- Continuously updated
- Bad Guys
- Listing of identified threat actors
- Augmented with news and additional documentation (automatically cross-linked in real-time)
- Indications of Compromise
- IP addresses
- Hashes (md5, sha-1, sha-256)
- Enriched IoC database
- IP address ownership
- Supporting infrastructure
- Historical data
- Common Vulnerability Enumerations (CVEs)
- Automatically cross-linked to all industry mentions in real-time