OSINT and CAL Feeds
  • 22 Jul 2024
  • 4 Minutes to read
  • Dark
    Light

OSINT and CAL Feeds

  • Dark
    Light

Article summary

ThreatConnect® includes several open-source intelligence (OSINT) and CAL™ feeds that you can use to ingest real-time data into corresponding Sources in your instance. CAL feeds take focused OSINT information and combine it with ThreatConnect's collective analytics to deliver targeted information about common cyber threat intelligence (CTI) use cases.

Once feed data are ingested, you can aggregate, correlate, enrich, and operationalize them automatically. The following table lists the name of each feed included in ThreatConnect by default and the feed’s type (OSINT or CAL).

Feed NameFeed TypeDescription
abuse.ch Feodo TrackerOSINTA list of Feodo (also known as Cridex or Bugat) malware family Indicators from feodotracker.abuse.ch.
abuse.ch ThreatFoxOSINTThreatFox is a free platform from abuse.ch that shares Indicators of compromise (IOCs) associated with malware with the information security community, AV vendors, and threat intelligence providers.
abuse.ch URLHausOSINTMalicious URLs tracked on URLhaus.
Blocklist.de Apache IPsOSINTIP addresses reported within the last 48 hours as having run attacks on the Apache®, Apache-DDOS, or RFI-Attacks service, courtesy of blocklist.de.
Blocklist.de Bot IPsOSINTIP addresses reported within the last 48 hours as having run attacks on the RFI-Attacks, REG-Bots, IRC-Bots, or BadBots (i.e., a bot that has posted a spam comment on an open forum or wiki) service, courtesy of blocklist.de.
Blocklist.de Bruteforce IPsOSINTIP addresses that have attacked Joomla!®, WordPress®, and other web logins with brute-force logins, courtesy of blocklist.de.
Blocklist.de FTP IPsOSINTIP addresses reported within the last 48 hours for attacks on the FTP service, courtesy of blocklist.de.
Blocklist.de IMAP IPsOSINTIP addresses reported within the last 48 hours for attacks on the IMAP, SASL, or POP3 service, courtesy of blocklist.de.
Blocklist.de Mail IPsOSINTIP addresses reported within the last 48 hours as having run attacks on the Mail or Postfix service, courtesy of blocklist.de.
Blocklist.de SIP IPsOSINTIP addresses that tried to log into a Session Initiation Protocol (SIP), Voice over Internet Protocol (VoIP), or Asterisk server, courtesy of blocklist.de.
Blocklist.de SSH IPsOSINTIP addresses reported within the last 48 hours as having run attacks on the SSH service, courtesy of blocklist.de.
Blocklist.de Strong IPsOSINTIP addresses that are older than two months and have more than 5,000 attacks, courtesy of blocklist.de.
BotScout Bot ListOSINTNames, IPs, and email addresses bots use while searching for forms to fill out and submit in order to spread spam, drop links, and gain access to a site so that they can find and exploit additional forms, courtesy of botscout.com.
Botvrij DomainsOSINTA list of malicious domains and hostnames provided by botvrij.eu.
Botvrij IPsOSINTA list of malicious IPs provided by botvrij.eu.
BruteForceBlocker BlocklistOSINTA blocklist of IPs attempting SSH brute-force attacks compiled by Daniel Gerzo's BruteForceBlocker script.
CAL Automated Threat LibraryCALCAL Automated Threat Library aggregates articles from information security blogs; parses them for IOCs, malware families, threat actors, etc.; and models them in ThreatConnect.
CAL Communications-themed NRDsCALA list of newly registered domains (NRDs) suspected of imitating legitimate communications companies.
CAL COVID19-themed Newly Registered DomainsCALA list of newly registered domains (NRDs) related to COVID-19 and the IP addresses observed as DNS resolutions.
CAL Energy-themed NRDsCALA list of newly registered domains (NRDs) suspected of imitating legitimate energy companies.
CAL Finance-themed NRDsCALA list of newly registered domains (NRDs) suspected of imitating legitimate financial companies.
CAL Healthcare-themed NRDsCALA list of newly registered domains (NRDs) suspected of imitating legitimate healthcare companies.
CAL Manufacturing-themed NRDsCALA list of newly registered domains (NRDs) suspected of imitating legitimate manufacturing companies.
CAL Retail-themed NRDsCALA list of newly registered domains (NRDs) suspected of imitating legitimate retail companies.
CAL Russian Malware and Tool IndicatorsCALA list of Indicators associated with malware and tools used by Russian nation-state threat actors, based on CAL enrichments and MITRE ATT&CK® Groups and Software.
CAL Suspected DGA NRDsCALA list of newly registered domains (NRDs) suspected of being created via a domain generation algorithm (DGA).
CAL Suspected Ranking ManipulatorsCALA list of newly registered domains (NRDs) suspected of manipulating web traffic rankings to appear legitimate.
CAL Suspicious NameserversCALA list of nameservers being used by a significant number of malicious domains.
CAL Suspicious New Resolution IPsCALA list of IP addresses seen as DNS resolutions of malicious hosts.
CAL Suspicious Newly Registered DomainsCALA list of newly registered domains (NRDs) that resolve to malicious infrastructure.
CINS Army IP ListOSINTThe Collective Intelligence Network Security (CINS) list of IP addresses that have tripped a designated number of “trusted” alerts across several CINS Sentinels deployed globally.
CyberCrime TrackerOSINTA list of malicious Indicators from CyberCrime Tracker.
Dan.me Tor Exit NodesOSINTA list of Tor exit node IP addresses maintained by dan.me.uk.
Disconnect.me MalvertisingOSINTA list of malicious advertising domains maintained by Disconnect.me.
DShield.org Recommended Blocklist CIDRsOSINTThe top 20 attacking CIDRs over the last three days.
Firebog Prigent Malware DomainsOSINTA list of malware domains managed by Fabrice Prigent at dsi.ut-capitole.fr, which is hosted by firebog.net.
GreenSnow BlocklistOSINTThe GreenSnow project helps identify various attacks around the world in order to block them. Attacks that are monitored include port scans, FTP, POP3, mod_security, IMAP, SMTP, SSH, and cPanel.
Haley SSH Bruteforce IPsOSINTIP addresses launching SSH dictionary attacks, as reported to charles.the-haleys.org.
Hybrid AnalysisOSINTA feed of files submitted to the free malware analysis service powered by Payload Security.
Maldun Malware AnalysisOSINTFile analysis results from maldun.com, a Chinese malware sandboxing site.
Maldun Malware Analysis URLsOSINTURL analysis results from maldun.com, a Chinese malware sandboxing site.
MalShare Daily Malware ListOSINTDaily malware list from Malshare Project's public repository.
Maltrail Agent TeslaOSINTAgent Tesla malware URLs, hosts, and IPs from Maltrail.
Maltrail AnubisOSINTAnubis malware URLs, hosts, and IPs from Maltrail.
Maltrail BankbotOSINTBankbot malware URLs, hosts, and IPs from Maltrail.
Maltrail BlackshadeOSINTBlackshade malware hosts and IPs from Maltrail.
Maltrail CerberusOSINTCerberus malware URLs, hosts, and IPs from Maltrail.
Maltrail DridexOSINTDridex malware URLs, hosts, and IPs from Maltrail.
Maltrail FormbookOSINTFormbook malware URLs, hosts, and IPs from Maltrail.
Maltrail GamaredonOSINTGamaredon malware URLs, hosts, and IPs from Maltrail.
Maltrail GenericOSINTGeneric malware URLs, hosts, and IPs from Maltrail.
OpenPhishOSINTPhishing URLs reported by OpenPhish.com.
PhishTankOSINTA list of URLs, hosts, and IPs found in phishing emails, as reported to PhishTank.
Rutgers Attacker IPsOSINTRutgers University’s report of attacker IP addresses.
StopForumSpam Toxic CIDRsOSINTCIDR netblocks reported to engage in forum abuse by stopforumspam.com.
VXVaultOSINTA list of malicious indicators from the VX Vault malware tracker.

ThreatConnect® is a registered trademark, and CAL™ is a trademark, of ThreatConnect, Inc.
Joomla!® is a registered trademark of Open Source Matters, Inc.
Apache® is a registered trademark of The Apache Software Foundation.
MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation.
WordPress® is a registered trademark of WordPress Foundation.

20160-01 v.02.A


Was this article helpful?


What's Next