Threater Marketplace logo

Connect best-in-class cyber intelligence and services to elevate your security stack

Utilize the Threater Marketplace

With one click, you can add cyber intelligence feeds and Enforce them in your network

Learn how Threater can help manage and resolve threats in your network.

Further protect your network with access to premium cyber intelligence integrations.

Premium Integrations

Commercial
Bambenek Consulting logo
Commercial
Bambenek Consulting logo
Bambenek Consulting
Well-Fed Threat Intelligence is produced by Bambenek Consulting, LTD. Bambenek is a leading cybersecurity threat intelligence and data science firm led by industry veteran John Bambenek. Bambenek’s Well-Fed Intelligence products are used by thousands of organizations all over the world to better protect themselves from cyber threats.
Commercial
Cyjax logo
Commercial
Cyjax logo
Cyjax
Cyjax’s mission is to be the preeminent supplier of threat intelligence for enterprises, SMEs and governments around the world. Established in 2012, Cyjax has built a reputation for producing world-class cyber threat intelligence across a broad range of sectors.
Commercial
Transparent DomainTools logo
Commercial
Transparent DomainTools logo
DomainTools
DomainTools is a leader in domain name and DNS-based cyber threat intelligence. Threater offers a Domain Hotlist and IP Hotlist powered by DomainTools. These lists protects users from phishing, malware, and spam threats.
Commercial
Small Malware Patrol Logo
Commercial
Small Malware Patrol Logo
Malware Patrol
Malware Patrol specializes in real-time threat intelligence that protects enterprise users and valuable assets. The highly refined and continuously updated indicators identify malware/ransomware samples and distribution points, command and control (C2) servers, phishing sites, DGAs, crypto-miners and other threats.
Commercial
Proofpoint logo
Commercial
Proofpoint logo
Proofpoint
A premium threat feed provided by Proofpoint ET Intelligence, the industry’s most timely and accurate source of threat intelligence. Dedicated threat researchers and analytics systems at Proofpoint ET Labs provide 100% originally sourced threat intelligence on malware delivery, command and control, botnets, credential phishing, ransomware and coin-mining, attack spread and exploit kits.
Commercial
Webroot logo
Commercial
Webroot logo
Webroot
Webroot’s BrightCloud IP Reputation Service is powered by the Webroot® Platform, which uses a big data architecture to provide the most comprehensive and accurate threat intelligence available today, including up-to-the-minute intelligence on millions of emerging threats.This intelligence is used to block traffic from TOR nodes, proxies, botnets, and other malicious actors.
Threat Intel Platforms
Bitdefender logo
Threat Intel Platforms
Bitdefender logo
Bitdefender
Better protect your network from Advanced Persistent Threats (APTs), command-and-control servers, malware and phishing. Bitdefender Advanced Threat Intelligence automatically updates in the Threater platform ensuring protection is always current.
Open Source
Open Source
GreyNoise
GreyNoise is the source for understanding internet noise, helping security analysts reduce noisy alerts and discover emerging threats.

Free Intelligence Integrations

Open Source
Free
BlockList logo
Open Source
Free
BlockList logo
Blocklist.de
Blocklist.de is an open source threat feed that is based on data from servers that are often attacked via SSH-, Mail-Login-, FTP-, Webserver- and other services. Blocklist.de sees more than 70,000 attacks every 12 hours in real time.
Open Source
Free
CINS army logo
Open Source
Free
CINS army logo
CINS Army
The CINS Army List is a subset of the CINS Active Threat Intelligence and is based on activity from Sentinel IPS customers. It consists of IP addresses that have poor scores and have not yet been identified by the cybersecurity community as being malicious.
Open Source
Free
Emerging Threats Logo
Open Source
Free
Emerging Threats Logo
Emerging Threats Compromised IPs
This open source block list consists of hosts that are known to be compromised by bots, phishing sites, etc, or known to be spewing hostile traffic. These are significantly infected and hostile hosts.
Open Source
Free
Feodo Tracker logo
Open Source
Free
Feodo Tracker logo
Feodo Tracker
Feodo Tracker is an open source block list representing botnet C&C servers associated with the Feodo malware family (Dridex, Emotet/Heodo).
Open Source
Free
Talos logo
Open Source
Free
Talos logo
Talos
Provided by Cisco Talos Intelligence Group, the IP Blacklist is automatically updated every 15 minutes and contains a list of known malicious network threats that are flagged on all Cisco Security Products.
Government
Free
CISA DHS logo
Government
Free
CISA DHS logo
DHS CISA
This list comes from the Department of Homeland Security’s Cyber Information Sharing and Collaboration Program (CISCP) and consists of malicious IP indicators that have been vetted by DHS security analysts.
Government
Free
State of Missouri flag logo
Government
Free
State of Missouri flag logo
State of Missouri SOC
A list of malicious IPs provided by the State of Missouri’s Office of Cyber Security. This list is managed and vetted by their SOC analysts as they investigate incidents. The hosts within these lists are actively blocked within the states enterprise security stack and should be practically free of false positives. More often than not, these hosts are unknown to major security vendors at the time of the addition to the blacklists and could provide you minutes/hours of additional protection within your security defenses.
Web Services
Free
DocuSign logo
Web Services
Free
DocuSign logo
DocuSign Integration with Threater
An automated allowed list consisting of known good IPs for DocuSign’s e-signature service.
Web Services
Free
Fastly logo
Web Services
Free
Fastly logo
Fastly Integration with Threater
An automated allowed list consisting of known good IPs for Fastly's CDN.
Web Services
Free
GitHub logo
Web Services
Free
GitHub logo
Github Integration with Threater
An automated allowed list consisting of known good IPs for GitHub services.
Web Services
Free
Google logo
Web Services
Free
Google logo
Google Integration with Threater
An automated allowed list consisting of known good IPs for Google services like G Suite.
Web Services
Free
Mailchimp logo
Web Services
Free
Mailchimp logo
Mailchimp Integration with Threater
An automated allowed list consisting of known good IPs for Mailchimp’s marketing platform service.
Web Services
Free
Solarwinds Pingdom logo
Web Services
Free
Solarwinds Pingdom logo
Solarwinds Pingdom Integration with Threater
An automated allowed list consisting of known good IPs for Pingdom servers that are used to measure website availability and performance.
Web Services
Free
SurveyMonkey logo
Web Services
Free
SurveyMonkey logo
SurveyMonkey Integration with Threater
An automated allowed list consisting of known good IPs for SurveyMonkey.
Web Services
Free
Zoom logo
Web Services
Free
Zoom logo
Zoom Integration with Threater
An automated list of known IPs for Zoom that users can enable as an automated allowed list or an automated blocklist.
Enthusiastic Employee working on computer

Want to learn more about Threater?