Cyber Threat Intelligence Feed

Threat intelligence from multiple sources, ready to integrate with SIEM, SOAR and IDS/IPS.

What is Cyber Threat Intelligence Feed?

Cyber Threat Intelligence Feed (CTI Feed) is a curated, multi-source stream of unique, high-quality threat intelligence designed for automated use in security pipelines. It provides indicators of compromise (IOCs) such as phishing and malicious URLs, threat domains, spam domains, attacker infrastructure IP addresses and malicious file hashes. CTI Feed integrates with SIEM, SOAR, IDS/IPS and is used by security teams, vendors, financial institutions, and other organizations with high security requirements to detect, prevent, and respond to threats faster.

Who is it designed for?

Shield icon with a dollar sign in the center.

Critical infrastructure


Automate protection where minutes matter, not manual feed handling. Reduce toil and analyst fatigue, so your team can block threats faster and cut response time.
Icon of a person at a laptop with a warning message.

Security teams


Make faster, better decisions with threat context and stop drowning in alerts. CTI Feed helps you automate the right actions-not false alarms.
Database with an electronic circuit icon.

Security Vendors


Don’t let weak threat data make your product look blind. Customers won’t blame your data provider; they’ll blame your product.
Icon representing a stack of banknotes.

Financial Institutions


Go beyond “everyone has the same intel.” Detect rare, local, finance-targeted campaigns that standard feeds miss.

How does CTI Feed support threat detection and response?

CTI Feed delivers up-to-date threat intelligence in the form of reports and indicators of compromise (IoCs). Data can be retrieved via a REST API or received as email alerts. With SIEM and IDS/IPS integrations, this intelligence can automatically power detection rules and accelerate incident response.

Woman with a laptop sitting on servers next to a cloud icon and a shield with a padlock.

What sources does CTI Feed data come from?

CTI Feed is multi-source.

Data sources include Webcrawlers, Domains Radar, PhishingAV, and Spam. A significant part of the data also comes from PREBYTES SIRT work in incident response and threat research. The collection infrastructure includes a farm of 100+ crawlers and a dedicated webpage analysis pipeline for phishing detection.

What data formats are available?

The formats are designed for machine-to-machine integration.

Formats are tailored for seamless integration. Depending on your API configuration, data is available in STIX, CSV, JSON, XML, or TEXT, ensuring compatibility with virtually any SIEM, SOAR or IDS/IPS solution.
Two people in a server room: one sitting at a desk with multiple monitors, another standing and holding a tablet near server racks.
Woman standing next to a server rack holding a shield, with icons of an envelope, credit card, login form, and folder hanging on fishing hook.

Can the data be filtered and prioritized?

Yes – the data scope can be aligned with operational needs.

Results can be filtered by source (e.g., SPAM, SIRT, or ALL), by risk threshold (e.g., a selected risk score level), and by time–such as entries updated in the last 30 days or within a specific date range.

How does CTI Feed work?

CTI Feed combines outputs from PREBYTES AI automation and expert validation by PREBYTES SIRT (Security Incident Response Team). Both streams feed into the central CTI Feed, which can be forwarded to SIEM, SOAR and IDS/IPS systems.

CTI Feed Integration with Your Infrastructure

01

REST API Access

CTI Feed is available via REST API for automated machine-to-machine processing.

02

Tool Integration

CTI Feed data feeds SIEM, SOAR and IDS/IPS and detection rules.

03

Operational Use by Security Teams

Runs in the background, supporting alerting, correlation, and faster response.

Database icon with a malware symbol.

Reduce Alert Fatigue and Analyst Workload

In high-alert-volume environments, security teams lose time on manual triage and context building. High-quality CTI Feed data reduces noise from non-actionable signals, freeing up analyst hours and shortening response times without complex on-premise installation or the need to build an in-house data collection backbone.

Protecting mobile app users

CTI Feed also covers malicious Android applications as a distinct vector of online threat intelligence. This enables organizations to identify mobile threats faster and incorporate them operationally alongside phishing, malicious URLs, domains, IP addresses, and file hashes.

Smartphone displaying a malware scanning icon.
Database with an electronic circuit icon.

Feed updates and working with current indicators

Cyber Threat Intelligence Feed delivers online threat intelligence with real-time updates. Live IoCs can be immediately integrated into security controls to trigger instant blocks and alerts, before attack campaigns impact users and systems. Unlike semi-static feeds updated once per day, CTI Feed is built for immediate operational response.

Stop attacks in real-time

Test CTI Feed quality
BOOK A MEETING

How does CTI Feed differ
from standard Threat Intelligence lists?

The comparison below outlines the architecture, data coverage, and integration capabilities of CTI Feed versus typical market solutions.

PREBYTES logo

COMPETITOR SOLUTIONS

 DATA QUALITY

Hybrid Model: 100+ crawlers + SIRT expert verification

Automated only (High level of False Positives)

ISP & CLOAKING

Multi-ISP: Bypasses blocking & detects hidden content (cloaking)

Cloaking prone: Scanner sees "clean" content

PAYLOADS

Auto-Download: Safe threat file delivery for analysis

URL/Hash only. Risky manual retrieval required

COVERAGE

Phishing, URL, IP, Hash, Mobile Apps + Removal List

Often missing Mobile, Hashes & Removal List

UPDATES

Real-Time: Updates every minute

Periodic (batch) updates. Delayed data

FILTERING

Precise: By Source, Time & Risk Score

No filters – "all-or-nothing" stream

INTEGRATION

REST API: STIX, TAXII, CSV, JSON, XML

CSV, JSON (occasionally XML); file downloads, limited or no STIX/TAXII support

 IMPACT

Reduced Noise: validated by SIRT, offloading SOC from manual verification

High noise forcing manual triage

BUSINESS VALUE

Risk Reduction: Proactive prevention of data breaches & attacks using high-fidelity data

Higher Exposure: Increased risk of successful attacks due to missed threats (False Negatives)

CTI Feed implementation results in numbers

Improved Protection

Better Threat Visibility

High Value for Vendors

94

%

95

%

90

%

of surveyed security teams confirmed improved protection levels and reduced cyber risk.
of surveyed security teams recommend CTI Feed for its full online threat context.
of security vendors selected our feeds for their 24/7 updates of unique, multi-source threat data.

Pricing suited for all business

Cyber Threat Intelligence
Plans

Professional

Perfect for protecting SME network and upgrading existing security

Enterprise

High performance and enhanced support for large organizations with security team

Business

Limitless, valuable source of cyberthreats for security providers and ISPs

Redistribution

Highly customizable and unlimited access to our databases for security vendors
ACCOUNTS

Nodes

1 node per user

Up to 1,000 nodes per user

Up to 5,000 nodes per user

Unlimited

API limits per user

1 request / min
10 000 requests / month

100 request / min
100 000 requests / month

500 requests / min
1 000 000 requests / mth

1000 requests / min
Unlimited

User limit

1 User

5 Users

Unlimited

Unlimited

Threats update time

24 hours

5 min

1 min

1 min

Threats limits per request

1000 items

10000 items

30000 items

Unlimited

SECURITY BOOSTER PACK

Access to archive IOCs

1 month or 10 000 items

3 months or 30 000 items

3 months or 30 000 items

3 months / unlimited items

Access to archive samples

-

30 days

30 days

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

-

add-on

Real-time delivery executable samples

-

-

Fully automated (machine-to-machine)

On-demand samples API

-

-

Malicious URL feed

-

-

Phishing URLs with brand name

-

-

add-on

SaaS / SECaaS license

-

-

Redistribution license

-

-

-

INDICATORS OF COMPROMISE

Domain name

URL address

-

-

Extended URL metadata

-

-

IP address (basic)

-

add-on

File hash

-

add-on

SUPPORT

E-mail

9:00 am- 5:00 pm (UTC)
Monday - Friday

24 h / 7

ACCOUNTS

Nodes

Up to 3 nodes per user

API limits per user

1 request / min
10 000 requests / month

User limit

1 User

SECURITY BOOSTER PACK

Access to archive IOCs

1 month or 10 000 items

Access to archive samples

-

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

-

Real-time delivery executable samples

-

Fully automated (machine-to-machine)

On-demand samples API

-

Malicious URL feed

-

Phishing URLs with brand name

-

SaaS / SECaaS license

-

Redistribution license

-

INDICATORS OF COMPROMISE

Domain name

URL address

-

Extended URL metadata

-

IP address (basic)

-

File hash

-

SUPPORT

E-mail

9:00 am- 5:00 pm (UTC)
Monday - Friday

Chat

-

ACCOUNTS

Nodes

Up to 1,000 nodes per user

API limits per user

100 request / min
100 000 requests / month

User limit

5 Users

SECURITY BOOSTER PACK

Access to archive IOCs

3 months or 30 000 items

Access to archive samples

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

add-on

Real-time delivery executable samples

-

Fully automated (machine-to-machine)

On-demand samples API

-

Malicious URL feed

-

Phishing URLs with brand name

-

SaaS / SECaaS license

-

Redistribution license

-

INDICATORS OF COMPROMISE

Domain name

URL address

-

Extended URL metadata

-

IP address (basic)

File hash

SUPPORT

E-mail

9:00 am- 5:00 pm (UTC)
Monday - Friday

Chat

ACCOUNTS

Nodes

Up to 5,000 nodes per user

API limits per user

500 requests / min
1 000 000 requests / mth

User limit

Unlimited

SECURITY BOOSTER PACK

Access to archive IOCs

3 months or 30 000 items

Access to archive samples

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

Real-time delivery executable samples

Fully automated (machine-to-machine)

On-demand samples API

Malicious URL feed

add-on

Phishing URLs with brand name

add-on

SaaS / SECaaS license

Redistribution license

-

INDICATORS OF COMPROMISE

Domain name

URL address

add-on

Extended URL metadata

add-on

IP address (basic)

File hash

add-on

SUPPORT

E-mail

24 h / 7

ACCOUNTS

Nodes

Unlimited

API limits per user

1000 requests / min
Unlimited

User limit

Unlimited

SECURITY BOOSTER PACK

Access to archive IOCs

3 months / unlimited items

Access to archive samples

30 days

DESIGN INTERACTIONS

High-throughput REST API

Self-defined customized output

Adjustable risk score filter

Samples repository

Real-time delivery executable samples

Fully automated (machine-to-machine)

On-demand samples API

Malicious URL feed

add-on

Phishing URLs with brand name

add-on

SaaS / SECaaS license

Redistribution license

INDICATORS OF COMPROMISE

Domain name

URL address

add-on

Extended URL metadata

add-on

IP address (basic)

File hash

SUPPORT

E-mail

24 h / 7

Chat

Professional
IOCs for upgrading security

This license allows every organization upgrade their existing security. The Cyber Threat Intelligence DOMAINS feed will instantly boost your protection level without spending time selecting the right Cyber Threat Intelligence provider. 

$2000
month billed annually
Get Started
Enterprise
Perfect for protecting your network

This license is perfect for every organization demanding access to real-time cyber threat intelligence. Multiple output formats from an API allow you to integrate it into almost every purpose. You may not redistribute the feed or provide any commercial or free service.

$3200
month billed annually
Get Started
Business
Threat intelligence for your product

This version is best for Managed Security Service Providers who provide SIEM analysis, an on-access filtering service. Also, select this option if you are ISP or Security Vendor so you can incorporate the feed into your software or SaaS product.

Contact us
Get Started
Redistribution
Best for CTI providers

This allows you to use feed in your filtering database and redistribute directly to your clients.

You may change the format and branding is not required. This is most flexible version of Cyber Threat Intelligence.

Contact us
Get Started
Professional
IOCs for upgrading security

This license allows every organization upgrade their existing security. The Cyber Threat Intelligence DOMAINS feed will instantly boost your protection level without spending time selecting the right Cyber Threat Intelligence provider. 

$2250
month billed quarterly
Get Started
Enterprise
Perfect for protecting your network

This license is perfect for every organization demanding access to real-time cyber threat intelligence. Multiple output formats from an API allow you to integrate it into almost every purpose. You may not redistribute the feed or provide any commercial or free service.

$3600
month billed quarterly
Get Started
Business
Threat intelligence for your product

This version is best for Managed Security Service Providers who provide SIEM analysis, an on-access filtering service. Also, select this option if you are ISP or Security Vendor so you can incorporate the feed into your software or SaaS product.

Contact us
Get Started
Redistribution
Best for CTI providers

This allows you to use feed in your filtering database and redistribute directly to your clients.

You may change the format and branding is not required. This is most flexible version of Cyber Threat Intelligence.

Contact us
Get Started
Professional
IOCs for upgrading security

This license allows every organization upgrade their existing security. The Cyber Threat Intelligence DOMAINS feed will instantly boost your protection level without spending time selecting the right Cyber Threat Intelligence provider. 

$2500
monthly
Get Started
Enterprise
Perfect for protecting your network

This license is perfect for every organization demanding access to real-time cyber threat intelligence. Multiple output formats from an API allow you to integrate it into almost every purpose. You may not redistribute the feed or provide any commercial or free service.

$4000
monthly
Get Started
Business
Threat intelligence for your product

This version is best for Managed Security Service Providers who provide SIEM analysis, an on-access filtering service. Also, select this option if you are ISP or Security Vendor so you can incorporate the feed into your software or SaaS product.

Contact us
Get Started
Redistribution
Best for CTI providers

This allows you to use feed in your filtering database and redistribute directly to your clients.

You may change the format and branding is not required. This is most flexible version of Cyber Threat Intelligence.

Contact us
Get Started

6 key reasons to choose PREBYTES

Instant access to always up-to-date threat intelligence

Phishing attack icon.
Phishing pages
Web browser with a target symbol icon.
Malicious file hashes
Infected files icon
Domains used in spam campaigns
Smartphone with a warning alert icon.
Malware distribution pages
Open envelope with a warning sign icon.
Malicious Android applications
IP address location icon.
IP addresses used in infrastructure attacks

Frequently asked questions about CTI Feed (FAQ)

TRY IT NOW
Close window
Get STARTED

Get all of the things today!

Free, no obligation consultation. You can either give us a call, or complete the form if you prefer email.

Via phone
Give us a call and ask, we won’t hassle.

+44 7915-525-434

Let us know how we can reach you

More about a privacy policy can be found here.
Thank you!

Your submission has been received! We will contact you shortly.
Close window
Oops! Something went wrong while submitting the form.
Not now, close window

Trusted by organizations around the world

Bank Millennium S.A.
Bank Credit Agricole S.A.
PKO Bank Polski S.A.
Bank Pekao S.A.
Santander Bank Polska S.A.
PayU S.A.
McAfee LLC
Fortinet Inc.
Check Point Software Technologies Ltd.
MicroWorld Technologies Inc.
Intel Corporation
FireEye Inc.
F-Secure Inc.
CSIS Security Group A/S
BNP Paribas S.A.
Raiffeisen Bank Polska S.A.
NSS Labs
Podkarpacki Bank Spółdzielczy
Bank BPS S.A.
Trellix
zondacrypto
What else can you do to protect your business?

MPShield

Prevent Account Takeover, stop fraud and money laundering.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA).

See more

Remote Desktop Detection

Prevent remote access scam and remote desktop takeover.

See more

Mobile Application Security

Protect your application against emulators, malware, and takeover.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Remote access fraud prevention

Identify and reduce fraud associated with attacks leveraging remote desktop.

See more

Threat Analysis

Professional cyberthreats analysis.

See more

Incident Handling

Professional cyberthreats mitigation.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

SIRT News

Cybersecurity awareness newsletter to keep your organization up to date.

See more
What else can you do to protect your business?

MPShield

Prevent Account Takeover, stop fraud and money laundering.

See more

DynaProfile

Device digital fingerprint and Strong User Authentication (SCA).

See more

Remote Desktop Detection

Prevent remote access scam and remote desktop takeover.

See more

Mobile Application Security

Protect your application against emulators, malware, and takeover.

See more

Cyber Threat Intelligence

Real-time access to online threats for your IDS/IPS, MISP, SIEM, and incident response team.

See more

Threat Analysis

Professional cyberthreats analysis.

See more

Incident Handling

Professional cyberthreats mitigation.

See more

Dark Web Investigation

Investigate the internet for harmful content for your organization.

See more

SIRT News

Cybersecurity awareness newsletter to keep your organization up to date.

See more

Remote access fraud prevention

Identify and reduce fraud associated with attacks leveraging remote desktop.

See more