Threat intelligence solutions by ANY.RUN feature:
Threat Intelligence Lookup (TI Lookup), a solution for contextual browsing of threat intelligence. It provides access to a vast, continuously updated collection of Indicators of Compromise (IOCs), Indicators of Attack (IOAs), and behavior indicators (IOBs) derived from ANY.RUN’s Interactive Sandbox analyses. With over 40 search parameters, operators, and wildcards, it allows users to perform targeted lookups of threat intel gathered from investigations done by a global network of over 500,000 users and 15,000 organizations. Accompanied by YARA Search, it helps enrich indicators, improve detection rules, and as a result—speed up triage, threat hunting, and incident response.
Threat Intelligence Feeds (TI Feeds) offers a continuously updated database of IOCs, including malicious IPs, domains, URLs, file hashes enriched with contextual threat data. Designed for seamless integration with your security stack (e.g., SIEM, XDR, TIP systems by various vendors), TI Feeds enable SOC, MSSP, and DFIR teams to accelerate threat hunting, improve alert triage, and proactively defend against emerging attacks.
Product Website
Seller
ANY.RUNLanguages Supported
English
Product Description
ANY.RUN provides cybersecurity products to organizations and individual researchers that strengthen their ability to analyze, investigate, and understand emerging and evolving threats.
The company has a suite of Threat Intelligence Feeds, Threat Intelligence Lookup, and YARA Search.
Threat Intelligence Lookup is an online tool that lets users query IOCs against a large database.
The software provides context and actionable insights on events, IP addresses, domains, file hashes, URLs, and more, allowing you to quickly evaluate the risk of IOCs during incident response or cyber threat hunting.
A threat intelligence feed provides a near real-time stream of threat data from external sources. Organizations leverage these feeds to keep security defenses like SIEMs up-to-date against new attacks.
Keep your solutions up-to-date with the latest malicious IPs, URLs, and domains, available in JSON and STIX.
Overview by
Vlada Belousova