CTI Feed -Database about online threats

Cyber Threat Intelligence

Real-time information source about online threats

Cyber Threat Intelligence Feed

Delivers continuously up-to-the-minute information and context about cyberattacks that threaten your organization's safety. It enables comprehensive monitoring, detection, and response to online threats, providing multi-source database that support the cyberdefence mechanisms. The CTI Feed covers all major attack vectors like malicious URLs, phishing URLs, spam, bot IPs, social media, and websites.

How does CTI Feed work?

Cyber Threat Intelligence Feed provides information on the global online threats collected from unique tools supported by artificial intelligence - PREBYTES AI and team analytical activity - PREBYTES SIRT, that handles the security incident response daily. Threat reports are accessible through HTTP API and as e-mail alerts. CTI Feed integration with SIEM and IDS/IPS enables fast detecting and alerting about current or potential attacks against an organization.
Ask for evaluation

Cyber Threat Intelligence Feed

Protection area:infrastructure

Deployment time

short

Complexity

low

Required resources

already existing

Usage flexibility

high

Real-time phishing and malicious URL

You might likely find other providers of this crucial information, but only a few care about scanning and validating the threats. Additionally, we use web crawlers to download threat files and send them to you. Also, we provide access to the removal list, so you don't need to check when threats are gone.

Always up-to-date IOC

We use proprietary machine-learning models and sophisticated tools to provide ready-to-use IOCs. Our robust and customizable API lets you decide which data to import to SIEM and which to include in IDS/IPS detection.

What formats are available?

Depending on the API, you can download the data as a STIX, CSV, JSON, XML, or TEXT. We provide everything you need to program a machine-to-machine interface.

Cyber Threat intelligence

Over 1000+ completed
integrations.

2 000 000

websites and domains scanned daily

150 000+

analyzed spam
messages daily

100 000+

domains being a threat
at this moment

Benefits

Cyber Threat Intelligence Feed

PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks

Critical infrastructure

Automate your network protection and labor-intensive tasks.
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks

Security teams

Make better and faster decisions to combat attacks.
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks

Security Vendors

Improve your security products performance with our up-to-date threat database.
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks

Financial Institutions

Minimize the risk of cyberattacks and save your company from brand damage.

94

%

Of the security teams surveyed confirmed that PREBYTES Cyber Threat Intelligence has helped upgrade the current level of cyber protection and significantly reduce risk.

95

%

Of the security teams surveyed are likely to recommend CTI Feeds for better global visibility of online threats in full context.

90

%

Of the security vendors surveyed have chosen our data feeds because of solutions enrichments with extra security defense layer and updated in real-time 24/7 threat intelligence from multiple sources.

Pricing suited for all business

ACCOUNTS

Nodes

1 node per user

Up to 1,000 nodes per user

Up to 5,000 nodes per user

Unlimited

API limits per user

1 request / min
10 000 requests / month

100 request / min
100 000 requests / month

500 requests / min
1 000 000 requests / mth

1000 requests / min
Unlimited

User limit

1 User

5 Users

Unlimited

Unlimited

Threats update time

24 hours

5 min

1 min

1 min

Threats limits per request

1000 items

10000 items

30000 items

Unlimited

SECURITY BOOSTER PACK

Access to archive IOCs

1 month or 10 000 items

3 months or 30 000 items

3 months or 30 000 items

3 months / unlimited items

Access to archive samples

-

30 days

30 days

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

-

add-on

Real-time delivery executable samples

-

-

Fully automated (machine-to-machine)

On-demand samples API

-

-

Malicious URL feed

-

-

add-on

add-on

Phishing URLs with brand name

-

-

add-on

add-on

SaaS / SECaaS license

-

-

Redistribution license

-

-

-

INDICATORS OF COMPROMISE

Domain name

URL address

-

-

add-on

add-on

Extended URL metadata

-

-

add-on

add-on

IP address (basic)

-

add-on

File hash

-

add-on

SUPPORT

E-mail

9:00 am- 5:00 pm (UTC)
Monday - Friday

24 h / 7

Chat

-

ACCOUNTS

Nodes

Up to 3 nodes per user

API limits per user

1 request / min
10 000 requests / month

User limit

1 User

SECURITY BOOSTER PACK

Access to archive IOCs

1 month or 10 000 items

Access to archive samples

-

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

-

Real-time delivery executable samples

-

Fully automated (machine-to-machine)

On-demand samples API

-

Malicious URL feed

-

Phishing URLs with brand name

-

SaaS / SECaaS license

-

Redistribution license

-

INDICATORS OF COMPROMISE

Domain name

URL address

-

Extended URL metadata

-

IP address (basic)

-

File hash

-

SUPPORT

E-mail

9:00 am- 5:00 pm (UTC)
Monday - Friday

Chat

-

ACCOUNTS

Nodes

Up to 1,000 nodes per user

API limits per user

100 request / min
100 000 requests / month

User limit

5 Users

SECURITY BOOSTER PACK

Access to archive IOCs

3 months or 30 000 items

Access to archive samples

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

add-on

Real-time delivery executable samples

-

Fully automated (machine-to-machine)

On-demand samples API

-

Malicious URL feed

-

Phishing URLs with brand name

-

SaaS / SECaaS license

-

Redistribution license

-

INDICATORS OF COMPROMISE

Domain name

URL address

-

Extended URL metadata

-

IP address (basic)

File hash

SUPPORT

E-mail

9:00 am- 5:00 pm (UTC)
Monday - Friday

Chat

ACCOUNTS

Nodes

Up to 5,000 nodes per user

API limits per user

500 requests / min
1 000 000 requests / mth

User limit

Unlimited

SECURITY BOOSTER PACK

Access to archive IOCs

3 months or 30 000 items

Access to archive samples

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

Real-time delivery executable samples

Fully automated (machine-to-machine)

On-demand samples API

Malicious URL feed

add-on

Phishing URLs with brand name

add-on

SaaS / SECaaS license

Redistribution license

-

INDICATORS OF COMPROMISE

Domain name

URL address

add-on

Extended URL metadata

add-on

IP address (basic)

File hash

add-on

SUPPORT

E-mail

24 h / 7

Chat

ACCOUNTS

Nodes

Unlimited

API limits per user

1000 requests / min
Unlimited

User limit

Unlimited

SECURITY BOOSTER PACK

Access to archive IOCs

3 months / unlimited items

Access to archive samples

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

Real-time delivery executable samples

Fully automated (machine-to-machine)

On-demand samples API

Malicious URL feed

add-on

Phishing URLs with brand name

add-on

SaaS / SECaaS license

Redistribution license

INDICATORS OF COMPROMISE

Domain name

URL address

add-on

Extended URL metadata

add-on

IP address (basic)

File hash

SUPPORT

E-mail

24 h / 7

Chat

Professional
IOCs for upgrading security

This license allows every organization upgrade their existing security. The Cyber Threat Intelligence DOMAINS feed will instantly boost your protection level without spending time selecting the right Cyber Threat Intelligence provider. 

$199
month billed annually
Get Started
Enterprise
Perfect for protecting your network

This license is perfect for every organization demanding access to real-time cyber threat intelligence. Multiple output formats from an API allow you to integrate it into almost every purpose. You may not redistribute the feed or provide any commercial or free service.

$500
month billed annually
Get Started
Business
Threat intelligence for your product

This version is best for Managed Security Service Providers who provide SIEM analysis, an on-access filtering service. Also, select this option if you are ISP or Security Vendor so you can incorporate the feed into your software or SaaS product.

$3500
month billed annually
Get Started
Redistribution
Best for CTI providers

This allows you to use feed in your filtering database and redistribute directly to your clients.

You may change the format and branding is not required. This is most flexible version of Cyber Threat Intelligence.

Contact us
Get Started
Professional
IOCs for upgrading security

This license allows every organization upgrade their existing security. The Cyber Threat Intelligence DOMAINS feed will instantly boost your protection level without spending time selecting the right Cyber Threat Intelligence provider. 

$256
month billed quarterly
Get Started
Enterprise
Perfect for protecting your network

This license is perfect for every organization demanding access to real-time cyber threat intelligence. Multiple output formats from an API allow you to integrate it into almost every purpose. You may not redistribute the feed or provide any commercial or free service.

$720
month billed quarterly
Get Started
Business
Threat intelligence for your product

This version is best for Managed Security Service Providers who provide SIEM analysis, an on-access filtering service. Also, select this option if you are ISP or Security Vendor so you can incorporate the feed into your software or SaaS product.

$4500
month billed quarterly
Get Started
Redistribution
Best for CTI providers

This allows you to use feed in your filtering database and redistribute directly to your clients.

You may change the format and branding is not required. This is most flexible version of Cyber Threat Intelligence.

Contact us
Get Started
Professional
IOCs for upgrading security

This license allows every organization upgrade their existing security. The Cyber Threat Intelligence DOMAINS feed will instantly boost your protection level without spending time selecting the right Cyber Threat Intelligence provider. 

$285
monthly
Get Started
Enterprise
Perfect for protecting your network

This license is perfect for every organization demanding access to real-time cyber threat intelligence. Multiple output formats from an API allow you to integrate it into almost every purpose. You may not redistribute the feed or provide any commercial or free service.

$800
monthly
Get Started
Business
Threat intelligence for your product

This version is best for Managed Security Service Providers who provide SIEM analysis, an on-access filtering service. Also, select this option if you are ISP or Security Vendor so you can incorporate the feed into your software or SaaS product.

$5000
monthly
Get Started
Redistribution
Best for CTI providers

This allows you to use feed in your filtering database and redistribute directly to your clients.

You may change the format and branding is not required. This is most flexible version of Cyber Threat Intelligence.

Contact us
Get Started

Protect your business from cyberattacks with

Cyber Threat Intelligence Feed

Ask for evaluation
  • Protect your network infrastructure against malware, phishing, APT (Advanced Persistent Threat) and hackers.
  • Fight with cyberattacks proactively and strengthen your organization's cyberdefence.
  • Prevent your company from severe financial losses, cost of cleaning up after incidents and penalties caused by confidential data leakage.

6 key reasons to choose PREBYTES

Cyber Threat Intelligence Feed

PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks
Over 2M+ URLs scanned per day
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks
Easy rest API access
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks
Data updates in real-time
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks
Human and machine friendly
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks
Seamless integration with your infrastructure
PREBYTES is a global provider of cyber security services for fintech, security vendors, online services and e-commerce. Cyber threat analysis, incident handling and support in the event of cyber attacks
AI-driven intelligence for greater mitigation of risk

Powerful
cybersecurity
protection

Do you have a challenge to solve?
Level up your security
Close window
Get STARTED

Get all of the things today!

Free, no obligation consultation. You can either give us a call, or complete the form if you prefer email.

Via phone
Give us a call and ask, we won’t hassle.

+44 7960-414-974

Not now, close window

Let us know how we can reach you

More about a privacy policy can be found here.
Thank you!

Your submission has been received! We will contact you shortly.
Close window
Oops! Something went wrong while submitting the form.
What else can you do to protect your business?

BrowserWall DNS

Protect network and block access to dangerous websites.

See more

Website Protection

Ensure business continuity and defend your online assets.

See more

MPShield

Prevent Account Takeover, stop fraud and money laundering.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA)

See more

Remote Desktop Detection

Prevent remote access scam and remote desktop takeover.

See more

Mobile Application Security

Protect your application against emulators, malware, and takeover.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

Anti-Malware

Protect your business against malware attacks.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Threat Analysis

Professional cyberthreats analysis

See more

Incident Handling

Professional cyberthreats mitigation

See more

BrowserWall DNS

Protect network and block access to dangerous websites.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

Anti-phishing

Protect your brand against phishing attacks.

See more

SIRT News

Cybersecurity awareness newsletter to keep your organization up to date.

See more
What else can you do to protect your business?

Remote Desktop Detection

Prevent remote access scam and remote desktop takeover.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA)

See more

Website Protection

Ensure business continuity and defend your online assets.

See more

MPShield

Prevent Account Takeover, stop fraud and money laundering.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA)

See more

BrowserWall DNS

Protect network and block access to dangerous websites.                

See more

Mobile Application Security

Protect your application against emulators, malware, and takeover.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

Anti-Malware

Protect your business against malware attacks.

See more

Incident Handling

Professional cyberthreats mitigation.

See more