Malicious URLs
Free feed of phishing, scam and malware-delivery URLs from Twitter/X researchers
Malicious URLs
Phishing, scam and malware-delivery URLs from Twitter/X
URLs by window
-
malicious URLs
-
malicious URLs
-
malicious URLs
-
malicious URLs
What this list contains
- Sourced from ~95 Twitter/X security researchers, refreshed every 15 minutes.
- Phishing kits, scam landing pages, malware-delivery URLs and command-and-control endpoints.
- Onion (.onion) URLs and ransomware leak sites included.
- Excluded: legitimate domains in the allowlist (Google, Microsoft, GitHub auth pages, common shorteners).
Recent samples
Latest 10 URLs from the past 7 days. Live from api.tweetfeed.live/v1/week/url.
Top tags for malicious URLs
Frequently asked questions
What is a malicious URL feed?
A malicious URL feed is a continuously updated list of links that point to phishing pages, scams, malware payloads or command-and-control endpoints. Security teams ingest these feeds into SIEMs, firewalls and EDRs to block traffic and detect compromise. TweetFeed publishes the URLs spotted by ~95 infosec researchers on Twitter/X, refreshed every 15 minutes.
How is this list updated?
Every 15 minutes. The pipeline scrapes RSS feeds from public Twitter/X researcher accounts and lists, extracts URLs from tweets, deduplicates against the past year, tags them with malware family and category, and republishes the result in CSV, JSON and RSS.
Can I integrate this feed with my SIEM, MISP or firewall?
Yes. CSV imports work with most SIEMs (Splunk, Sentinel, QRadar) and proxies. The REST API at api.tweetfeed.live/v1/{time}/url returns JSON for any HTTP client. The MISP manifest at /misp/manifest.json imports four native MISP events (today, week, month, year). The Threat Hunting page has copy-paste configuration snippets for MISP, OpenCTI, Splunk, KQL and IntelOwl.
Are these URLs verified malicious?
TweetFeed is OSINT, not a sandbox. URLs are sourced from public posts by infosec researchers, then deduplicated and tagged. False positives can occur. Treat the list as a high-recall lead source rather than a verdict; cross-reference VirusTotal, urlscan.io or your sandbox before blocking.
License
Source code for the pipeline: github.com/0xDanielLopez/TweetFeed (MIT).