Web Risk overview
An introduction to Web Risk.
Set up a local database and perform an initial download of the lists you want to work with.
Specify size constraints when updating local databases.
Use the Lookup API and the Update API to create and maintain a local cache of threat data.
Use compression to reduces bandwidth requirements, which is particularly, but not exclusively, relevant for mobile devices.
Explore how the Update API imposes time intervals for how often a client can send requests to the Web Risk server to perform URL checks or to update the local database.
Learn about how Web Risk lists, also referred to as threat lists or simply lists, are Google's constantly updated lists of unsafe web resources.
Learn about the HTTP status codes the server can generate in response to a request.
Learn how to warn users about potential risks.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.