕ Add | Domain (wildcard) | add-wildcard-domain |
➕ Add | Link | add-link |
➕ Add | IP | IP-addr.list |
➕ Add | IP (cidr) | IP-addr.cidr.list |
❌ Remove | False Positive Domain | falsepositive.list |
Reporting Issues
To report an issue or a false positive, please submit a new issue.
Authors
-
Mitchell Krog (@mitchellkrogza) - Support @mitchellkrogza on Ko-fi!
-
Nissar Chababy (@funilrys) - Sponsor @funilrys via GitHub Sponsors!
License
MIT License
Copyright (c) 2018-2024 Mitchell Krog - @mitchellkrogza
Copyright (c) 2018-2024 Nissar Chababy - @funilrys
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.