Filter By / Features
-
Domain Tools
DomainTools API can be leveraged in order to enrich SIEMs, investigate threats using threat intelligence platforms, akasd build playbooks with orchestration tools.
-
FarSight
Farsight DNSDB is a passive DNS historical database that provides a unique/fact-based,multifaceted view of the configuration of the global Internet infrastructure.
-
Anomali
Anomali ThreatStream Integrator is a software for integrating your existing security infrastructure to Anomali's ThreatStream platform (in the cloud) or to the on-premise ThreatStream Appliance.
-
Mx Tools
MXTools rolls up critical threat feeds from leading providers, into one seamless, easy-to-integrate, high-performance API.
-
Virus Total
VirusTotal, is an online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by antivirus engines and website scanners.
-
Threat Connect (Coming Soon)
Its premiere cyber threat intelligence platform allows global organizations to effectively manage the massive amounts of threat information that comes in daily.
-
Infoblox (Coming Soon)
Infoblox delivers actionable network intelligence details pertaining to DNS, DHCP, and IP address information.
-
Alien Vault OTX
OTX changed the way the intelligence community creates and consumes threat data. In OTX, anyone in the security community can contribute, discuss, research, validate, and share threat data.
-
Passive Total (Coming Soon)
PassiveTotal gives threat hunters access to internet data they need to help understand who their adversary is and what infrastructure they use to conduct their attacks.
-
Kaspersky
Kaspersky Threat Intelligence feeds deliver all the knowledge acquired by Kaspersky Lab about cyber-threats and their relationships, brought together into a single, powerful web service.
-
Slack
Slack is a place where teams come together to collaborate on their respective channels by exchanging isntant messages.
-
Shadow Dragon
MalNet by Shadow Dragon, brings together the industry’s most extensive malware threat information from Proofpoint ET Intelligence with Maltego link analysis capabilities from ShadowDragon.
-
Threat Stop (Coming Soon)
ThreatSTOP leverages it's comprehensive and authoritative database of IP addresses, domains and the network infrastructure used in cyberattacks to develop best-in-class threat intelligence.
-
VFeed
vFeed IO technology and engines transforms big data into correlated vulnerability and threat intelligence database and multi-formats feeds. vFeed solution is fully compliant and aligned with the open standards (CVE, CWE, OVAL, CAPEC and SCAP).
-
IBM X-Force (Coming Soon)
IBM X-Force Research is one of renowned commercial security research teams in the world. Security professionals monitor and analyze security issues from a variety of sources, providing threat intelligence content as the foundation of the IBM Security portfolio.
-
Webroot BrightCloud
BrightCloud Threat Intelligence Services unify access to the Webroot® Intelligence Network, including contextual data used to develop reputation scores for various objects such as URLs, IPs, mobile applications and files.
-
Avira (Coming Soon)
Avira’s Threat Intelligence feeds provide us with regulary updated file and URL reputation data, delivering the intelligence we need to build powerful and effective threat detection systems.
-
Zeus Tracker (Coming Soon)
ZeuS Tracker provides us the possibility to track ZeuS Command & Control servers and malicious hosts which are hosting ZeuS files around the world.
-
Mcafee EPO (Coming Soon)
McAfee ePO is a key component of the McAfee security management platform. It provides unified management of endpoint, network, and data security.
-
Fortinet (Coming Soon)
Fortinet researchers work with world class, in-house developed tools and technology to discover and study breaking threats. They then update FortiGuard security services to protect against those threats.
-
DangerRulez
DangerRulez provides a list of IP addresses which are known bad actors using brute force attacks.
-
Active Directory
Active Directory is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services.
-
MySQL (Coming Soon)
MySQL is an open-source relational database management system.
-
PostgreSQL (Coming Soon)
PostgreSQL is a powerful, open source object-relational database system that uses and extends the SQL language combined with many features that safely store and scale the most complicated data workloads.
-
ClickSend
ClickSend is a cloud-based service that lets you send and receive SMS, Email, Voice, Fax and Letters worldwide.
-
Ransomware Tracker
Ransomware Tracker tracks and monitors the status of domain names, IP addresses and URLs that are associated with Ransomware, such as Botnet servers, distribution sites and payment sites.
-
SSL Blacklist
SSL Blacklist (SSLBL) is a project maintained by abuse.ch. The goal is to provide a list of "bad" SSL certificates identified by abuse.ch which are associated with malware or botnet activities. SSLBL relies on SHA1 fingerprints of malicious SSL certificates and IPs associated with these.
-
Malware Domains
The DNS-BH project creates and maintains a listing of domains that are known to propagate malware and spyware.
-
Malware Domain List
Malware Domain List is a non-commercial community project and provides intel feeds on known bad actors which are involved in malware distribution.
-
NoThink
NoThink is known for honeypot statistics, data and others stuff about malware and network security.
-
BlockList
It is a free and voluntary service provided by a Fraud/Abuse-specialist, whose servers are often attacked via SSH-, Mail-Login-, FTP-, Webserver- and other services. The idea is to report any and all attacks to the respective abuse departments of the infected PCs/servers.
-
Feodo Tracker
Feodo (also known as Cridex or Bugat) is a Trojan used to commit ebanking fraud and steal sensitive information from the victims computer, such as credit card details or credentials. The feeds from Feodo tracker helps us track known bad actors hosting or distributing such malware.
-
Binary Defense Systems
This feed contains Binary Defense Systems Artillery Threat Intelligence feed and banlist feed. Using this information we can detect what the list maintainers do, get an idea of the list trend and its maintainers habbits.
-
Dan
Dan provides a list of IP addresses which can be used to create a Tor ban list.
-
NormShield
NormShield provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence and vulnerability management.
-
Green Snow
GreenSnow provides a list of IP addressess from around the world which are known bad actors. GreenSnow is comparable with SpamHaus.org for attacks of any kind except for spam.
-
Bambenek Consulting
Bambenek Consulting is an cybersecurity investigations and intelligence consulting firm which focuses on tackling major criminal threats.
Request a Demo
See what makes us different. Book a personalized demo and see DNIF in action.