Cyberthint Threat Database Feed

You can easily integrate Cyberthint's threat database with your security products (ex. firewall) via API to provide proactive defense.

IP addresses and domains/URLs which are acting as C2, performing various attacks, hosting/distributing malware, are presented to you instantly. This includes malware hashes, phishings and APT groups. Most importantly, these feeds are actionable intelligence!

Types of actionable intelligence include:

  • Malicious Domain IOCs
  • Malicious URL IOCs
  • Malicious IP IOCs
  • Malicious Hash IOCs

Product information

Starting from:

$100

Highlights

  • Actionable Intelligence
  • Easy Integration
  • Powerful API
  • Qualified IOCs