SOC operations & alert triage
Enrich alerts with context on malicious IPs, domains, hashes, and emails so analysts can decide quickly whether to escalate, suppress, or block.
Operational threat intelligence for defenders, combining indicator search, dark web visibility, and attack surface monitoring in a single platform.
Most security teams are drowning in indicators that they cannot reliably prioritise or integrate. Cyber Defence’s Threat Intelligence platform is built for defenders, not researchers. It fuses SOC telemetry, dark web collection, credential leaks, phishing reconnaissance, and external attack surface data into a single, searchable view.
Analysts can pivot from indicators to adversary infrastructure, exposed assets, and related campaigns in seconds. Everything is exposed through a documented API and portal so you can plug intelligence directly into SIEM, SOAR, SOC365, and your wider security tooling.
Cyber Defence’s Threat Intelligence service underpins our Detect, Defend, and Disrupt pillars. It provides the context and coverage you need to understand who is targeting you, how they operate, and which vulnerabilities and exposures matter most.
Whether you run an in-house SOC, rely on our SOC365 team, or operate a hybrid model, the platform turns global telemetry and research into detections, watchlists, and hardening actions that directly reduce risk.
Pricing for all plans is available at /pricing.
Use cases
Threat intelligence that is directly aligned to how defenders work, hunt, and respond.
See which plan matches your needs on the Threat Intelligence Pricing page.
Enrich alerts with context on malicious IPs, domains, hashes, and emails so analysts can decide quickly whether to escalate, suppress, or block.
Drive hunts and new detections using live data on adversary infrastructure, campaigns, and emerging tradecraft mapped to MITRE ATT&CK.
Identify exposed credentials, brand abuse, and mentions of your domains, staff, and assets across forums, marketplaces, and paste sites.
Track domains, IP ranges, and services for risky exposures, weak configurations, and new infrastructure that attackers can exploit.
Pivot from a single indicator to related infrastructure, malware families, and actor profiles to accelerate containment and scoping.
Translate technical findings into threat trends, business impact, and recommended investment using curated sector-specific intelligence.
Our platform continuously ingests, normalises, and curates data from deception systems, honeypots, malware telemetry, phishing campaigns, dark web monitoring, and credential-leak collections. These holdings are kept fresh through daily re-analysis and strict expiry on stale IP and domain data.
425,000+
Malicious IPs
995,000+
Malicious domains
3,000,000+
IOC hashes
800,000,000+
Account leaks
145,000+
Malicious URLs
620,000+
Phishing domains
Features
Capabilities that turn raw data into decisions, detections, and actions your security team can actually use.
Fast lookups for IPs, domains, URLs, hashes, and email addresses, with the ability to pivot into related infrastructure, campaigns, and leak data.
Search across dark web sources, forums, and marketplaces for mentions of your brands, staff, and assets, plus leaked credential data.
Continuous discovery and tracking of Internet-facing domains, services, and certificates associated with your organisation.
Profiles of adversary behaviour, malware families, and TTPs mapped to MITRE ATT&CK and enriched with observables and infrastructure.
Custom watchlists, scheduled alerts, and reports delivered through the portal and email to keep your team ahead of active threats.
Documented REST API, CSV exports, and direct integration options for SIEM, SOAR, SOC365, and ticketing systems.
Plans
Start with free lookups, then scale to continuous monitoring and deep integration with your SOC and security tooling.
Full plan details and comparison are available at Threat Intelligence Pricing.
Full dataset access for indicators, limited dark web search for selected domains, basic attack surface monitoring, and fair-use API access. Ideal for solo analysts, consultants, and small teams.
The plan most customers choose. Everything in Detect plus higher limits, expanded leak monitoring, richer attack surface visibility, and multiple named users.
For larger, multi-site, or regulated organisations. Everything in Defend plus deep coverage, custom scopes, enhanced SLAs, and MSSP/partner support.
Walk through the portal with our analysts, understand usage patterns, and match your requirements to the most appropriate plan.
Analysts can work directly in the Cyber Defence Threat Intelligence portal. Engineering and SOC teams can consume intelligence via API feeds, scheduled exports, and integrations with SIEM, SOAR, ticketing systems, and SOC365 itself.
To understand which plan fits your integration model, view the pricing and plan comparison.
Our collections and research are tuned to the industries we protect every day. Plans are priced per-organisation, and tailored packages are available for complex or regulated estates.
Sector-specific pricing guidance is available at <a href="/services/threat-intelligence/pricing" class="cd-inline-link">pricing</a>.
The platform is powered by Cyber Defence’s CREST-accredited, ISO-certified SOC365 operations, deception infrastructure, and analyst research. You are not buying a static feed – you are partnering with a team that actively tracks campaigns, tunes detections, and supports you during incidents.
If you are evaluating plans, speak to us to map coverage, limits, and support levels to your estate — or visit the <a href="/services/threat-intelligence/pricing" class="cd-inline-link">Threat Intelligence Pricing</a> page.