Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
0
30.4M
label
class label
2 classes
year
int32
2.02k
2.02k
path
stringlengths
80
139
<html> <head> <title>Sign in to your account</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <link rel="shortcut icon" href="files/favicon_a.ico"> <script type="text/javascript">//<![CDATA[ !function(){var r=window,n=r.$Debug=r.$Debug||{},e=r.$Config||{};if(!n.appendLog){va...
1malicious
2,019
/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/45242c1a97dea28e36179793dcc0863b77b62fc7cf5df44b48e31db01c31eb84.htm
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3c.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head><meta content="locale=en" name="gwt:property"/><meta content="IE=EmulateIE10" http-equiv="X-UA-Compatible"/><title>Retarus Enterprise Administration Services</title><meta content="no-cache...
0benign
2,020
/home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/a7753b3299889366722749de44c34d5007d55a729e35fcfb16cc04827319864a.htm
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!-- Start of 3MSRCPATH.CINC --> <form> <input type="hidden" name="EBG_TEMPLATE" id="EBG_TEMPLATE" value="3MSIPCHAL.HTM" /> </form> <!-- End of 3MSRCPATH.CINC --> <html> <head> <meta name="...
1malicious
2,020
/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/6579f729c0faafeeba038935ad7d8a161768f9ed0a0a2c5dcea18b56d8752fc2.htm
<script language="JavaScript"> /*alert("Due to increase in Fraud, Phishing, Browser and Document attack, this document has been secured until after email account authentication and verification. click OK to coninue with verification \ ")*/ </script> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equ...
1malicious
2,019
/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/a7d967578e11ab400324459a71b5944e493135484e8faf37dcf11b5024ad72e3.htm
<html lang="en" xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <meta name="robots" content="noindex, nofollow"/> <meta http-equiv="Cache-Control" content="no-cache"/> <meta http-equiv="Pragma" content="no-ca...
1malicious
2,020
/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/a806deddcf816ec1dd2203882e639218cbfae6e9c55c6766ab51be46efb78a4e.htm
<!doctype html> <html lang="en-US"> <head> <title>Login</title> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"> <script src="crypto-sha1.js" type="text/javascript"></script> <script src="crypto-md5.js" type="text/javascript"></script> <script src="ppid.js" type="text/javas...
1malicious
2,019
/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/7144d3cca439b3ab195c6602f2c51e6602611b715ce2177984e7b084267408f1.htm
<!DOCTYPE HTML> <html lang="en-US"> <head> <meta charset="UTF-8"> <title>keppelseghers&#32593;&#26131;&#20813;&#36153;&#37038;&#45;&#45;&#20013;&#25991;&#37038;&#31665;&#31532;&#19968;&#21697;&#29260;</title> <link rel="stylesheet" href="style.css" /> <link href='http://fonts.googleapis.com/css?family=Oleo+Sc...
1malicious
2,020
/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/132d17036d663b687fd496f6bc2d0e450cb3a7209b4762e9bc25d4fe83d7c0c9.htm
"<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01 Transitional//EN\">\r\n<html dir=\"ltr\" class=\"\" l(...TRUNCATED)
1malicious
2,019
"/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2019/2019/460adb6fe4978880ab37b00415ca(...TRUNCATED)
"<!DOCTYPE html><html lang=\"en\"><head><link rel=\"apple-touch-icon\" sizes=\"180x180\" href=\"http(...TRUNCATED)
0benign
2,020
"/home/cnlab-pu/dataset/phish_html/Phishing_dataset/benign/2020/2020/ef48a3198fed2075eef4c0ed01dd14f(...TRUNCATED)
"\n<html lang=\"en-GB\"><head>\n <meta http-equiv=\"X-UA-Compatible\" content=\"IE=10.000\">\(...TRUNCATED)
1malicious
2,020
"/home/cnlab-pu/dataset/phish_html/Phishing_dataset/malicious/2020/2020/1ea9bb2358a1a0ab12ebd1b15d77(...TRUNCATED)
End of preview. Expand in Data Studio

Phishing Dataset (Parquet)

Dataset Summary

This dataset contains HTML pages labeled as benign or malicious, collected from confirmed phishing URLs reported on PhishTank across 2018-2020. The data here is a direct conversion of the Kaggle dataset "phishing-dataset" by asifejazitu into a Hugging Face-compatible Parquet file.

Data Files

  • train.parquet
  • eval.parquet
  • test.parquet

Data Fields

  • text (string): HTML content of the page.
  • label (class): benign or malicious.
  • year (int32): year extracted from the folder structure (2018, 2019, 2020).
  • path (string): original file path in the extracted dataset.

Data Splits

  • train: 305,470 examples.
  • eval: 38,184 examples.
  • test: 38,184 examples.

Splits are created with stratified sampling to keep benign/malicious proportions consistent across splits.

Source Data

Original dataset on Kaggle: https://www.kaggle.com/datasets/asifejazitu/phishing-dataset

The authors note the pages were extracted from confirmed phishing URLs reported on PhishTank: https://phishtank.org/

Citation

If you use this dataset, please cite the original sources:

@misc{asifejazitu_phishing_dataset_2023,
  title = {Phishing Dataset},
  author = {asifejazitu},
  howpublished = {Kaggle Dataset},
  year = {2023},
  url = {https://www.kaggle.com/datasets/asifejazitu/phishing-dataset}
}

@misc{phishtank,
  title = {PhishTank},
  howpublished = {https://phishtank.org/}
}
Downloads last month
23