Loading...
DNS-based threat intelligence platform with predictive risk scoring

DNS-based threat intelligence platform with predictive risk scoring
DomainTools Predictive Threat Feeds is a threat intelligence platform that leverages DNS and domain data to support security operations, threat hunting, and incident response. The platform provides access to domain profiles, Whois and RDAP records, and passive DNS data to enable infrastructure mapping and threat analysis. The product includes a Predictive Risk Score that assesses the likelihood of a domain being malicious. It offers domain discovery capabilities to identify risky domains and monitoring functionality to track changes in domain behavior or hosting infrastructure. The platform maintains historical DNS resolution data spanning over a decade, allowing analysts to trace adversary activity and infrastructure pivots over time. The platform provides both a user interface for investigations and API access for enrichment at scale. It integrates with SIEM, SOAR, TIP, and XDR platforms to enable real-time enrichment of security events with DNS intelligence. The system supports flexible search and filtering for threat hunting activities. DomainTools claims to provide 97%+ Internet visibility through global datasets and maintains what it describes as the world's largest passive DNS database. The platform is designed to support SOC automation, threat intelligence operations, forensics, and incident response workflows by providing context on domains, IP addresses, SSL certificates, name servers, and registrant details.
Common questions about DomainTools Predictive Threat Feeds including features, pricing, alternatives, and user reviews.
DomainTools Predictive Threat Feeds is DNS-based threat intelligence platform with predictive risk scoring developed by DomainTools. It is a Threat Management solution designed to help security teams with Cyber Threat Intelligence.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
Get strategic cybersecurity insights in your inbox