
Top picks: Lunar, Webz.io, Hudson Rock Cybercrime Intelligence Tools — plus 45 more compared.
Threat ManagementHunt.io is a commercial Threat Intelligence Platforms tool developed by Hunt.io. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Hunt.io, including their key features and shared capabilities.
Free breach monitoring platform for compromised credential detection & alerting.
Web data platform providing open, deep & dark web APIs and monitoring.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybersecurity market intelligence platform for tracking competitors & funding
Enterprise real-time cyber threat intelligence platform.
Shares 6 capabilities with Hunt.io: Security Research, Hunting, IOC, Cyber Threat Intelligence +2 more
Threat intelligence platform providing global threat visibility and IoCs
Shares 4 capabilities with Hunt.io: IOC, Cyber Threat Intelligence, Threat Feed, Threat Actors
Enterprise threat intelligence feeds covering malware, phishing, C2, and IPs
Shares 4 capabilities with Hunt.io: C2, IOC, Cyber Threat Intelligence, Threat Feed
MCP server connecting LLMs to live threat intelligence via natural language
Shares 4 capabilities with Hunt.io: IOC, Cyber Threat Intelligence, Threat Feed, Threat Actors
Free breach monitoring platform for compromised credential detection & alerting.
Web data platform providing open, deep & dark web APIs and monitoring.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybersecurity market intelligence platform for tracking competitors & funding
Threat intelligence platform providing global threat visibility and IoCs
Enterprise threat intelligence feeds covering malware, phishing, C2, and IPs
MCP server connecting LLMs to live threat intelligence via natural language
Threat intelligence platform aggregating global threat data for detection
Threat intelligence platform providing strategic & tactical threat analysis
Cyber threat intelligence platform with AI-driven analysis and threat hunting
Preemptive threat intelligence platform for incident response and hunting
Continuous threat intelligence and exposure management across dark, deep & clear web.
Threat intelligence platform combining Google, Mandiant, and VirusTotal data
Proactive C2 threat intelligence feed for detecting adversary infrastructure
Real-time C2 infrastructure detection and disruption threat intelligence feed
Threat intelligence feeds providing malware and threat data in multiple formats
Automates distribution of threat intel across security infrastructure
Real-time threat intelligence platform with STIX/TAXII compliance
Cyber threat intelligence platform monitoring external threats & cybercrime
Threat intelligence search platform with correlated data graph
Centralized threat intelligence platform for aggregating and operationalizing IOCs
Cyber threat intelligence feeds for SOC and threat intelligence teams
Behavior-based threat intel feed delivering malware IOCs with context
Subscription threat intel service with reports, translations & security notifications.
Real-time CVE exploitation tracker with active IP feeds and IoC visibility.
Threat intel platform with dark web monitoring, ASM, and brand protection.
Converts unstructured OSINT & darknet signals into structured STIX 2.1 threat intelligence
Threat intel platform for discovering cybercrime on encrypted chat networks
Automated threat intel service with IoC search, feeds, and SIEM/SOAR integrations.
OpenTAXII config enabling TAXII-based threat intel sharing with MISP.
Enterprise threat intelligence platform for identifying and prioritizing threats
Cyber threat intelligence platform for threat-led risk management
Real-time threat intelligence platform for monitoring attacks and breaches
Cyber intelligence platform for threat detection and security posture mgmt
Cyber threat intelligence platform with adversary tracking capabilities
AI-powered threat intelligence platform for real-time threat intel management
XTM portfolio for threat intel, attack surface visibility & adversary simulation
AI-powered platform for collecting and analyzing open source threat intelligence
CTI platform combining automated collection with cyber HUMINT for threat intel
Threat intelligence platform with deep/dark web monitoring and OSINT data
Managed cyber threat intelligence service with org/adversary profiling
Technical threat intel feed of compromised IPs/domains from cybercrime sources
Preemptive cyber defense platform using DNS, WHOIS, and web data for threat intel
Infrastructure intelligence platform for threat hunting and investigation
SOC Radar Cyber Threat Intelligence is a comprehensive platform that provides dark web monitoring, vulnerability intelligence, and threat actor analysis to help organizations proactively defend against cyber threats.
SOCRadar Agentic Threat Intelligence is an AI-powered cybersecurity platform that deploys autonomous agents to automate threat intelligence operations, analysis, and response without human intervention.
Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
Common questions security professionals ask when evaluating alternatives and competitors to Hunt.io.
The most popular alternatives to Hunt.io include Lunar, Webz.io, Hudson Rock Cybercrime Intelligence Tools, CybersecRadars, and Ninja Signal. These Threat Intelligence Platforms tools offer similar capabilities and are frequently compared by security professionals evaluating their options.
There are 48 alternatives to Hunt.io listed on CybersecTools, all within the Threat Intelligence Platforms category. Each alternative is matched based on shared capabilities, tags, and NIST CSF coverage areas.
Hunt.io is a commercial Threat Intelligence Platforms tool. It requires a paid license or subscription. Both free and commercial alternatives are available for comparison.
Hunt.io is a Threat Intelligence Platforms tool within the broader Threat Management category. It is used by security professionals for threat intelligence platforms capabilities and can be compared against 48 similar tools.