
Top picks: Webz.io, Lunar, Hudson Rock Cybercrime Intelligence Tools — plus 45 more compared.
Threat ManagementAxur AI-Powered Cyber Threat Intelligence is a commercial tool developed by Axur. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Axur AI-Powered Cyber Threat Intelligence, including their key features and shared capabilities.
Web data platform providing open, deep & dark web APIs and monitoring.
Free breach monitoring platform for compromised credential detection & alerting.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybersecurity market intelligence platform for tracking competitors & funding
Technical threat intel feed of compromised IPs/domains from cybercrime sources
Shares 3 capabilities with Axur AI-Powered Cyber Threat Intelligence: IOC, Cyber Threat Intelligence, Dark Web Monitoring
SOC Radar Cyber Threat Intelligence is a comprehensive platform that provides dark web monitoring, vulnerability intelligence, and threat actor analysis to help organizations proactively defend against cyber threats.
Shares 3 capabilities with Axur AI-Powered Cyber Threat Intelligence: IOC, Cyber Threat Intelligence, Dark Web Monitoring
Cyber threat intelligence platform monitoring external threats & cybercrime
Shares 3 capabilities with Axur AI-Powered Cyber Threat Intelligence: IOC, Cyber Threat Intelligence, Dark Web Monitoring
Threat intelligence search platform with correlated data graph
Shares 3 capabilities with Axur AI-Powered Cyber Threat Intelligence: IOC, Cyber Threat Intelligence, Dark Web Monitoring
Web data platform providing open, deep & dark web APIs and monitoring.
Free breach monitoring platform for compromised credential detection & alerting.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybersecurity market intelligence platform for tracking competitors & funding
Technical threat intel feed of compromised IPs/domains from cybercrime sources
SOC Radar Cyber Threat Intelligence is a comprehensive platform that provides dark web monitoring, vulnerability intelligence, and threat actor analysis to help organizations proactively defend against cyber threats.
Cyber threat intelligence platform monitoring external threats & cybercrime
Threat intelligence search platform with correlated data graph
AI-driven threat intelligence platform for threat detection and response
Threat intelligence platform providing strategic & tactical threat analysis
Enterprise threat intelligence platform for proactive threat detection
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Continuous threat intelligence and exposure management across dark, deep & clear web.
Next-gen cybersecurity platform for threat detection & digital risk mgmt.
Cyber intelligence platform for threat detection and security posture mgmt
Cyber threat intelligence platform for monitoring threats, TTPs, and IOCs
CTI platform monitoring deep/dark web, forums & threat actors for intel
Real-time identity protection monitoring compromised credentials on dark web
Threat intel platform combining CTI, DRPS, EASM & TPRM for exposure mgmt.
AI-powered CTI platform integrating ASM, DRP, and TI capabilities
AI-powered external threat intelligence platform for threat detection
Threat intel platform with dark web monitoring, ASM, and brand protection.
Converts unstructured OSINT & darknet signals into structured STIX 2.1 threat intelligence
Enterprise threat intelligence platform for identifying and prioritizing threats
AI-driven cyber threat intelligence platform for threat detection and analysis
Dark web monitoring platform for detecting data leaks and brand threats
Threat intelligence platform combining Google, Mandiant, and VirusTotal data
AI-powered threat intelligence platform with agentic AI automation
Threat intelligence service providing alerts, analysis, and support
AI-driven cyber intelligence orchestration platform for threat intel & OSINT
API providing access to compromised identity data and threat signals
AI-powered threat intelligence platform for cyber, geopolitical & physical risks
Infrastructure intelligence platform for threat hunting and investigation
SOCRadar Extended Threat Intelligence Platform is a SaaS-based solution that provides real-time threat detection, digital risk protection, and AI-powered threat intelligence services across multiple environments including dark web, social media, and cloud platforms.
Real-time C2 infrastructure detection and disruption threat intelligence feed
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
Enterprise threat intelligence feeds covering malware, phishing, C2, and IPs
Real-time threat intelligence platform for external threat visibility and IoC analysis
Threat intelligence platform aggregating global threat data for detection
Automates distribution of threat intel across security infrastructure
Real-time threat intelligence platform with STIX/TAXII compliance
AI-powered investigation tool for analyzing identity exposures from darknet data
Dark web intelligence service with human operatives for threat hunting
Threat intelligence platform combining network security and threat exposure mgmt
Visual interface for exploring threat intelligence data sources and datasets
Dark web monitoring platform for detecting exposed credentials and threats
CTI platform for threat analysis, dark web monitoring, and data breach detection
Threat intelligence platform monitoring dark web, breaches & attack surface
Common questions security professionals ask when evaluating alternatives and competitors to Axur AI-Powered Cyber Threat Intelligence.
The most popular alternatives to Axur AI-Powered Cyber Threat Intelligence include Webz.io, Lunar, Hudson Rock Cybercrime Intelligence Tools, CybersecRadars, and KELA Technical Cybercrime Intelligence. These Threat Intelligence Platforms tools offer similar capabilities and are frequently compared by security professionals evaluating their options.