Key Features:
- free and open service
- multi engines file detection
- behavior sandbox
- Internet based data integration
- Open source intelligence integration
- Correlation analysis
- Machine learning
- Visualization
User principle
The most important rule governing ThreatBook’s usage is that none of its publicly offered services/applications should be used in commercial products, commercial services or for any commercial purpose. In the same way, none of the services should be used as a substitute for security products. This is particularly critical and of utmost importance when dealing with the public API.Additionally, as stated in the Terms of Service and Privacy Policy, when using ThreatBook the user explicily commits to:
1. Not use the services, products, content and/or tools that ThreatBook has made available for illegal purposes or purposes expressly prohibited by the Terms of Service or the effects of which may infringe upon the rights or interests of ThreatBook or third-parties.
2. Abstain from any activity that could damage, overload, harm or impede the normal functioning of ThreatBook’s websites. Similarly, and in accordance with applicable legislation, the user undertakes to refrain from illicitly or fraudulently obtaining site contents or stealing or plagiarising said contents.
3. Not to use the products, services, contents or tools for illicit purposes, or for any end which could hinder ThreatBook in any way.
Tips
1. ThreatBook is not a substitute for any antivirus/security software installed in a PC, since it only scans individual files/URLs on demand. Our service is for providing more information of your files.2. Although the detection ratio achieved by the use of multiple antivirus engines scanners is far superior than that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Moreover, the aggregate amount of false positives of multiple solutions is higher than that of any individual scanner.
3. Currently, there is no solution that offers 100% effectiveness in detecting viruses and malware. As an information aggregation platform, ThreatBook DO NOT guarantee the security of a file and will not delete the results generated by normal operation.