Phishing remains one of the most persistent threats facing organizations today. According to recent reports, phishing attacks account for over 80% of reported security incidents, with the average cost of a data breach reaching millions of dollars. The challenge isn’t just detecting phishing—it’s detecting it fast enough to protect your customers, your brand, and your bottom line.
The StalkPhish API provides security teams with programmatic access to a continuously updated database of phishing threats, complete with enriched metadata, threat intelligence, and advanced search capabilities. But what does that mean in practice?
Let’s explore eight concrete use cases where the StalkPhish.io API delivers measurable value.
Relevant endpoints: /search/brand/, /search/url/, /search/title/
Your brand is one of your most valuable assets—and cybercriminals know it. Brand impersonation attacks don’t just steal credentials; they erode customer trust and damage your reputation.
With StalkPhish, security teams can continuously monitor for unauthorized use of their brand across phishing infrastructure. By querying brand names, product names, and corporate keywords across URLs and page titles, you can identify impersonation campaigns before they reach your customers.
The temporal filters (last_hours, last_days) enable real-time alerting workflows. When a new phishing site targeting your brand appears, you can trigger immediate takedown procedures—often shutting down attacks within hours rather than days.
Example query:
curl -H "Authorization: Token YOUR_TOKEN" \ "https://api.stalkphish.io/api/v1/search/brand/YourBrand?last_hours=24"
Relevant endpoints: /search/url/, /search/ipv4/
Every minute an analyst spends manually researching a suspicious URL is a minute not spent on actual threats. The StalkPhish API integrates directly into your existing security stack—Splunk, QRadar, Elastic, Microsoft Sentinel—to automatically enrich indicators of compromise (IOCs).
When your detection rules flag a suspicious URL or IP address, the API instantly returns context: ASN information, targeted brand, kit family, and historical sightings. This transforms a generic alert into actionable intelligence.
The result? Analysts can triage alerts in seconds instead of minutes, focusing their expertise on incidents that truly require human judgment.
Integration benefit: Reduce mean time to qualification (MTTQ) from 5+ minutes to under 30 seconds per alert.
Relevant endpoints: /search/ipv4/, /search/favicon/, /search/zipfilehash/
Threat actors rarely operate in isolation. A single phishing domain is often part of a larger infrastructure—multiple domains sharing the same IP, the same favicon, the same domain or the same phishing kit.
StalkPhish enables threat hunters to pivot across these technical indicators:
This approach transforms isolated indicators into comprehensive infrastructure maps, revealing the full scope of an adversary’s operations.
Pro tip: Combine favicon hash searches with temporal filters to track how a threat actor’s infrastructure evolves over time.
Relevant endpoint: /search/telegram/
Modern phishing kits increasingly rely on Telegram bots and channels to exfiltrate stolen credentials in real time, or still use mailboxes. Unlike traditional email drops, Telegram provides attackers with instant notifications, easy automation, and perceived anonymity.
StalkPhish extracts Telegram bot usernames and channel references directly from phishing kits, creating a unique intelligence layer. Security teams can:
This capability is particularly valuable for financial institutions and e-commerce platforms where stolen credentials are monetized within minutes.
Example query:
curl -H "Authorization: Token YOUR_TOKEN" \ "https://api.stalkphish.io/api/v1/search/telegram/phish_bot?last_days=30"
Relevant endpoints: /search/url/, /search/title/, /last
Banks, payment processors, and online retailers face a constant stream of phishing attacks targeting their customers. The StalkPhish API enables proactive protection at multiple touchpoints:
The /last endpoint provides a real-time feed of newly detected phishing URLs, ensuring your defenses stay current against fast-moving campaigns.
Business impact: Reduce account takeover (ATO) fraud losses while demonstrating due diligence to regulators and auditors.
Relevant endpoints: /search/email/, /search/zipfilehash/
When a phishing attack succeeds, the investigation is just beginning. Understanding the full scope of a campaign is critical for incident response, victim notification, and potential legal action.
StalkPhish supports forensic investigations by enabling searches across:
This intelligence helps incident responders answer critical questions: How widespread was this campaign? Are there other victims we haven’t identified? What can we document for law enforcement?
Compliance benefit: Comprehensive forensic documentation supports regulatory reporting requirements and potential litigation.
Relevant endpoints: /last, all /search/* endpoints
Threat intelligence is most valuable when it’s shared, correlated, and actionable. The StalkPhish API enables automated ingestion into leading CTI platforms like OpenCTI, MISP, and ThreatConnect.
Connectors can periodically pull fresh phishing URLs along with enriched metadata—ASN, targeted brand, phishing score, kit family—to create structured threat objects (STIX, OpenIOC). This enables:
Integration example: A scheduled job queries /last every hour, creates STIX bundles, and pushes them to OpenCTI for correlation with existing intelligence.
Relevant endpoint: /search/url/
Fraud prevention isn’t just about blocking known bad actors—it’s about understanding the context of every transaction. The StalkPhish API adds a powerful signal to your risk scoring models.
When a user initiates a sensitive action (login, password reset, payment), your fraud engine can check whether the referring URL or any URLs in the user’s recent session are known phishing sites. The API’s phishing_score provides a normalized risk indicator that integrates directly into your scoring logic.
High-risk sessions can trigger additional friction—step-up authentication, transaction delays, or manual review—without blocking legitimate users.
Example workflow:
phishing_score: 85 and targeted_brand: YourBrandThe StalkPhish API offers flexible subscription tiers to match your use case:
| Tier | Daily Requests | Time Range | Best For |
|---|---|---|---|
| Free | 50 | 4 hours | Evaluation and testing |
| Starter | 150 | 3 days | Small security teams |
| Researcher | 300 | 14 days | Threat researchers |
| Standard | 1,000 | 30 days | SOC integration |
| Professional | 5,000 | 180 days | Enterprise and CTI platforms |
All tiers include URL, IP, and domain search. Higher tiers unlock additional capabilities: title search, email extraction, brand detection, Telegram intelligence, and favicon/kit hash correlation.
Phishing detection is no longer optional—it’s a core security capability. The StalkPhish API provides the building blocks for comprehensive anti-phishing operations: from real-time brand monitoring to deep forensic investigations, from SOC automation to customer protection.
The question isn’t whether you need phishing intelligence. It’s how quickly you can operationalize it.
Ready to get started? Create your free account and start exploring the API today. For enterprise integrations, contact our team to discuss your requirements.
StalkPhish.io is an advanced fraud, phishing, and brand impersonation detection platform helping organizations detect threats faster and protect what matters most.
Subscribe to get the latest posts sent to your email.