Threat Intelligence API

Threat Intelligenceas Code

Programmatic access to high-fidelity fact extraction, filterable REST endpoints, and STIX 2.1 bundles. Integrate structured threat intelligence directly into your security automation workflows.

What the API Provides

Everything you need to automate threat intelligence ingestion and enrichment.

STIX 2.1 Native

Native STIX 2.1 bundle responses including threat-actor, malware, indicator, attack-pattern, vulnerability, and course-of-action objects.

Intelligence ETL

Automated extraction, transformation, and loading of threat intelligence from unstructured security research into structured, queryable STIX 2.1 objects.

Full Provenance

Every API response includes complete source attribution via external_references. Trace intelligence back to original research for validation and audit trails.

Platform Agnostic REST API

RESTful endpoints with rich filtering across actors, victims, CVEs, sectors, and time ranges. Works with any language — Python, Node.js, Java, Go.

Example API Response

STIX 2.1 Bundle
{
  "type": "bundle",
  "id": "bundle--5d0092c5-5f74-4287-9642-33f4c354e56d",
  "objects": [
    {
      "type": "threat-actor",
      "spec_version": "2.1",
      "id": "threat-actor--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
      "name": "FIN99",
      "description": "Example threat actor",
      "external_references": [
        {
          "source_name": "research-report",
          "url": "https://example.com/report",
          "description": "Original intelligence source"
        }
      ]
    }
  ]
}

Developer Capabilities

Enterprise-grade features for production deployments.

Token Authentication

Secure API key-based authentication with role-based access control and token rotation capabilities.

Rate Limiting

Enterprise-grade rate limiting with clear headers. Monitor usage and scale access as your integration grows.

Pagination & Filtering

Efficient pagination for large datasets. Filter by entity type, timeframe, region, industry, source, and custom query parameters.

Comprehensive Documentation

Complete API reference with examples in multiple languages and integration guides.

Webhook Support

Instant push notifications for new intelligence matching your criteria. Build reactive security automation.

Historical Data Access

Query historical threat intelligence data. Build time-series analysis and track threat evolution over time.

Platform Integrations

Pre-built connectors for your security stack.

Splunk
Microsoft Sentinel
Cortex XSOAR
MISP
OpenCTI
ThreatConnect
Anomali
Elastic SIEM
Custom Tools

Build integrations with your internal security tools and workflows using our RESTful API.

Ready to Integrate Threat Intelligence?

Get API access and start building with structured threat intelligence today.