Introducing the Phishing Domain Database: A Public Repository for Testing Phishing Domains and Links

Dean Lofts
3 min readMar 10, 2023

--

Phishing attacks are a significant threat to individuals and organisations alike. Phishing attacks are a type of social engineering attack where an attacker attempts to trick a victim into giving up sensitive information, such as usernames, passwords, and credit card numbers. Phishing attacks can be delivered through email, text messages, social media, and other communication channels.

Introducing the Phishing Domain Database: A Public Repository for Testing Phishing Domains and Links
Introducing the Phishing Domain Database: A Public Repository for Testing Phishing Domains and Links

Various security measures have been developed to combat phishing attacks, such as anti-phishing software, email filters, and browser extensions. However, these measures are only effective if updated with the latest phishing domains and links.

This is where the Phishing Domain Database comes in. The Phishing Domain Database is a public repository hosted on GitHub that contains a list of phishing domains and links. The repository is maintained by Mitchell Krog and Nissar Chababy and is released under the MIT License. The repository is open-source; anyone can contribute to it by adding new phishing domains or links.

The Phishing Domain Database aims to provide a testing environment for phishing domains and websites. The repository is regularly updated with the latest phishing domains and links discovered by the project’s contributors. The repository is updated hourly with the latest phishing domains and links discovered by the project’s contributors.

The repository contains two main lists: phishing domains and phishing links. The phishing domains list includes a list of all known phishing domains that the project has captured. The phishing links list includes a list of all known phishing links that the project has captured.

The repository also includes a list of active and potentially active phishing links. These links are defined as any HTTP status code that returns a response. This includes HTTP status codes 100, 101, 200, 201, 202, 203, 204, 205, 206, and 000, 300, 301, 302, 303, 304, 305, 307, 403, 405, 406, 407, 408, 411, 413, 417, 500, 501, 502, 503, 504, and 505.

The project’s contributors use the PyFunceble testing suite to test the status of each domain and link. The PyFunceble testing suite provides a reliable source of active and inactive domains. Through regular testing, even inactive domains that may become active again are automatically moved back to the active list.

The Phishing Domain Database is a valuable resource for anyone interested in protecting themselves from phishing attacks. By regularly checking the list of phishing domains and links, individuals and organisations can take steps to protect themselves from phishing attacks.

In conclusion, the Phishing Domain Database is a public repository hosted on GitHub that contains a list of phishing domains and links. The repository is a valuable resource for anyone interested in protecting themselves from phishing attacks. The repository is regularly updated with the latest phishing domains and links discovered by the project’s contributors. The repository is open-source; anyone can contribute to it by adding new phishing domains or links.

URL: https://github.com/mitchellkrogza/Phishing.Database

--

--

Dean Lofts
Dean Lofts

Written by Dean Lofts

Dean (Loftwah) | Self-taught coder | AI, AWS, DevOps, DevRel, Ruby, Rust, Terraform | Hip-hop producer, dad | EddieHub Ambassador, LinkFree | ISTP-A 🎧🤖🎓

No responses yet