The developer community grasped the opportunity to experiment with the Spamhaus Intelligence API beta release with open arms.  This got us thinking... what about offering up our datasets to developers on a more permanent basis?  What about a Spamhaus Developer License?

Supporting the internet community

Spamhaus believes in making the internet a safer place. The wider access there is to the latest IP and reputation data, the better.

We manage the free Data Query Service (DQS), on behalf of The Spamhaus Project, for this very reason. The DQS provides small-scale users with access to DNS Blocklists free of charge, 24/7.

We also provide the free DNSF Firewall Threat Feeds to protect against the worst of the worst threats for those running their DNS infrastructure. Last but not least, there’s free access to Passive DNS for users wanting to check historical DNS records on an occasional basis.

But we wanted to take this community spirit a step further; to encourage and support the development of applications and solutions using the wide range of threat intelligence data we have available.

The Spamhaus Developer License

We’re aware that it can take time to find the right use case and build the right application to meet its needs.  So, we’ve created a license to give developers access to the data without the 30-day time limit attached to a trial. The developer license runs for six-month periods.

There’s also a dedicated dev community, connecting like-mind developers to share ideas, challenges and issues.  We hope this community will support its members through builds, share use cases, and feedback on the data, so we can keep improving it.

For those who want to stress test a solution and require additional query volumes for a limited testing time, please reach out to us.  Where possible, we’re here to support your requirements.

The Developer License is currently only available for the Spamhaus Intelligence API (SIA). Still, in the not-too-distant future, we hope to be sharing additional products and datasets to enable developers to experiment with all our datasets and see what challenges they can address.

The Spamhaus Intelligence API

SIA provides simple access to our enhanced datasets.  This makes it easy to integrate into threat intelligence platforms, automate reporting, along with many other applications.

Companies, such as Red Sift Open Cloud, are already reaping the benefits from the increased intelligence that SIA’s metadata supplies. SIA has given them a competitive advantage, enabling them to deliver immediate insight to their customers, “saving them weeks of work.”  Read more about this use case here.

How to apply for a Developer License.

Fill in the form on our Developer License page.  Once you’ve verified your email address, an account is created for you in our Customer Portal, along with access to SIA. It’s that simple.

Related products

Spamhaus Intelligence API (SIA)

This API provides access to metadata relating to IP addresses exhibiting compromised behavior, including malware, worm and trojan infections, and SMTP-specific traffic emitting spam.

The breadth of data available via an easily consumable API provides security developers with scores of opportunities.

  • Save valuable time investigating and reporting
  • Simple and quick to access
  • Data you can trust in


Using OMI on Microsoft Azure? Here’s an update you need to read

28 September 2021


An easy-to-exploit security vulnerability that allows remote code execution (RCE) on virtual machines where Open Management Infrastructure (OMI) is installed has been observed. Users need to take action.

A new dataset is available via the Spamhaus Intelligence API

30 June 2021


Spamhaus has released the extended CSS Blocklist (CSS) and made it available via our API service. This provides users with additional insights relating to compromised and malicious IP addresses.

Spamhaus Botnet Threat Update, Q1 2021

15 April 2021


After a quiet(ish) end to 2020 in Spamhaus' botnet world, the first quarter of this year kicked off in style. The major news surrounded the takedown of the Emotet botnet in January. Nonetheless, as one malware departs, others arrive on the scene, as proved by the 24% increase in the total number of botnet C&Cs Spamhaus researchers observed.