2025-12-14 19:17:01 +00:00
up
2025-12-07 18:38:23 -08:00
2025-12-07 18:51:08 -08:00
2025-12-14 19:17:01 +00:00
2025-12-09 23:44:16 -08:00
2025-07-16 19:31:40 -07:00
up
2025-11-17 18:53:19 -08:00
2025-11-14 00:45:15 -08:00
2025-12-14 19:17:01 +00:00
1
2025-07-16 19:32:36 -07:00
2025-12-14 11:14:52 -08:00
2025-12-14 19:17:01 +00:00
2025-11-13 08:42:26 -08:00
2025-11-08 05:09:15 +02:00

Performing Arts Destroylist: Phishing & Scam Domain Blacklist Police Car Hook

Destroyolist Illustration

High Voltage Quick Overview & Access Fire

Project Status

Workflow Status Status License Contributions Last Commit Stars

Statistics Chart

Primary Primary Live Community Community Live
Today Week Month
Primary
Community

File Folder Data Feeds Laptop

Feed Description Update
list.json / .txt Primary curated phishing domains Real-time
active_domains.json Primary DNS verified 24h
blocklist.json Community aggregated 2h
live_blocklist.json Community DNS verified 24h
allowlist.json False positive protection Manual

Card Index Dividers Download Formats Ballot Box With Ballot

Format Primary Primary Live Community Community Live
TXT
Hosts
AdBlock
Dnsmasq

Hosts — Pi-hole, /etc/hosts, Windows · AdBlock — uBlock Origin, AdGuard · Dnsmasq — DNS server

Memo Root Lists Pencil

Root domains only (no subdomains), hosting providers excluded

Source All Roots Live Only
Primary active_root_domains.json online_root_domains.json
Community community_root_domains.json community_online_root_domains.json

💡 Production: list.json or active_domains.json · Max coverage: blocklist.json · Firewall/DNS: root lists

Connect With Us Mobile Phone With Arrow

Platform Link
Website phishdestroy.io
Telegram Alerts t.me/destroy_phish
Telegram Bot t.me/PhishDestroy_bot
Twitter / X x.com/Phish_Destroy
Mastodon @phishdestroy@mastodon.social
Ban Service ban.destroy.tools

Typing SVG

Telescope About Destroylist Light Bulb

Live data collection began on July 1, 2025

Destroylist is a powerful tool against phishing and scams, powered by PhishDestroy. It provides reliable intel for:

  • Check Mark Button Firewalls
  • Check Mark Button DNS resolvers
  • Check Mark Button Threat platforms
  • Check Mark Button Security research

Protect the web, one domain at a time!

Man Teacher Quick Integration

Python

import requests
blocklist = requests.get('https://raw.githubusercontent.com/phishdestroy/destroylist/main/list.json').json()
is_malicious = "suspicious-domain.com" in blocklist

Bash

curl -s https://raw.githubusercontent.com/phishdestroy/destroylist/main/list.txt | grep -q "suspicious-domain.com" && echo "BLOCKED"

DNS Blocklist (Pi-hole/AdGuard)

https://raw.githubusercontent.com/phishdestroy/destroylist/main/dns/active_domains.json

Man Police Officer Double Exclamation Mark Key Info for Online Fraud Victims Person Facepalming

Typing SVG

DestroyList Banner

BriefcaseDestroyList aims to disable malicious domains: scams, phishing, and other illicit sites to enhance internet safety.

Before a domain is added, we:

Magnifying Glass Tilted Right Scan it across cybersecurity platforms for threat intelligence.

Inbox Tray Send an official complaint to the registrar and the hosting provider (via WHOIS), including scan results, screenshots, and a request for client investigation. The complaint also notifies them about inclusion in our public database.

Police Car According to ICANN rules, registrars must review such complaints within 24 hours.


Typing SVG

T Rex We work hard to eliminate threats quickly. Every malicious domain is analyzed, documented, reported, and published transparently.
However, when a domain receives 1030+ abuse reports and a registrar still ignores them for months, the situation changes: the registrar is no longer a passive party. It effectively provides infrastructure for illegal activity.
Some registrars behave as if their internal policies somehow override ICANN requirements and national laws — as if phishing and fraud are "allowed" as long as they personally decide not to act.

Man Police Officer We document this publicly so that anyone can see: threats persist not because they were unnoticed, but because the responsible providers simply chose to do nothing.


Typing SVG

Requests from private individuals:

DestroyList is an open-source, non-commercial volunteer project.

Private individuals may request the number of abuse reports we have sent for a specific domain, but only through public channels:

Exclamation Mark We do not respond to private e-mail requests from individuals about report counts.
Check Mark Button This is a legal requirement for transparency and equal access to information.

Official government or law-enforcement requests may be answered privately.


Mending HeartIf you were defrauded by a domain already listed here, check its addition date using the commit history or via our Telegram/Mastodon channels.

Speech Balloon If the fraud happened after the domain was already listed, the registrar's or host's delay may indicate they share responsibility for the loss.
Future potential victims can also see this negligence documented publicly.

No One Under Eighteen Registrars and hosts that tolerate scam operations may reasonably be expected to assist victims or their legal representatives.

Typing SVG

Man Technologist Update Process Rocket

  • Magnifying Glass Tilted Left Gather: Continuous phishing domain collection via PhishDestroy system
  • Chains Verify: Cross-check with trusted threat intelligence sources
  • Outbox Tray Publish: Real-time push to GitHub + multi-channel alerts
  • Sponge Clean: DNS checks, deduplication, remove expired domains

Automation:

  • Laptop DNS verification every hour
  • Pencil Daily statistics tracking
  • Telescope Root domain extraction every 2 hours

Soccer Ball Goals & Usage Video Game

Typing SVG

Use Destroylist for:

  • Check Mark Network security systems
  • Check Mark Automation & monitoring
  • Check Mark Threat intelligence research
  • Check Mark Machine learning training

Open collaboration = Stronger security. Let's team up!

File Folder Historical Vault Classical Building

Typing SVG

Archive of 500,000+ domains over 5+ years. Ideal for:

  • Robot AI training
  • Microscope Research
  • Woman Zombie Trend analysis

Inbox Tray Contact us at phishdestroy.io for access!

Magic Wand Appeals Process Balance Scale

Wrongly listed? Fix it fast:

Accuracy first! Telescope

Newspaper License Memo

License

MIT Free, open, yours to hack!


Snake GIF

Handshake Join the Fight! Nail Polish

Got ideas, sources, or improvements?

  • Light Bulb Detection tweaks
  • Megaphone Integration tips
  • Magnifying Glass Tilted Right Fresh intel

Drop Issues/PRs let's crush phishing together! Flexed Biceps

Languages
HTML 67.5%
Python 32.5%