search
Check URLs against a malicious database to identify security threats and analyze potential risks for enhanced protection.
Instructions
Search by url
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Example value: google.com |