DRP - Digital Risk Protection
IP addresses
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
URLs
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
TTPs category threats
AvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliable
Hashes
AvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliable
Domains
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Registry keys
AvaliableN/AN/AAvaliableN/AN/AAvaliable
Card BINs
AvaliableN/AAvaliableAvaliableN/AAvaliableAvaliable
Code
AvaliableN/AAvaliableN/AN/AAvaliableN/A
Email Addresses
AvaliableN/AAvaliableN/AN/AAvaliableAvaliable
Phone Numbers
AvaliableN/AAvaliableN/AN/AN/AAvaliable
Crypto Wallet Addresses
AvaliableN/AAvaliableN/AN/AAvaliableAvaliable
Indicators from Social Media
AvaliableAvaliableAvaliableN/AN/AAvaliableAvaliable
Vulnerability Intelligence (CVE’s)
AvaliableN/AN/AN/AAvaliableAvaliableAvaliable
Actors
AvaliableAvaliableN/AN/AAvaliableN/AAvaliable
VIP Protection
AvaliableN/AAvaliableN/AN/AAvaliableN/A
Mobile app protection
AvaliableN/AN/AN/AN/AAvaliableN/A
Brand protection
AvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliable
Data Leakage
AvaliableN/AN/AN/AN/AAvaliableN/A
Data enrichment (threat ratings, threat tagging, additional and other additional information)
AvaliableAvaliableAvaliableAvaliableAvaliableAvaliableAvaliable
Feed Exchange Platform
AvaliableN/AAvaliableN/AAvaliableAvaliableAvaliable
Ways of interaction
  • API
  • API
  • API
  • https
  • API
  • https
  • TAXII
  • API
  • API
The amount of data provided
14M+N/AN/AN/AN/AN/AN/A
Data format
  • JSON
  • XML
  • STIX
  • CSV
  • STIX
N/A
  • JSON
  • STIX
  • CSV
  • OpenIoC
  • JSON
  • STIX
  • TAXII
  • JSON
  • XML
  • STIX
  • CSV
  • JSON
  • STIX
  • TAXII
DRP - Digital Risk Protection
IP addresses
URLs
TTPs category threats
Hashes
Domains
Registry keys
Card BINs
Code
Email Addresses
Phone Numbers
Crypto Wallet Addresses
Indicators from Social Media
Vulnerability Intelligence (CVE’s)
Actors
VIP Protection
Mobile app protection
Brand protection
Data Leakage
Data enrichment (threat ratings, threat tagging, additional and other additional information)
Feed Exchange Platform
Ways of interaction
The amount of data provided
Data format