
Top picks: Lunar, Webz.io, Hudson Rock Cybercrime Intelligence Tools — plus 45 more compared.
Threat ManagementMaltego Graph is a commercial Threat Intelligence Platforms tool developed by maltego. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Maltego Graph, including their key features and shared capabilities.
Free breach monitoring platform for compromised credential detection & alerting.
Shares 4 capabilities with Maltego Graph: Threat Analysis, Osint, Cyber Threat Intelligence, Dark Web Monitoring
Web data platform providing open, deep & dark web APIs and monitoring.
Shares 3 capabilities with Maltego Graph: Osint, Cyber Threat Intelligence, Dark Web Monitoring
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybersecurity market intelligence platform for tracking competitors & funding
Shares 3 capabilities with Maltego Graph: Threat Analysis, Visualization, Cyber Threat Intelligence
Visual link analysis platform for OSINT investigations and data correlation
Shares 5 capabilities with Maltego Graph: Visualization, Osint, Case Management, Graph +1 more
Converts unstructured OSINT & darknet signals into structured STIX 2.1 threat intelligence
Shares 4 capabilities with Maltego Graph: Threat Analysis, Visualization, Cyber Threat Intelligence, Dark Web Monitoring
Continuous threat intelligence and exposure management across dark, deep & clear web.
Shares 3 capabilities with Maltego Graph: Threat Analysis, Cyber Threat Intelligence, Dark Web Monitoring
Threat intelligence platform providing actionable insights from global sources
Shares 3 capabilities with Maltego Graph: Threat Analysis, Cyber Threat Intelligence, Dark Web Monitoring
Free breach monitoring platform for compromised credential detection & alerting.
Web data platform providing open, deep & dark web APIs and monitoring.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybersecurity market intelligence platform for tracking competitors & funding
Visual link analysis platform for OSINT investigations and data correlation
Converts unstructured OSINT & darknet signals into structured STIX 2.1 threat intelligence
Continuous threat intelligence and exposure management across dark, deep & clear web.
Threat intelligence platform providing actionable insights from global sources
AI-powered cyber threat intelligence platform for threat monitoring & analysis
AI-powered threat intelligence platform collecting data from web sources
Managed threat intelligence service with dark web monitoring and analysis
Threat intel service focused on adversary attribution and monitoring
Automotive-focused threat intelligence platform with dark web monitoring
AI-powered maritime-specific cyber threat intelligence for shipping companies.
Mobile-focused threat intelligence portal for detecting and analyzing mobile threats.
Managed CTI platform with sector-specific threat reports and exposure monitoring.
Threat intel firm identifying human actors behind cyber threats.
Data fusion platform supporting the full intelligence cycle for security agencies.
Investigative analytics platform for threat intelligence and security ops
Dark web investigation platform with comprehensive database and analysis tools
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Next-gen cybersecurity platform for threat detection & digital risk mgmt.
Enterprise threat intelligence platform for identifying and prioritizing threats
Cyber threat intelligence platform for threat-led risk management
AI-driven cyber threat intelligence platform for threat detection and analysis
Dark web monitoring platform for detecting data leaks and brand threats
Real-time threat intelligence platform for monitoring attacks and breaches
Cyber intelligence platform for threat detection and security posture mgmt
Threat intelligence platform for aggregating, analyzing, and sharing CTI data
AI-powered threat intelligence platform with agentic AI automation
AI-powered platform for collecting and analyzing open source threat intelligence
CTI platform combining automated collection with cyber HUMINT for threat intel
Threat intelligence service providing alerts, analysis, and support
Threat intelligence platform with deep/dark web monitoring and OSINT data
AI-driven cyber intelligence orchestration platform for threat intel & OSINT
API providing access to compromised identity data and threat signals
Managed cyber threat intelligence service with org/adversary profiling
Technical threat intel feed of compromised IPs/domains from cybercrime sources
CTI platform monitoring deep/dark web, forums & threat actors for intel
AI-powered threat intelligence platform for cyber, geopolitical & physical risks
3D cyber threat visualization platform for external threat monitoring
SOCRadar Extended Threat Intelligence Platform is a SaaS-based solution that provides real-time threat detection, digital risk protection, and AI-powered threat intelligence services across multiple environments including dark web, social media, and cloud platforms.
SOC Radar Cyber Threat Intelligence is a comprehensive platform that provides dark web monitoring, vulnerability intelligence, and threat actor analysis to help organizations proactively defend against cyber threats.
File and URL scanning service for malware and threat detection
Automotive-specific threat intelligence platform for mobility ecosystem
Cyber threat intelligence platform monitoring external threats & cybercrime
Real-time identity protection monitoring compromised credentials on dark web
Threat intel platform for investigating cybercrime underground sources
Common questions security professionals ask when evaluating alternatives and competitors to Maltego Graph.
The most popular alternatives to Maltego Graph include Lunar, Webz.io, Hudson Rock Cybercrime Intelligence Tools, CybersecRadars, and Maltego Professional Lite. These Threat Intelligence Platforms tools offer similar capabilities and are frequently compared by security professionals evaluating their options.