Threat Intelligence API

Threat Intelligenceas Code

Programmatic access to high-fidelity fact extraction, graph-aware intelligence queries, and STIX 2.1 bundles. Integrate structured threat intelligence directly into your security automation workflows.

What the API Provides

Everything you need to automate threat intelligence ingestion and enrichment.

Intelligence ETL Pipeline

Automated extraction, transformation, and loading of threat intelligence from unstructured security research into structured, queryable STIX 2.1 objects.

Graph-Aware Queries

Query relationships between threat entities. Traverse connections from IOCs to TTPs, campaigns to threat actors, and malware to infrastructure.

Full Provenance

Every API response includes complete source attribution via external_references. Trace intelligence back to original research for validation and audit trails.

Standards & Formats

Built on industry standards for seamless integration.

STIX 2.1 Native

Native STIX 2.1 bundle responses. Objects include threat-actor, malware, indicator, attack-pattern, vulnerability, and course-of-action types.

JSON Responses

Clean, well-documented JSON responses with consistent schema. Easy to parse, integrate, and automate across your security stack.

Platform Agnostic

RESTful API design works with any language or framework. Integrate with Python, Node.js, Java, Go, or custom security tools.

Example API Response

STIX 2.1 Bundle
{
  "type": "bundle",
  "id": "bundle--5d0092c5-5f74-4287-9642-33f4c354e56d",
  "objects": [
    {
      "type": "threat-actor",
      "spec_version": "2.1",
      "id": "threat-actor--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
      "name": "FIN99",
      "description": "Example threat actor",
      "external_references": [
        {
          "source_name": "research-report",
          "url": "https://example.com/report",
          "description": "Original intelligence source"
        }
      ]
    }
  ]
}

Developer Capabilities

Enterprise-grade features for production deployments.

Token Authentication

Secure API key-based authentication with role-based access control and token rotation capabilities.

Rate Limiting

Enterprise-grade rate limiting with clear headers. Monitor usage and scale access as your integration grows.

Pagination & Filtering

Efficient pagination for large datasets. Filter by entity type, timeframe, region, industry, source, and custom query parameters.

Comprehensive Documentation

Complete API reference with examples in multiple languages and integration guides.

Webhook Support

Instant push notifications for new intelligence matching your criteria. Build reactive security automation.

Historical Data Access

Query historical threat intelligence data. Build time-series analysis and track threat evolution over time.

Platform Integrations

Pre-built integrations and custom connectors for your security stack.

Splunk

Push STIX bundles directly into Splunk Enterprise Security via HTTP Event Collector. Enrich SIEM alerts with contextual threat intelligence.

Microsoft Sentinel

Ingest threat indicators via Data Connector. Automate incident enrichment with provenance-tracked intelligence.

Cortex XSOAR

Build custom playbooks with Threat Landscape intelligence. Automate response actions based on threat actor TTPs.

MISP

Sync STIX 2.1 bundles bidirectionally with MISP instances. Share and enrich intelligence across communities.

OpenCTI

Import intelligence directly into OpenCTI platform. Leverage graph visualization and correlation capabilities.

Custom Security Tools

Build bespoke integrations with your internal security tools and workflows using our RESTful API.

Integration Methods

REST API

Standard HTTP endpoints with JSON responses

Webhooks

Instant push notifications for new intelligence

TAXII 2.1

Standard threat intelligence exchange protocol

Ready to Integrate Threat Intelligence?

Get API access and start building with structured threat intelligence today.