Threat Intelligence Analysis Platform

An integrated one stop analysis platform helps security analyst to determine threat,
investigate threat evolvement and transformation, identify characteristics of cyber-attacks and profile of cyber groups behind the attacks.

What we can do

Data determinationDeterministic decision for IP, domain and samples.

Threat Intelligence

More than 200 threat intelligence sources, thousands effect intelligence data, deeply understand IP, domain, file security situation.

File Detection

Integrate around 30 anti-virus engines with sandbox dynamitic analysis Download TBScaner

Advanced Analysis

Comprehensive judgments with historical domain changes, IP reverse lookup, whois registration data, etc.

Attack investigationAnalysis for threat evolvement and transformation, intention of attack, tactical ability, target of attack

Intelligence context

Providing information of attack organization, attack incident, malware family, etc.

Sandbox behavior analysis

Main function of malwares, anti-avoidance techniques and internet infrastructure.

Advanced Analysis

Comprehensive judgments with historical domain changes, IP reverse lookup, whois registration data, etc.

Cyber group IdentifyProfile of cyber groups behind attack, network resources owned by actors

Correlation analysis

Correlation analysis ip, domain, whois registration data, sample, etc.

Whois

3 years whois information, includes: registration email, phone number, etc.

Intelligence context

Internet resources, attacks and others that attackers related to.

Cyber abnormality trackmonitor abnormality of cyber activities, raise the alerts

In development

Our advantage

6years Passive DNS data
6years Whois historical data
200+Threat intelligence Sources
1 billion +whitelist

Threat Intelligence

More than 200 Threat intelligence source , ten millions survival IOC Intelligence

Threat Data

Billions of domain names ,6 years Passive DNS , 6 years Whois historical data

Sample files

1 billion whitelist librarie and hundred millions malicious file samples

Data Processing

Behavior sandbox , data association, expert rules , machine learning , visualization

Partner

More...