Products

Products

iThreat offers two comprehensive subscription-based tools for managing threat intelligence:

CyberTOOLBELT

The Complete Set of Internet Tools Trusted by Corporate Investigators, Law Enforcement and Legal Professionals

Our patented technology helps find the information you need, so you can act quickly and confidently. Use CyberTOOLBELT for cybercrime and digital investigations, fraud prevention, legal research and due diligence, brand protection, and more. CyberTOOLBELT puts billions of data points at your fingertips. Customers can use our API to perform automated analysis and feed big data applications for their own backends. CyberTOOLBELT employs high volumes of near-real-time proprietary threat data directly tied to Internet infrastructure, abuse, global events and more to assist in blocking, filtering and preventing interaction with untrusted or dangerous websites, IP addresses and criminal-crafted and owned platforms, including on the deep and dark web.

Learn more at: https://www.cybertoolbelt.com

DNS Threat Data

JUST NEED DATA? OUR PREDICTIVE AND PRESCRIPTIVE DATA ENHANCES YOUR THREAT AWARENESS

iThreat has created one of the largest evolving dynamic data sets in the industry to deliver comprehensive predictive and prescriptive threat intelligence on bad actors and methods. Data is provided in near-real time, allowing almost instantaneous awareness of changes in badness, well before other solutions available today. iThreat data is uniquely targeted and enriched, including historical lookback and evolutionary information, and is directly tied to Internet infrastructure, assisting organizations to block, filter and prevent interaction with untrusted or dangerous websites, IP addresses, and criminal-crafted and owned platforms.

OUR PROPRIETARY INDUSTRY-LEADING DATA ENRICHMENT PROCESS

iThreat data is refined to extract and highlight specific proper names, events, terms or nomenclature associated with your organization. Output is then enhanced by a proprietary processes used to gather, improve and enumerate large volumes of data, which is not available anywhere else on the market. Then it is delivered via API to the customer. Our data is utilized by Fortune 500 companies for the following investigation, analysis and awareness targets:

  • Phishing, spam and malware prevention
  • Mail filter/blocklist support
  • Infrastructure filtering (ISP/C.E.R.T.)
  • Corporate network defense
  • Network security
  • Financial transaction monitoring
  • Fraud detection
  • Fraud prevention
  • Bad Actors
  • Malicious Activity/Intent
  • Enriched & Structured RDS data
  • Reported Badness Indicators
  • Ties to untrusted nation-states
  • Ties to Dark Infrastructure
  • Hacker Forums & Haunts
  • Hate Groups
  • Organized Crime
  • Ecommerce
  • Intellectual Property Theft
  • Botnet/Botnet C&C
  • IP addresses
  • Domains
  • Subdomains