Integrate Evil-DB threat intelligence into your applications. All endpoints return JSON unless otherwise specified.
Most endpoints work without authentication but have rate limits. For higher limits and full access, include your API key:
X-API-Key: your_api_key?key=your_api_keyGet your API key from the Dashboard.
Select an endpoint from the sidebar to view details
| Tier | Lookups/day | Requests/min | Export |
|---|---|---|---|
| Anonymous | 50 | 10 | No |
| Free | 100 | 30 | No |
| Pro | 10,000 | 100 | Yes |
| Enterprise | Unlimited | 1,000 | Yes |