There are several websites out there to check potentially dangerous website addresses.  We reviewed several of these website tools and listed a few that were easy to use and provided good information.  We would recommend checking the malicious URL at 2 or 3 of the links provided to verify if it’s a threat or not.


The Talos Security Intelligence and Research Group (Talos) is made up of leading threat researchers supported by sophisticated systems to create threat intelligence for Cisco products that detects, analyzes and protects against both known and emerging threats. Talos maintains the official rule sets of, ClamAV, and SpamCop. This blog profile is managed by multiple authors with expertise that spans software development, reverse engineering, vulnerability triage, malware investigation and intelligence gathering.

Talos is the primary team that contributes threat information to the Cisco Collective Security Intelligence (CSI) ecosystem. Cisco CSI is shared across multiple security solutions and provides industry-leading security protections and efficacy. In addition to threat researchers, CSI is driven by intelligence infrastructure, product and service telemetry, public and private feeds and the open source community.


Cymon is the largest tracker of open-source security reports about phishing, malware, botnets and other malicious activities. Search for IP addresses or domains in our reputation database. Cymon ingests events and other malicious activities from almost 200 sources daily. On average, more than 15,000 unique IPs and 100,000 events are processed each day.


Google’s Safe Browsing technology examines billions of URLs per day looking for unsafe websites. Every day, we discover thousands of new unsafe sites, many of which are legitimate websites that have been compromised. When we detect unsafe sites, we show warnings on Google Search and in web browsers. You can search to see whether a website is currently dangerous to visit.


Norton Safe Web is a new reputation service from Symantec . Our servers analyze Web sites to see how they will affect you and your computer. Then, using the Norton Toolbar installed on your PC, we let you know how safe a particular Web site might be before you view it. If you need to find out more about how a Web site might behave, we provide more detailed information right here on Norton Safe Web .


PhishTank is a collaborative clearing house for data and information about phishing on the Internet. Also, PhishTank provides an open API for developers and researchers to integrate anti-phishing data into their applications at no charge.


Why check 30 different solutions for varying snippets of data when you can just check one? Pulsedive enriches IOCs but also fetches article summaries from Wikipedia and even posts from Reddit and the infosec blogosphere to provide contextual information for threats.


ThreatMiner is designed to be an analyst’s FIRST portal to visit when doing threat research and here’s why.

Threat intelligence and intrusion analysts who regularly perform research into malware and network infrastructure often find the need to rely on mutliple websites that individually holds a small piece of the larger puzzle.

It is also often the case where pivoting directly from an open source research report is unavailable and that it is sometimes difficult to remember if an indicator has already been reported and/or attributed. All these small but frustrating obstacles distract an analyst from what they do best: analyse.  This is why ThreatMiner was created.


Scores are assigned based on factors such as a website’s age, historical locations, changes, and indications of suspicious activities discovered through malware behavior analysis. We’ve advanced how we apply web reputation to keep pace with new types of criminal attacks that can come and go very quickly, or try to stay hidden.


Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.

Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.

By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.




 Register for your FREE Threat Check today: