Destroylist

Performing Arts Destroylist: Phishing & Scam Domain Blacklist

Destroylist

Typing SVG

Rootlist On List Update Update Statistics Deploy GitHub Pages

Status License Contributions Last Commit Stars Forks

Rocket Quick Start

Add to Pi-hole or AdGuard Home in one click — paste this URL into your blocklist settings:

https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/hosts.txt

More formats: Hosts · AdBlock · Dnsmasq · Unbound · RPZ · API

High Voltage Quick Access

Table of Contents - [Quick Start](#-quick-start) - [Live Statistics](#live-statistics) - [Data Feeds](#-data-feeds) - [Root Lists](#-root-lists) - [Content-Verified Feeds](#-content-verified-feeds-) - [Threat Intelligence API](#-threat-intelligence-api) - [About Destroylist](#-about-destroylist) - [Workflow & Remediation](#-threat-intelligence--automated-remediation-workflow) - [Fraud Victims Info](#-key-info-for-online-fraud-victims) - [Appeals Process](#-appeals-process) - [Connect With Us](#-connect-with-us) - [Join the Fight](#-join-the-fight)

Live Statistics

Primary Primary Live Community Community Live
Primary Content Community Content
  Today Week Month
Primary
Community

File Folder Data Feeds

Feed Description Update Download
Primary Curated phishing domains ⚡ Real-time JSON TXT
Primary Live DNS verified active 🕐 24h JSON TXT
Community Aggregated from 13+ sources 🕐 2h JSON TXT
Community Live Community DNS verified 🕐 24h JSON TXT
Primary Content Curated + HTTP content verified 🕐 12h JSON TXT
Community Content Aggregated + HTTP content verified 🕐 24h JSON TXT
Allowlist False positive protection ✋ Manual JSON

[!TIP] Production: list.json or active_domains.json · Max coverage: blocklist.json · Firewall/DNS: root lists

📁 All Download Formats (TXT, Hosts, AdBlock, Dnsmasq, Unbound, RPZ)
| Format | Primary | Primary Live | Community | Community Live | |:------:|:-------:|:------------:|:---------:|:--------------:| | **TXT** | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary/domains.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/domains.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community/domains.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community_active/domains.txt) | | **Hosts** | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary/hosts.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/hosts.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community/hosts.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community_active/hosts.txt) | | **AdBlock** | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary/adblock.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/adblock.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community/adblock.txt) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community_active/adblock.txt) | | **Dnsmasq** | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary/dnsmasq.conf) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/dnsmasq.conf) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community/dnsmasq.conf) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community_active/dnsmasq.conf) | | **Unbound** | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary/unbound.conf) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/unbound.conf) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community/unbound.conf) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community_active/unbound.conf) | | **RPZ** | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary/rpz.zone) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/rpz.zone) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community/rpz.zone) | [⬇️](https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/community_active/rpz.zone) | > **Hosts** → Pi-hole, /etc/hosts, Windows · **AdBlock** → uBlock Origin, AdGuard · **Dnsmasq** → dnsmasq DNS · **Unbound** → pfSense, OPNsense · **RPZ** → BIND, Knot DNS

Laptop Root Lists

[!TIP] Root domains only — no subdomains, hosting providers excluded

  All Roots Live Only Services Only
🔴 Primary JSON · TXT JSON · TXT JSON · TXT
Community JSON · TXT JSON · TXT JSON · TXT

All Roots — clean root domains (no infra) · Live Only — DNS-verified active · Services Only — hosting platform subdomains (Vercel, Pages.dev, Netlify, etc.)

Content-Verified Feeds

[!NOTE] Real HTTP content verification — not just DNS, but actual phishing page detection

Primary Content Community Content

Feed Update Description
Primary Content 12h (06:00 / 18:00 UTC) Curated phishing with verified active content
Community Content 24h (03:00 UTC) Aggregated feeds with verified active content

Download links: see Data Feeds above

[!WARNING] Cloaking Alert: Scammers use cloaking to hide phishing from bots — showing blank/fake pages to scanners. Domain NOT in content list ≠ safe! Use Primary or Community full lists for complete protection.

Alien Monster Threat Intelligence API

API

%%{init: {"theme":"base", "themeVariables": { "background": "transparent", "mainBkg": "#000000", "primaryColor": "#000000", "primaryTextColor": "#FFFFFF", "primaryBorderColor": "#FF0000", "lineColor": "#FF0000", "secondaryColor": "#111111", "tertiaryColor": "#111111", "fontFamily": "Inter, system-ui, sans-serif"}, "flowchart": {"curve": "basis", "htmlLabels": true}}}%%
flowchart LR
  Request["🌐 Client Request<br/>(Single / Bulk)"] e1@--> API["⚡ Live API<br/>api.destroy.tools"]
  API e2@--> Engine["🧠 Threat Engine<br/>(Risk Score 0-100)"]
  Engine e3@--> DB[("🗄️ Destroylist DB<br/>1M+ Threats")]
  DB e4@--> Engine
  Engine e5@--> Response["📋 JSON Response<br/>(Severity & Status)"]

  classDef client fill:#000000,stroke:#333333,stroke-width:2px,color:#FFFFFF;
  classDef api fill:#000000,stroke:#FF0000,stroke-width:2px,color:#FFFFFF;
  classDef db fill:#000000,stroke:#333333,stroke-width:2px,stroke-dasharray: 5 5,color:#FFFFFF;
  classDef animate stroke:#FF0000,stroke-width:2px,stroke-dasharray:10 5,stroke-dashoffset:900,animation:dash 22s linear infinite;
  classDef animateDark stroke:#333333,stroke-width:2px,stroke-dasharray:10 5,stroke-dashoffset:900,animation:dash 22s linear infinite;

  class Request client;
  class API,Engine,Response api;
  class DB db;
  class e1,e2,e3,e5 animate;
  class e4 animateDark;

API Stats

Free, open, no API key. Real-time domain risk scoring (0-100) across 888K+ threats · 2h sync · Single & bulk check (500/req) · Keyword search · Full feeds

📖 API Endpoints, Scoring & Integration Examples
### Endpoints | Method | Endpoint | Description | |:------:|:---------|:------------| | `GET` | [`/v1/check?domain=`](https://api.destroy.tools/v1/check?domain=example-phish.xyz) | Single domain check with risk score & severity | | `POST` | `/v1/check/bulk` | Bulk check up to **500 domains** per request | | `GET` | [`/v1/search?q=`](https://api.destroy.tools/v1/search?q=metamask) | Search blocklisted domains by keyword | | `GET` | [`/v1/feed/{list}`](https://api.destroy.tools/v1/feed/primary) | Download full domain feeds (primary, community, active) | | `GET` | [`/v1/stats`](https://api.destroy.tools/v1/stats) | Live statistics & domain counts | ### Threat Scoring Every domain gets a **risk score (0-100)** based on multiple signals: | Signal | Points | Description | |:-------|:------:|:------------| | Curated blocklist | **+40** | In primary destroylist | | Community reported | **+20** | Reported by community sources | | DNS active | **+30** | Domain currently resolves | | Multi-source | **+10** | Confirmed by multiple feeds | | Suspicious keywords | **+5 each** | metamask, wallet, airdrop, etc. | | Risky TLD | **+5** | .xyz, .top, .club, .icu, etc. | > 🔴 **Critical** 70-100 · 🟠 **High** 40-69 · 🟡 **Medium** 20-39 · 🟢 **Low** 1-19 ### Quick Integration **cURL** ```bash curl "https://api.destroy.tools/v1/check?domain=suspicious-site.xyz" ``` **Python** ```python import requests r = requests.get(f"https://api.destroy.tools/v1/check?domain={domain}") if r.json()["threat"]: print(f"BLOCKED: {r.json()['severity']} (score: {r.json()['risk_score']})") ``` **JavaScript** ```javascript const r = await fetch(`https://api.destroy.tools/v1/check?domain=${domain}`); const data = await r.json(); if (data.threat) console.warn("PHISHING:", data.severity, data.risk_score); ``` **Bulk Check** ```bash curl -X POST "https://api.destroy.tools/v1/check/bulk" \ -H "Content-Type: application/json" \ -d '{"domains":["site1.com","site2.xyz","site3.top"]}' ```

Telescope About Destroylist

[!NOTE] Live data collection began on July 1, 2025

**888K+ domains tracked** · **13+ threat sources** · **50+ vendor reports** · **6 output formats** · **Free API**

Destroylist is a real-time threat intelligence platform by PhishDestroy — protecting firewalls, DNS resolvers, browser extensions, and security teams worldwide. Every domain is discovered, verified, reported to registrars, and published transparently.

Data Pipeline

%%{init: {"theme":"base", "themeVariables": { "background": "transparent", "mainBkg": "#000000", "primaryColor": "#000000", "primaryTextColor": "#FFFFFF", "primaryBorderColor": "#FF0000", "lineColor": "#FF0000", "secondaryColor": "#111111", "tertiaryColor": "#111111", "fontFamily": "Inter, system-ui, sans-serif"}, "flowchart": {"curve": "basis", "htmlLabels": true}}}%%
flowchart TB
  subgraph Sources["🔍 Threat Sources"]
    S1[30+ Parsers]
    S2[Community Feeds]
    S3[Telegram Bot]
    S4[CT Logs / DNS]
  end

  subgraph Ingestion["📥 Ingestion"]
    I1[smart_aggregator.py]
    I2[validate_and_clean.py]
  end

  subgraph Enrichment["🧠 Enrichment"]
    E1[DNS Validation]
    E2[HTTP Content Check]
    E3[VirusTotal / GSB]
  end

  subgraph Distribution["📡 Distribution"]
    D1[JSON / TXT]
    D2[Hosts / AdBlock]
    D3[RPZ / Unbound]
    D4[API Feed]
  end

  Sources --> Ingestion
  Ingestion --> Enrichment
  Enrichment --> Distribution

  classDef source fill:#000000,stroke:#333333,stroke-width:2px,color:#FFFFFF;
  classDef ingest fill:#000000,stroke:#FF0000,stroke-width:2px,color:#FFFFFF;
  classDef enrich fill:#000000,stroke:#CC0000,stroke-width:2px,color:#FFFFFF;
  classDef dist fill:#000000,stroke:#FF0000,stroke-width:2px,stroke-dasharray: 5 5,color:#FFFFFF;

  class S1,S2,S3,S4 source;
  class I1,I2 ingest;
  class E1,E2,E3 enrich;
  class D1,D2,D3,D4 dist;
🔧 Quick Integration Examples (Subscribe URLs · curl · Python · Bash)
### One-Click Subscribe URLs | Tool | Format | URL | |:-----|:------:|:----| | **Pi-hole** | Hosts | `https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/hosts.txt` | | **AdGuard Home** | AdBlock | `https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/adblock.txt` | | **uBlock Origin** | AdBlock | `https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/adblock.txt` | | **pfSense / OPNsense (Unbound)** | Unbound | `https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/unbound.conf` | | **BIND / Knot DNS (RPZ)** | RPZ | `https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/rpz.zone` | | **Dnsmasq** | Dnsmasq | `https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/dnsmasq.conf` | > **Pi-hole** — Settings > Blocklists > paste the Hosts URL
> **AdGuard Home** — Filters > DNS Blocklists > Add blocklist > paste the AdBlock URL
> **uBlock Origin** — Settings > Filter lists > Import > paste the AdBlock URL
> **pfSense** — Services > DNS Resolver > paste the Unbound URL
> **BIND/Knot** — Add the RPZ URL as a response-policy zone ### curl One-Liners ```bash # Plain domain list curl -fsSL https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/domains.txt -o domains.txt # Hosts format (Pi-hole, /etc/hosts) curl -fsSL https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/hosts.txt -o hosts_blocklist.txt # AdBlock format (uBlock Origin, AdGuard) curl -fsSL https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/adblock.txt -o adblock.txt # Dnsmasq curl -fsSL https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/dnsmasq.conf -o dnsmasq_blocklist.conf # Unbound (pfSense / OPNsense) curl -fsSL https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/unbound.conf -o unbound_blocklist.conf # RPZ (BIND / Knot) curl -fsSL https://raw.githubusercontent.com/phishdestroy/destroylist/main/rootlist/formats/primary_active/rpz.zone -o rpz_blocklist.zone ``` ### Python ```python import requests blocklist = requests.get('https://raw.githubusercontent.com/phishdestroy/destroylist/main/list.json').json() is_malicious = "suspicious-domain.com" in blocklist ``` ### Bash ```bash curl -s https://raw.githubusercontent.com/phishdestroy/destroylist/main/list.txt | grep -q "suspicious-domain.com" && echo "BLOCKED" ```

Shield Threat Intelligence & Automated Remediation Workflow

%%{init: {"theme":"base", "themeVariables": { "background": "transparent", "mainBkg": "#000000", "primaryColor": "#000000", "primaryTextColor": "#FFFFFF", "primaryBorderColor": "#FF0000", "lineColor": "#FF0000", "secondaryColor": "#111111", "tertiaryColor": "#111111", "fontFamily": "Inter, system-ui, sans-serif"}, "flowchart": {"curve": "basis", "htmlLabels": true}}}%%
flowchart LR
  Discover["🔍 DISCOVER<br/>30+ Parsers"] e1@--> Report["📤 REPORT<br/>50+ Vendors"]
  Report e2@--> Legal["⚖️ LEGAL<br/>ICANN Compliance"]
  Legal e3@--> Publish["📡 PUBLISH<br/>Real-time Feed"]

  classDef box fill:#000000,stroke:#333333,stroke-width:2px,color:#FFFFFF;
  classDef animate stroke:#FF0000,stroke-width:2px,stroke-dasharray:10 5,stroke-dashoffset:900,animation:dash 22s linear infinite;

  class Discover,Report,Legal,Publish box;
  
  class e1,e2,e3 animate;

Workflow

| 🔍 **DISCOVER** | 📤 **REPORT** | ⚖️ **LEGAL** | 📡 **PUBLISH** | |:---:|:---:|:---:|:---:| | 30+ parsers | 50+ vendors | ICANN compliance | Real-time | | CT logs, DNS | Google, Microsoft | Abuse notifications | GitHub, Telegram | | Social media | VirusTotal, Cloudflare | Evidence packages | Twitter, Mastodon |
📖 Read Full Workflow Details
### 🔍 Phase 1: Pre-emptive Discovery & Ingestion 🔎 We utilize a distributed network of **30+ proprietary parsers** to identify malicious domains at their earliest stage: - **Advanced Heuristics:** Continuous monitoring of Google Ads (Malvertising), SEO-manipulated search results, and trending social media campaigns on Twitter (X), YouTube, and Telegram - **Infrastructure Analysis:** Leveraging *dnstwist* and typosquatting detection to catch look-alike domains targeting established brands - **Community Intelligence:** Real-time ingestion of community-reported threats via our Telegram Bot and partner intelligence feeds --- ### 📤 Phase 2: Global Ecosystem Contribution Once a threat is confirmed, we submit data to over **50 industry-leading vendors**: ``` Cloudflare Google Safe Browsing Microsoft Security VirusTotal Netcraft ESET Bitdefender Norton Safe Web Avira PhishTank Dr.Web Yandex Safe Browsing URLScan.io PolySwarm SiteReview Urlquery PhishStats PhishReport IsItPhish ThreatCenter ``` --- ### 📝 Phase 3: Legal Notifications & Investigation Support - **Abuse Notifications:** Formal alerts to domain registrars and hosting providers - **Forensic Evidence Disclosure:** Complete evidence packages including metadata, screenshots, and PDF reports - **ICANN Compliance Support:** Reports aligned with ICANN standards - **Conditional Re-Detection Logic:** Follow-up alerts only if threat remains active beyond 24 hours --- ### 📢 Phase 4: Public Transparency & Community Alerts - **Open Database:** Real-time commits to this GitHub repository - **Live Monitoring:** Visual intelligence at [phishdestroy.io/live](https://phishdestroy.io/live/) - **Social Broadcasting:** Automated alerts on Twitter, Telegram, and Mastodon

Police Car Key Info for Online Fraud Victims

Abuse Process

Show details about complaints and transparency
💼 DestroyList aims to disable malicious domains: scams, phishing, and other illicit sites to enhance internet safety. Before a domain is added, we: 🔍 Scan it across cybersecurity platforms for threat intelligence. 📥 Send an official complaint to the registrar and the hosting provider (via WHOIS), including scan results, screenshots, and a request for client investigation. The complaint also notifies them about inclusion in our public database. 🚔 According to ICANN rules, registrars must review such complaints within 24 hours. --- 🦖 We work hard to eliminate threats quickly. Every malicious domain is analyzed, documented, reported, and published transparently. However, when a domain receives 10–30+ abuse reports and a registrar still ignores them for months, the situation changes: the registrar is no longer a passive party. It effectively provides infrastructure for illegal activity. Some registrars behave as if their internal policies somehow override ICANN requirements and national laws — as if phishing and fraud are "allowed" as long as they personally decide not to act. 👮 We document this publicly so that anyone can see: threats persist not because they were unnoticed, but because the responsible providers simply chose to do nothing. --- **Requests from private individuals:** DestroyList is an open-source, non-commercial volunteer project. Private individuals may request the number of abuse reports we have sent for a specific domain, but only through public channels: - via GitHub issues - via commit history: https://github.com/phishdestroy/destroylist/commits/main/ ❗ We do not respond to private e-mail requests from individuals about report counts. ✔️ This is a legal requirement for transparency and equal access to information. Official government or law-enforcement requests may be answered privately. --- 💔 If you were defrauded by a domain already listed here, check its addition date using the commit history or via our Telegram/Mastodon channels. 💬 If the fraud happened after the domain was already listed, the registrar's or host's delay may indicate they share responsibility for the loss. Future potential victims can also see this negligence documented publicly. 🔞 Registrars and hosts that tolerate scam operations may reasonably be expected to assist victims or their legal representatives.

Bar Chart Use Cases & Historical Vault

Network security · Threat research · AI/ML training · Trend analysis · Automation

[!TIP] 📩 Historical Vault (500K+ domains, 5+ years archived): contact@phishdestroy.io

Magic Wand Appeals Process

Appeals

Wrongly listed? Fix it fast:

| Appeals Form | GitHub Issue | |:—:|:—:|

Accuracy first! 🔭

Black Heart Connect With Us

Website Medium Telegram Bot Twitter Mastodon

API Ban Service Email

Star Star History

Star History Chart

</a>

📄 License

License

MIT — Free, open, yours to use!

Handshake Join the Fight!

**Every star helps this project reach more security teams and protect more users.** [![Star this repo](https://img.shields.io/badge/⭐_Star_Destroylist-FF0000?style=for-the-badge)](https://github.com/phishdestroy/destroylist) [![Open an Issue](https://img.shields.io/badge/🐛_Open_Issue-000000?style=for-the-badge)](https://github.com/phishdestroy/destroylist/issues/new) [![Submit a PR](https://img.shields.io/badge/🔧_Submit_PR-FF0000?style=for-the-badge)](https://github.com/phishdestroy/destroylist/pulls)

We welcome contributions:

Drop an Issue or PR — let’s crush phishing together! 💪