pip install nullcone or add the Claude Code plugin.
Every command checked against 658K+ threat signatures. Malicious IPs,
prompt injections, AI skill attacks — blocked before they execute. Free forever.
658K+
Threats Blocked
549
Malware Families
0ms
Config Required
$0
Forever
No signup. No API key. No config files. Use the Python SDK in any project, or add the Claude Code plugin for automatic protection.
You install
pip install, Claude Code plugin, or hit the REST API directly. Works everywhere Python runs.
It checks everything
IPs, domains, URLs, hashes — checked against 658K+ signatures. Clean indicators pass instantly. Threats get flagged.
Threats get blocked
Known-malicious indicators blocked with full context. Prompt injections detected. Your agents and scripts stay safe.
This is what happens when an agent or script tries to reach a known command-and-control IP. No setup required — Nullcone catches it automatically.
ClawHavoc — 341 malicious AI skills distributing macOS backdoors via SKILL.md injection. Discovered and indexed by Nullcone.
Commands without IPs, domains, or URLs pass through with zero latency. Safe domains (github.com, pypi.org, etc.) are allowlisted — no lookup needed.
When a file contains prompt injection patterns, Nullcone blocks the write:
When a query contains known IOCs, Nullcone enriches with threat context:
Nullcone isn't a database you query. It's a security layer that lives inside your agents, scripts, and workflows. Every install — pip, plugin, or API — makes the network stronger.
The Flywheel
Developers and agents install
pip, plugin, or API. Free. Automatic protection.
Every session generates signal
Blocked threats, new patterns, edge-case detections.
The network gets stronger
More installs = more sensors = better protection for everyone.
Every IP, domain, URL, and hash in every command — checked before execution.
Every URL and domain verified against the threat database before any request is made.
Content scanned for prompt injection patterns and embedded malicious IOCs.
Injection attempts detected. Known IOCs enriched with threat context automatically.
CrowdStrike and Recorded Future don't have a schema for PROMPT or SKILL IOC types. We do. We discovered the ClawHavoc campaign (341 malicious AI skills) and the auramaxx npm trojan. Traditional TI platforms can't even ingest these indicators — they have no field for them.
Nullcone covers the full spectrum: IPs, domains, URLs, hashes, CVEs, JA3 fingerprints, YARA rules — plus prompt injection payloads and malicious MCP tool definitions that target the AI agents themselves.
Same protection, same network. Every platform we add is another layer of sensors feeding signal back to the collective.
Use in any script, agent, or pipeline. LangChain and smolagents integrations included.
pip install nullcone
Plugin with automatic hooks. Every Bash, WebFetch, Write, and Edit checked.
/plugin install nullcone@nullcone
Public API. IOC lookups free, no auth. Works from any language.
GET /api/v1/ioc?value=...
Stdio + SSE. Works with any MCP-compatible agent or IDE.
nullcone mcp serve
Every developer and agent running Nullcone is a sensor that makes the network stronger. That value flows back to institutions who need it most. We will never charge the edge.
Developers, agents, researchers
For security teams shipping with AI
For SOCs, MSSPs, and regulated industries
The free tier is not a trial. It's permanent. Developers and agents running Nullcone are the network — they generate the signal that makes enterprise protection valuable. We will never charge the people who make the network work.
Base URL: https://nullcone.ai/api/v1
All read endpoints are free and unauthenticated. Write endpoints need an API key — request one free.
Point lookup by exact IOC value. Returns full signature with severity, family, confidence, tags, and detection count. Returns 404 if not known. No auth required.
Live counts. No auth required.
Filter by severity, confidence, IOC type. Supports delta sync via last_id param.
Submit an IOC. Deduplicates atomically. Re-submitting increments detection count. Requires API key (free).
All IOCs for a malware family. E.g. ClawHavoc, Emotet.
Full interactive docs at /api/docs (Swagger) and /api/redoc.