ThreatPipes Logo

Extend the Power of ThreatPipes with new Prototypes

The Prototype Library has Prototypes developed by ThreatPipes, our partners and our community.

Find a Prototype for a new threat intelligence source, threat type, or external security tool.



Input Prototype



AlienVault Reputation Miner Input

AlienVault Reputation

Learn more...

Supported by: ThreatPipes

badips.com Miner Input

badips.com

Learn more...

Supported by: ThreatPipes

Bambenek Consulting Miner Input

Bambenek Consulting

Learn more...

Supported by: ThreatPipes

Binary Defense Systems Artillery Miner Input

Binary Defense Systems Artillery

Learn more...

Supported by: ThreatPipes

blocklist.de Miner Input

blocklist.de

Learn more...

Supported by: ThreatPipes

BruteForceBlocker Miner Input

BruteForceBlocker

Learn more...

Supported by: ThreatPipes


DShield Miner Input

DShield

Learn more...

Supported by: ThreatPipes

Emerging Threats Open rulesets Miner Input

Emerging Threats Open rulesets

Learn more...

Supported by: ThreatPipes

Feodo Tracker Miner Input

Feodo Tracker

Learn more...

Supported by: ThreatPipes

hailataxii.com Miner Input

hailataxii.com

Learn more...

Supported by: ThreatPipes

Libraesva Miner Input

Libraesva

Learn more...

Supported by: ThreatPipes

Malware Domain List Miner Input

Malware Domain List

Learn more...

Supported by: ThreatPipes


MISP Miner Input

MISP

Learn more...

Supported by: ThreatPipes

OpenBL Miner Input

OpenBL

Learn more...

Supported by: ThreatPipes

OpenPhish Miner Input

OpenPhish

Learn more...

Supported by: ThreatPipes

Palo Alto Networks AutoFocus Miner Input

Palo Alto Networks AutoFocus

Learn more...

Supported by: ThreatPipes

Cofense Miner Input

Cofense

Learn more...

Supported by: ThreatPipes

Proofpoint ET Intelligence Miner Input

Proofpoint ET Intelligence

Learn more...

Supported by: ThreatPipes


Ransomware Tracker Miner Input

Ransomware Tracker

Learn more...

Supported by: ThreatPipes

Recorded Future Miner Input

Recorded Future

Learn more...

Supported by: ThreatPipes

Soltra Edge Miner Input

Soltra Edge

Learn more...

Supported by: ThreatPipes

Spamhaus Project Miner Input

Spamhaus Project

Learn more...

Supported by: ThreatPipes

SSLBL Miner Input

SSLBL

Learn more...

Supported by: ThreatPipes

Digital Threat Intelligence from The Media Trust Miner Input

Digital Threat Intelligence from The Media Trust

Learn more...

Supported by: ThreatPipes


ThreatConnect Miner Input

ThreatConnect

Learn more...

Supported by: ThreatPipes

ThreatQuotient Miner Input

ThreatQuotient

Learn more...

Supported by: ThreatPipes

Virbl Miner Input

Virbl

Learn more...

Supported by: ThreatPipes

Virustotal Miner Input

Virustotal

Learn more...

Supported by: ThreatPipes

ZeuS Tracker Miner Input

ZeuS Tracker

Learn more...

Supported by: ThreatPipes

TAXII Client Miner Input

TAXII Client

Learn more...

Supported by: ThreatPipes


Threat Exchange Miner Input

Threat Exchange

Learn more...

Supported by: ThreatPipes

Syslog Miner Input

Syslog

Learn more...

Supported by: ThreatPipes


Processor Prototype



IPv4 Processor

IPv4

Learn more...

Supported by: ThreatPipes

IPv6 Processor

IPv6

Learn more...

Supported by: ThreatPipes

Domain Processor

Domain

Learn more...

Supported by: ThreatPipes

URL Processor

URL

Learn more...

Supported by: ThreatPipes

md5 Processor

md5

Learn more...

Supported by: ThreatPipes

sha1 Processor

sha1

Learn more...

Supported by: ThreatPipes


sha256 Processor

sha256

Learn more...

Supported by: ThreatPipes

Email address Processor

Email address

Learn more...

Supported by: ThreatPipes

File Name Processor

File Name

Learn more...

Supported by: ThreatPipes

Windows Registry Value Processor

Windows Registry Value

Learn more...

Supported by: ThreatPipes

Mutex Processor

Mutex

Learn more...

Supported by: ThreatPipes

Command Line Process Processor

Command Line Process

Learn more...

Supported by: ThreatPipes


ssdeep Processor

ssdeep

Learn more...

Supported by: ThreatPipes

User Agent Fragment Processor

User Agent Fragment

Learn more...

Supported by: ThreatPipes


Output Prototype



Arcsight CEF Output

Arcsight CEF

Learn more...

Supported by: ThreatPipes

CSV Output

CSV

Learn more...

Supported by: ThreatPipes

Elastic Logstash Output

Elastic Logstash

Learn more...

Supported by: ThreatPipes

JSON Output

JSON

Learn more...

Supported by: ThreatPipes

MISP Output

MISP

Learn more...

Supported by: ThreatPipes

Palo Alto Networks Output

Palo Alto Networks

Learn more...

Supported by: ThreatPipes


Splunk Output

Splunk

Learn more...

Supported by: ThreatPipes

LogRhythm Output

LogRhythm

Learn more...

Supported by: ThreatPipes

IBM QRadar Output

IBM QRadar

Learn more...

Supported by: ThreatPipes

STIX Output

STIX

Learn more...

Supported by: ThreatPipes

Syslog Output

Syslog

Learn more...

Supported by: ThreatPipes

TAXII Server Output

TAXII Server

Learn more...

Supported by: ThreatPipes


TXT Output

TXT

Learn more...

Supported by: ThreatPipes

AWS GuardDuty Output

AWS GuardDuty

Learn more...

Supported by: ThreatPipes

Threat Exchange Output

Threat Exchange

Learn more...

Supported by: ThreatPipes

Soltra Edge Output

Soltra Edge

Learn more...

Supported by: ThreatPipes

Carbon Black Output

Carbon Black

Learn more...

Supported by: ThreatPipes


Partners

We love hearing from partners considering an integration with ThreatPipes. Let's build great products together

We're hiring...

Build integrations with us, we're always looking for talented and ambitious people to join our team.