Dataset Viewer
Auto-converted to Parquet Duplicate
url
string
label
int64
client_id
int64
dbpedia-spotlight.github.io
0
0
rt.com/in-vision/orthodox-easter-celebrations-world/greek-orthodox-easter-celebration/
0
0
salazarbaja.top
1
0
www.mail.bofaemcom.club/emcom/96534292441da44/email.php
1
0
russell01.servebeer.com/
1
0
pypi.python.org
0
0
https://bonusmelia.com/userfiles/admin/TT/Dropbox.html
1
0
althistory.wikia.com/wiki/Joan_of_Arc_Beaten
0
0
https://afaffuedge8.top/jp
1
0
http://www.smdc.coaoeaserma.kiawjf.top/
1
0
vdcfy.buncjbu.cn/
1
0
www.parasoft.com/products/wizard/index.htm
0
0
tools.ietf.org/html/rfc2765
0
0
docomo.ne.eyjp.xyz/
1
0
facebook.com/alden.penner
0
0
wn.com/Alameda_County_Sheriff's_Office
0
0
ku-coin.club/
1
0
http://epitisgis.gr/wp-content/themes/twentysixteen/erasingin/myaccount/s=
1
0
www.rederemunerada.com?user=12689&amp=3Bemailconv=igorrgt@hotmail.com
1
0
ranjau88.heliohost.org
1
0
mylife.com/wallypingel
0
0
code.google.com/chromium/
0
0
drmoloi.co.za
1
0
merlonon.firebaseapp.com/
1
0
judgepedia.org/index.php/Jay_Bybee
0
0
harperteen.com/books/Pop-Gordon-Korman/
0
0
citizendia.org/Comedy_films_of_the_1950s
0
0
www.epinions.com/cmsw-ISP-All-AOL
0
0
css3pie.com
0
0
bakunin.bignose.org/s.php?search_term=r&fst=A
0
0
211.174.59.246/Template/ib/?submit
1
0
www2003.org/cdrom/papers/refereed/p007/p7-abiteboul.html
0
0
amazon.com/Lust-Caution-Score-Alexandre-Desplat/dp/B000V9KEE2
0
0
yellowpages.ca/bus/Quebec/Quebec/Communauto/2197058.html
0
0
https://jaoesjdnlv.duckdns.org
1
0
imleagues.com
0
0
rusembassy.ca/node/60
0
0
ueihuxcgcg.duckdns.org/ja/main
1
0
imvunge.com
1
0
song-list.net/cocoatea/songs
0
0
www.freewebs.com/haithwin_weyr/
0
0
spoke.com/info/pB9KEZR/RayneBuell
0
0
http://zvwrgijyst.duckdns.org/
1
0
www.svastika.org/online.vodafone.htm
1
0
houthandel-jdeboer.nl
0
0
www.saaaaaecscesoe.saccasaacaaeaaseca.lsksodi.icu/is.php
1
0
d-designz.com
1
0
youtube.com/watch?v=Rf8PUdEDyLQ
0
0
crashtide.com/wp-content/plugins/FANSMI/
1
0
www.mistoreomb-jp.top/
1
0
yqhcfqkqvq.duckdns.org/
1
0
drmimi.org/
0
0
https://zwgtrqjiac.duckdns.org
1
0
sheratonalingheaphotel.info/tafa4life
1
0
wn.com/Texas_Cake
0
0
facebook.com/joshgana
0
0
evri.com/person/edward-bunker-0x1e3c6
0
0
https://en.wikipedia.org/wiki/Port_of_Spain
0
0
https://www2.mstonrcui.icu/
1
0
http://kiarmedical.com/ckfinder/userfiles/interlan/index.html
1
0
spiritshop.com/school/ohio/lima/shawnee_high_school-169124.aspx
0
0
ergeb.com/
1
0
kotapermai.com.my/wp-content/gallery/awards/error_login.html
1
0
success-financial.com
1
0
http://www.acaeesneen.asaeaasnean.kqhhdq.top/
1
0
http://www.americvnexpress-verify.top/
1
0
qrs.ly/mtdemhi
1
0
agencebp09.firebaseapp.com/
1
0
https://japaneseama.yoshiimi.shop/
1
0
en.wikipedia.org/wiki/Agence_universitaire_de_la_francophonie
0
0
maumeevp.org/ca/cd/cd/index.php
1
0
youtube.com/watch?v=t-eOmq5X-0s
0
0
https://60226thssxj.hslfl.cn/
1
0
wordiq.com/definition/Garret_Hobart
0
0
link.pub
1
0
amazom.orofgj.shop/pc/
1
0
https://www.etc-check-b.2pfi.info/
1
0
auoneo-jp.aenastexk.cn
1
0
eveilaction.org/catalog/info3.php
1
0
npkogneprom.ru/_js/jstree/themes/applcompte4uk/aecaf43c32f246de0ff13ff5e4aee3cc/step/ap
1
0
reserves-naturelles.org
0
0
stcp.pt
0
0
ntxe-news.com/artman/publish/article_72812.shtml
0
0
http://amaznoeom.com
1
0
mp3.com/artist/Saafir
0
0
fanpix.net/gallery/lester-young-pictures.htm
0
0
inlogin.hut2.ru/login.allergo.index.htm
1
0
zeus-publications.com/lets_add_a_little_oil_to_the_fire.htm
0
0
linkedin.com/company/edmund-optics
0
0
beaniary.expert/0B8cdyi0vu75abTY0cXlsUmVEdTA/momo/
1
0
https://plxztjvkzl.duckdns.org
1
0
terraillon.com
0
0
http://www.tabago.pl/articles/portail__free/log.in/moncompte/
1
0
guitar.about.com/library/weekly/aa101000a.htm
0
0
www.cekolie.amazon.q-d8.top/
1
0
eki-dsgfjhkj.onedumb.com/
1
0
2bict.net.ru
1
0
invaluable.com/artist/chardin-gabriel-gervais-bw9mrc9bbt
0
0
151.80.207.170/upload/_dispatch
1
0
https://app-aloalmio1.top/
1
0
End of preview. Expand in Data Studio

Dataset Card for Federated Phishing URLs

Dataset Summary

This dataset is a federated, non-IID phishing URL classification benchmark derived from two public Hugging Face datasets:

The resulting dataset contains URL strings, binary phishing labels, and a client_id field assigning each example to one of 100 simulated clients. Client assignment is performed before train/test splitting, so both global splits preserve per-client membership.

The dataset is intended for federated learning and non-IID robustness experiments in phishing URL detection.

Note: You may see a warning that one or more dataset files were scanned as unsafe. This is expected for a dataset containing phishing URLs. The warning reflects the presence of malicious or suspicious URL strings in the data and does not mean that the dataset files themselves are unsafe to download or use for research. Avoid opening URLs directly, and process them in a safe environment.

Dataset Structure

Data Instances

Each example has the following fields:

{
  "url": "www.example.com/login",
  "label": 0,
  "client_id": 17
}

Data Fields

Field Type Description
url string Raw URL text from the source datasets.
label int64 Binary classification label. 1 indicates phishing or malicious; 0 indicates benign or legitimate.
client_id int64 Simulated federated client identifier. Values range from 0 to 99 by default.

Splits

Split Description
train Concatenation of each client’s local training partition.
test Concatenation of each client’s local held-out test partition.

The default generation script uses a per-client test size of 0.1, producing approximately 90% train and 10% test data for each client.

Dataset Creation

Source Data

This dataset merges URL classification samples from:

  1. ealvaradob/phishing-dataset

    • The export script downloads urls.json directly from the dataset repository.
    • The source dataset describes labels as 1 for phishing and 0 for benign.
  2. kmack/Phishing_urls

    • The export script loads train+test+valid from the Hugging Face dataset.
    • The source dataset uses columns text and label; text is converted into the url field in this derived dataset.

Preprocessing

The generation script performs the following preprocessing steps:

  1. Loads both source datasets.
  2. Merges all URL strings and labels.
  3. Deduplicates examples by a normalized byte representation of each URL:
    • lowercases the URL,
    • decodes percent-encoded byte sequences,
    • compares URLs by the resulting byte string.
  4. Extracts a coarse feature bucket for each URL, such as:
    • ip_host,
    • shortener,
    • suspicious_tld,
    • query_heavy,
    • deep_subdomain,
    • very_long,
    • digit_heavy,
    • symbol_heavy,
    • randomish_host,
    • standard.
  5. Allocates examples to clients using a non-IID client-first procedure.
  6. Splits each client’s local data into train and test partitions.
  7. Concatenates all local train partitions into the global train split and all local test partitions into the global test split.

Federated Partitioning

The default configuration creates 100 simulated clients with both quantity skew and distribution skew.

Quantity Skew

Client sizes are sampled from a log-normal distribution with a minimum client size. The default parameters are:

Parameter Default
num_clients 100
min_client_size 50
size_sigma 1.0

Label Skew

Each client receives a different phishing prevalence tendency sampled from a beta distribution. The default label skew parameter is:

Parameter Default
label_alpha 0.5

Lower values of label_alpha produce stronger label imbalance across clients.

Feature Skew

Each client is assigned preferences over URL feature buckets. During allocation, examples are assigned based on client capacity, label preference, and feature preference. The default feature-skew parameters are:

Parameter Default
feature_temperature 0.35
preferred_features_per_client 3

This makes some clients more likely to contain certain URL patterns, such as shorteners, suspicious TLDs, deep subdomains, or query-heavy URLs.

Intended Uses

This dataset is suitable for:

  • federated binary classification,
  • cross-client generalization studies,
  • non-IID robustness benchmarking,
  • phishing URL detection,
  • cybersecurity model evaluation,
  • client-level distribution shift analysis.

Out-of-Scope Uses

This dataset should not be used to:

  • identify or accuse real users or organizations of phishing activity,
  • make high-stakes security decisions without additional validation,
  • crawl, visit, or interact with URLs directly,
  • deploy a production phishing detector without current threat-intelligence evaluation.

URLs may be stale, inactive, benignly repurposed, or no longer representative of current phishing behavior.

Data Splitting

The dataset uses a client-first splitting strategy:

  1. Assign each deduplicated URL to a simulated client.
  2. Split each client’s local data into train/test.
  3. Concatenate local partitions into global splits.

This avoids leakage where a client appears only in one split and ensures every split keeps client identifiers available for federated evaluation.

When possible, each client’s local train/test split is stratified by the binary label. If a client has too few samples from one class, the script falls back to a random split for that client.

Loading the Dataset

from datasets import load_dataset

ds = load_dataset("flwrlabs/fed-phishing-urls")
print(ds)
print(ds["train"][0])

A simple per-client subset can be selected with:

from flwr_datasets import FederatedDataset
from flwr_datasets.partitioner import NaturalIdPartitioner

fds = FederatedDataset(
    dataset="flwrlabs/fed-phishing-urls",
    partitioners={"train": NaturalIdPartitioner(partition_by="client_id")},
)
partition = fds.load_partition(partition_id=0)

Label Semantics

Label Meaning
0 Benign / legitimate URL
1 Phishing / malicious URL

The label semantics follow the upstream phishing URL datasets.

Limitations

  • The dataset is derived from public URL datasets and may include outdated or inactive URLs.
  • Labels reflect the upstream datasets and may contain noise.
  • Feature buckets are heuristic and intended only for partitioning; they are not included as dataset columns.
  • URL distributions and phishing tactics change over time, so results on this dataset may not reflect current real-world detection performance.

Ethical Considerations

This dataset contains URLs associated with phishing and malicious activity. Users should avoid visiting URLs directly and should process the data in a safe, sandboxed environment. The dataset is intended for research and benchmarking, not for direct operational threat blocking without further validation.

Citation

Please cite the upstream datasets when using this derived dataset. If you're using this dataset with Flower Datasets, you can cite Flower.

@misc{alvarado_phishing_dataset,
  author = {Alvarado, E.},
  title  = {{Phishing Dataset}},
  year   = {n.d.},
  url    = {https://huggingface.co/datasets/ealvaradob/phishing-dataset}
}
@misc{kmack_phishing_urls,
  author = {kmack},
  title  = {{Phishing URLs Dataset}},
  year   = {2024},
  url    = {https://huggingface.co/datasets/kmack/Phishing_urls}
}
@article{DBLP:journals/corr/abs-2007-14390,
  author       = {Daniel J. Beutel and
                  Taner Topal and
                  Akhil Mathur and
                  Xinchi Qiu and
                  Titouan Parcollet and
                  Nicholas D. Lane},
  title        = {Flower: {A} Friendly Federated Learning Research Framework},
  journal      = {CoRR},
  volume       = {abs/2007.14390},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.14390},
  eprinttype    = {arXiv},
  eprint       = {2007.14390},
  timestamp    = {Mon, 03 Aug 2020 14:32:13 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-14390.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Dataset Card Contact

In case of any doubts, please contact Flower Labs.

Downloads last month
36

Paper for flwrlabs/fed-phishing-urls