Safe Browsing API
Stay organized with collections
Save and categorize content based on your preferences.
Enables client applications to check web resources (most commonly URLs) against Google-generated lists of unsafe web resources. The Safe Browsing APIs are for non-commercial use only. If you need to use APIs to detect malicious URLs for commercial purposes – meaning “for sale or revenue-generating purposes” – please refer to the Web Risk API.
Service: safebrowsing.googleapis.com
The Service name safebrowsing.googleapis.com
is needed to create RPC client stubs.
Methods |
SearchHashes
|
Search for full hashes matching the specified prefixes. |
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2024-09-18 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-09-18 UTC."],[[["The Safe Browsing APIs enable client applications to cross-reference web resources, primarily URLs, against Google's lists of unsafe web resources for non-commercial use only."],["For commercial purposes, including \"for sale or revenue-generating purposes,\" the Web Risk API should be used instead of the Safe Browsing APIs."],["Developers need the service name `safebrowsing.googleapis.com` for creating RPC client stubs when interacting with the API."],["The Safe Browsing APIs offer various functionalities such as fetching threat list updates, finding full hashes and threat matches, listing available threat lists, searching for specific hashes, and managing hash lists."]]],[]]