Malicious Domains

Free feed of phishing, scam and malware-delivery domains from Twitter/X researchers


Malicious Domains

Phishing, scam and malware-delivery domains from Twitter/X


Domains by window

Today

-

malicious domains

Week

-

malicious domains

Month

-

malicious domains

Year

-

malicious domains

What this list contains

  • Sourced from ~95 Twitter/X security researchers, refreshed every 15 minutes.
  • Phishing domains, scam landing pages, malware-delivery hosts and C2 endpoints.
  • Newly-registered domains often included (typo-squats of bank, tech and government brands).
  • Excluded: legitimate domains in the allowlist (Google, Microsoft, GitHub auth pages, common shorteners).

Recent samples

Latest 10 Domains from the past 7 days. Live from api.tweetfeed.live/v1/week/domain.

Loading samples

Top tags for malicious domains

Filter the Domain feed by malware family or category. Each tag has its own landing page with recent samples and context.

  • #phishing
  • #c2
  • #cobaltstrike
  • #scam
  • #malware

See all tags on the Dashboard or browse the full IOC feed.

Frequently asked questions

What is a malicious domain feed?

A malicious domain feed is a continuously updated list of fully-qualified domain names that point to phishing pages, scams, malware payloads or command-and-control endpoints. Security teams ingest these into DNS firewalls, secure web gateways and EDRs to block traffic before resolution. TweetFeed publishes the domains spotted by ~95 infosec researchers on Twitter/X, refreshed every 15 minutes.

How is this list updated?

Every 15 minutes. The pipeline scrapes RSS feeds from public Twitter/X researcher accounts and lists, extracts domains from tweets, deduplicates against the past year, tags them with malware family and category, and republishes the result in CSV, JSON and RSS.

How do malicious domains differ from malicious URLs?

A URL is a full link including path and query string (https://example.com/login.php?u=1). A domain is just the host portion (example.com). Domain blocks catch the entire domain regardless of path; URL blocks are more precise but miss other paths on the same host. Most SOCs block at the domain level for known-bad infrastructure and at the URL level for one-off phishing kits.

Are these domains verified malicious?

TweetFeed is OSINT, not a sandbox. Domains are sourced from public posts by infosec researchers, then deduplicated and tagged. False positives can occur, especially for compromised legitimate domains hosting phishing kits temporarily. Cross-reference VirusTotal, urlscan.io or your sandbox before blocking outright.

What is the license? Can I use this commercially?

All TweetFeed IOC data, including this domain subset, is released under CC0 1.0 Universal (Public Domain Dedication). No attribution required, no warranty. Commercial use is allowed. The TweetFeed website code and branding are not covered by CC0.

License

Malicious Domains data: CC0 1.0 Public Domain. No attribution required, no warranty. Source code for the pipeline: github.com/0xDanielLopez/TweetFeed (MIT).