Threat Analysis Platform is the first comprehensive threat analysis platform, belongs to Beijing ThreatBook Technology Co.,Ltd. (x.threatbook.cn), the China’s first security threat intelligence comany. As a free and open platform, ThreatBook provides worldwide security analysts with a one-stop threat analysis platform for incident identification, risk and impact analysis, correlation and tracing analysis, etc.

Key Features:

  • free and open service
  • multi engines file detection
  • behavior sandbox
  • Internet based data integration
  • Open source intelligence integration
  • Correlation analysis
  • Machine learning
  • Visualization

User principle

The most important rule governing ThreatBook’s usage is that none of its publicly offered services/applications should be used in commercial products, commercial services or for any commercial purpose. In the same way, none of the services should be used as a substitute for security products. This is particularly critical and of utmost importance when dealing with the public API.
Additionally, as stated in the Terms of Service and Privacy Policy, when using ThreatBook the user explicily commits to:
1. Not use the services, products, content and/or tools that ThreatBook has made available for illegal purposes or purposes expressly prohibited by the Terms of Service or the effects of which may infringe upon the rights or interests of ThreatBook or third-parties.
2. Abstain from any activity that could damage, overload, harm or impede the normal functioning of ThreatBook’s websites. Similarly, and in accordance with applicable legislation, the user undertakes to refrain from illicitly or fraudulently obtaining site contents or stealing or plagiarising said contents.
3. Not to use the products, services, contents or tools for illicit purposes, or for any end which could hinder ThreatBook in any way.

Tips

1. ThreatBook is not a substitute for any antivirus/security software installed in a PC, since it only scans individual files/URLs on demand. Our service is for providing more information of your files.
2. Although the detection ratio achieved by the use of multiple antivirus engines scanners is far superior than that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Moreover, the aggregate amount of false positives of multiple solutions is higher than that of any individual scanner.
3. Currently, there is no solution that offers 100% effectiveness in detecting viruses and malware. As an information aggregation platform, ThreatBook DO NOT guarantee the security of a file and will not delete the results generated by normal operation.

Security

ThreatBook will share data with security companies to help them improve their services and products, we hope that it will helps to build a more secure Internet.

Use of the Services


Beijing Wei Bu Zai Xian Technology Co., Ltd., owns and operate ThreatBook and other products and services we provide. Unless otherwise agreed between you and us, these Services are for your personal and non-commercial use. You must follow all application laws, regulations and policies when accessing and using the Services. You also agree:
1. To use the Services only for lawful purposes, in a manner which is not expressly prohibited by these Terms, and in a manner which does not infringe the rights or interests of ThreatBook or third parties;
2. To abstain from any activity including using third party software not authorized by ThreatBook that could damage, overload, harm or impede the normal functioning of the Services.
3. To refrain from illicitly or fraudulently obtaining or using the Content.
4. To refrain from using the Services in any way that could directly or indirectly hinder the ICT antivirus industry.

Your Content in our Services


Access to ThreatBook is free of charge, with the exception of any specific pricing conditions that may apply to certain Services (e.g. ThreatBook Private API).
You retain all ownership rights in any submission you may make and you confirm that you are the original owner of any content you submit or that you have the necessary rights and permissions to authorize us to use your content. In particular, you promise that you have obtained the permission of all of the people featured or referred to in the Content (and if they are under 18 their parents or guardians as well) to our use of the Content on the Services. You agree to take any and all legal responsibilities in the event of any infringement of personal privacy and any other rights of third party which may arise from any submission you make, and ThreatBook does not take any responsibility or liability thereof.
When you upload or otherwise submit content, you give ThreatBook (and those we work with) a worldwide, royalty free, irrevocable and transferable license to use, edit, store, reproduce, modify, create derivative works, communicate, publish, publicly perform, publicly display such content.
If you do not want the content you submit to ThreatBook to be disclosed in the manner set out in these Terms or in the Privacy Policy, please do not send/share it with ThreatBook.

Changes in Services


To provide you with more and more evolved Services, we will constantly improve the Services, and the form and nature of the Services that ThreatBook provides may change from time to time without prior notice to you. Any changes to the Services, including the release of new ThreatBook features, are subject to these Terms. In addition, ThreatBook may stop (permanently or temporarily) providing the Services (or any features within the Services) without prior notice to you.

Copyright


Unless otherwise specified, the copyright of information published by ThreatBook is owned by Beijing Wei Bu Zai Xian Technology Co., Ltd., Any entities or persons shall ask for our consent prior to copying or reproducing the Content of ThreatBook. If you believe that your content has been copied in a way that constitutes copyright infringement, please provide us with the following information:
1. Identification of the copyrighted work claimed to have been infringed.
2. A statement that you are authorized to act on behalf of the copyright owner under penalty of perjury, and the information in the notification is accurate, and in addition, that you have a good faith to believe that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law or regulation.
3. Identification of the material that is claimed to be infringing and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit us to locate the material.
4. Your contact information, including your address, telephone number, and an email address.
Material No.1 and No.2 listed above should be attached with the signature of the copyright owner or a person authorized to act on their behalf.
Please send any notice of alleged copyright infringement to: contactus@threatbook.cn.

ThreatBook Rights


All rights, title, and interest in and to the Services (excluding third party brand names) are and will remain the exclusive property of ThreatBook and its licensors.
Nothing in these Terms shall be construed as conferring by implication or otherwise any license or right under any copyright, patent, trademark, database right, or other intellectual property or proprietary interest of ThreatBook, its licensors or any third party. We reserve the right to remove any Content at our sole discretion without prior notice.
Additionally, nothing in the Terms gives you a right to use the ThreatBook trademarks, logos, domain names, and other distinctive brand features.
Any feedback, comments or suggestions you may provide to us is entirely voluntary, and we will be free to use such feedback, comments or suggestions as we see fit and without any obligation to you.

Disclaimers


Your access to and use of the Services is at your own risk. You understand and agree that the Services are provided to you on an "AS IS" and "AS AVAILABLE" basis. We are not able to foresee and preclude any legal, technological and other risks, including but not limited to force majeure, viruses, Trojans, hack attacks, system instability, third party server flaws and conducts by governmental authorities that may result in losses and risks such as suspension of Services, loss of data and so forth. Without limiting the foregoing, ThreatBook AND ITS AFFILIATES, AGENTS, PARTNERS AND SUBSIDIARIES DISCLAIM ANY WARRANTIES, EXPRESS OR IMPLIED, OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
You also agree that ThreatBook has no responsibility or liability for the deletion of, or the failure to store or to transmit, any content and other communications maintained by the Services.
The Services may contain links to third party websites or resources. They may also contain comments and/or posts with non-anchored linked URLs. You acknowledge and agree that we are not responsible or liable for: (i) the availability or accuracy of such websites or resources; or (ii) the content, products, or services on or available from such websites or resources. Links to such websites or resources do not imply any endorsement by ThreatBook of such websites or resources or the content, products, or services available from such websites or resources. You acknowledge sole responsibility for and assume all risk arising from your use of any such websites or resources. Please note that user comments on URLs and files may contain URLs/links leading to malware.

Viruses, Hacking and Other Offences


You must not misuse our Services. You must not attempt to gain unauthorized access to our website, the server on which our website is stored or any server, computer or database connected to our website. You must not attack our website via a denial-of-service attack or a distributed denial-of service attack. We will not be liable for any loss or damage caused by a distributed denial-of-service attack, viruses or other harmful material that may infect your computer equipment, computer programs, data or other proprietary material due to your access to or use of the Services or any third party content or websites.

Limitation of Liability


TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ThreatBook AND ITS PARENT, SUBSIDIARIES, AFFILIATES, OFFICERS, EMPLOYEES, AGENTS, PARTNERS AND LICENSORS WILL NOT BE LIABLE FOR ANY DIRECT OR INDIRECT DAMAGES, INCLUDING WITHOUT LIMITATION, LOSS OF PROFITS, DATA, USE, GOODWILL, OR OTHER LOSSES, RESULTING FROM
(i) YOUR INABILITY TO ACCESS OR USE THE SERVICES;
(ii) ANY CONDUCT OR CONTENT OF ANY THIRD PARTY WEBSITES, INCLUDING WITHOUT LIMITATION, ANY DEFAMATORY, OFFENSIVE OR ILLEGAL CONDUCT OF ANY THIRD PARTIES;
(iii) ANY CONTENT OBTAINED FROM THE SERVICES;
(iv) UNAUTHORIZED ACCESS, USE OR ALTERATION OF YOUR TRANSMISSIONS OR CONTENT, WHETHER BASED ON WARRANTY, CONTRACT, TORT (INCLUDING NEGLIGENCE) OR ANY OTHER LEGAL THEORY, WHETHER OR NOT WE HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGE.

About These Terms


These Terms and the ThreatBook Privacy Policy are the entire and exclusive agreement between ThreatBook and you regarding the Services (excluding any services for which you may have a separate agreement with ThreatBook that is explicitly in addition or in place of these Terms - e.g. premium private services).
Please note that we may update and amend these Terms from time to time and any changes will be posted on the website. By continuing to access the Services after any changes become effective, you agree to be bound by the revised Terms.
The failure of ThreatBook to enforce any right or provision of these Terms will not be deemed a waiver of such right or provision. In the event that any provision of these Terms is held to be invalid or unenforceable, the remaining provisions of these Terms will remain in full force and effect.

Governing Law and Dispute Resolution


The establishment, validity, performance, interpretation and dispute resolution of these Terms shall be governed by the laws of mainland China (excluding conflict law rules).
These Terms shall be deems to be signed in Haidian district, Beijing, China.
We reserve the right to initiate litigation against you in the event of your breach of these Terms. Any disputes arisen from these Terms or the Services between you and us shall be referred to amicable negotiation, and if there is no settlement reached upon the negotiation, both parties agree to submit the disputes to litigation at the court in the place where these Terms are signed.
For information about how to contact ThreatBook, please visit our contact page.



ThreatBook highly value users’ privacy protection. This Privacy Policy makes public what information we may collect and why we collect it. Meanwhile, it also sets out how we use it to improve user experience and product security.

Information we may collect


We may collect the following information when you use our services:
• The files and URLs you upload for antivirus scanning.
• Device information: We may collect device-specific information (such as your hardware model, operating system version, unique device identifiers, and mobile network information).
• Log information: When you use our services or view content provided by ThreatBook, we may automatically collect and store certain information in server logs. This may include: details of how you used our service; Internet protocol address; device event information such as crashes, system activity, hardware settings, browser type; standard HTTP request headers, including but not limited to user agent, referral URL, language preference, date and time.
• Cookies and Local Storage: We use various technologies to collect and store information when you visit the website, and this may include sending one or more cookies or randomly generated identifiers to your device. The "help" portion of the toolbar on the browser will direct you on how to prevent your browser from accepting new cookies or how to fully disable cookies. We may also collect and store information using mechanisms such as browser web storage (including HTML5) and application data caches.

The use of information we collect


As to the information we collect from our services, we will take steps to ensure the security of such information. Apart from possible disclosures set out in this Privacy Policy, we use such information only for the following purposes:
• To maintain and improve our services;
• To maintain, protect and improve information we collect;
• To develop new services;
• To protect ThreatBook and our users.
When you contact ThreatBook, we may keep a record of your communication, so as to keep in touch with you, and when needed, to help analyze and solve any issues you might face. Where you have agreed, we may use your email address to inform you about our services.
ThreatBook collect, maintain and processes your personal information on servers around the world. With the development of ThreatBook, there may be our servers located outside the country where you live, and thus your personal information may be stored on a server located outside the country where you live, and processed and transferred by such server. When we do so ThreatBook will take all steps necessary to ensure that your personal information and data are treated in accordance with this Privacy Policy.

Information we share


To lead to an overall safer internet and to improve user security protection, ThreatBook also offers services to anti-malware and ICT security industry. Files, URLs, comments and any other content submitted to or shared within ThreatBook may also be included therein. For example, when you submit a file to ThreatBook for scanning, we may store it and share it with the anti-malware and security industry. The samples can be analyzed by automatic tools and security analysts to detect malicious code and to improve antivirus engines. Meanwhile, we may share information we collect in anonymity with anti-malware and ICT security industry in cooperation with us, as well as other partners of us.
In addition, we may also share your information in the following circumstances:
1. We provide personal information to our affiliates or other trusted businesses or persons to process it for us. This will be fully based on our instructions and in compliance with our Privacy Policy. In addition, we will take other necessary confidentiality and security measures to ensure the security or your personal information.
2. We provide and share personal information pursuant to requirements of applicable law, regulation and relevant policies. We will share personal information with companies, organizations or individuals outside of ThreatBook in the following circumstances:
  • to meet any applicable law, regulation and policy.
  • to enforce ThreatBook Terms of Service, including investigation of potential violations.
  • to detect and prevent address fraud, security or technical issues.
  • to protect against harm to the rights, property or safety of ThreatBook, our users or the public as required or permitted by law.
In the event that ThreatBook is involved in a merger, acquisition or asset sale, we may disclose your personal data to the prospective seller or buyer of such business or assets.
You should not share files, URLs, comments or any other relevant content with ThreatBook unless you have authority to share it.

Your Rights


We will let you know if we plan to process your personal data for marketing purposes when we collect it.

Information security


Please keep your password to our website confidential and do not share it with anyone.
Our website may, contain links to and from the websites of our partners from time to time. Please note that these websites have their own privacy policies and that we do not accept any responsibility or liability for these policies. Please check these policies before you submit any personal data to these websites.

Changes


According to the operation of ThreatBook, we may make changes to this Privacy Policy from time to time, which constitute part of this Privacy Policy. In the event such change substantively lessen your rights under this Privacy Policy, we will notify you reasonably (via our website, by email, or by any other means) prior to the change becoming effective. In this situation, you are agreeing to be bound by these revised Privacy Policy by continuing to use our services.

Contact Us


If you have any questions about this Privacy Policy, please feel free to contact us at privacy@virustotal.com.

Privacy Policy Effective Date: November 27, 2015


Email

contactus@threatbook.cn

Phone

010-57017961

Address

Rm1505, Chuang Fu Building, No.18 Danling Street, Haidian District, Beijing China 100086

2016-6-12 : Threat Analysis Platform 2.0 online.
2016-4-26 : Upgrade Domain analysis, returns the associated subdomain.
2016-4-25 : AntiVirus Engine online: Baidu ( domestic edition ).
2016-3-10 : API upgradation: support threat intelligence feeds.
2016-2-25 : New English version web site released.
2016-2-24 : New PV visualization analysis tool launched for domain and sub domain name.
2016-1-25 : ThreatBook VBuploader new version released.
2016-1-15 : ThreatBook threat analysis feature released.
2015-12-28 : AntiVirus Engine online: ESET.
2015-11-12 : The sandbox analysis for Windows PE files online.
2015-11-03 : AntiVirus Engine online: WebShell.
2015-10-22 : AntiVirus Engine online: Avast.
2015-10-13 : AntiVirus Engine online: GDATA.
2015-09-29 : AntiVirus Engine online: Kaspersky and Sophos.
2015-09-25 : AntiVirus Engine online: XcodeGhost.
2015-09-23 : The static analysis for Android App online.
2015-09-16 : AntiVirus Engine online: Dr.Web.
2015-09-02 : API instruction page online.
2015-08-25 : AntiVirus Engine online: IKARUS.
2015-08-14 : AntiVirus Engine online: Huorong and AVG.
2015-08-14 : AntiVirus Engine online: Tencent.
2015-07-31 : File static analysis online.
2015-07-28 : AntiVirus Engine online: Rising.
2015-07-21 : AntiVirus Engine online: Qihoo 360.
2015-07-17 : AntiVirus Engine online: Baidu.
2015-07-09 : VBScanner tool online.
2015-07-02 : AntiVirus Engine online: AVG and Kingsoft.
2015-06-26 : AntiVirus Engine online: TrendMicro,ClamAV and MSE.
2015-06-12 : AntiVirus Engine online: Antiy.
2015-06-08 : ThreatBook website online.