OpenCTI Connectors
AbuseIPDB IP BlackList
Open Source Threat IntelThe AbuseIPDB Blacklist connector let you ingest IP addresses present into Blacklist database of AbuseIPDB. The blacklist is a list of the most reported IP addresses by AbuseIPDB users.
External importAccenture ACTI
Commercial Threat IntelThe OpenCTI Accenture ACTI Connector integrates threat intelligence from Accenture's Cyber Threat Intelligence (ACTI) service directly into OpenCTI. Accenture ACTI provides comprehensive threat reporting based on extensive research and analysis of global cyber threats, including threat actors, campaigns, malware families, and emerging attack techniques.
External importAlienVault OTX
Open Source Threat IntelAlienVault OTX provides open access to a global community of threat researchers and security professionals, delivering community-generated threat data that enhances collaborative research
External importBambenek Consulting
Commercial Threat IntelThe Bambenek connector ingests indicators of compromise (IOCs) from Bambenek Consulting Feeds.
External importCAPE Feed
Malware AnalysisThreat IntelligenceCAPE Sandbox is an Open Source software for automating analysis of suspicious files. CAPE Sandbox connector imports malware analysis results into OpenCTI, enriching threat insights.
External importCISA Known Exploited Vulnerabilities (KEV)
Open Source Threat IntelVulnerability ManagementCISA KEV (Known Exploited Vulnerabilities) is a catalog maintained by the Cybersecurity and Infrastructure Security Agency that lists vulnerabilities actively exploited in the wild
External importCRITs
Threat IntelligenceCRITs Connector migrates threat data from CRITs to OpenCTI, facilitating platform transition.
External importCrowdStrike Falcon Intelligence
Commercial Threat IntelCrowdStrike Falcon Intelligence is an integral threat intelligence module within the Falcon platform, crafted to enhance the speed and effectiveness of threat detection, investigation, and response.
External importNIST NVD CVE
Vulnerability ManagementOpen Source Threat IntelThe NVD facilitates automated vulnerability management, security measurement, and compliance processes by providing comprehensive databases that include: • Vulnerability catalogs • Software vulnerability details • Product identifiers • Severity scoring metrics
External importDISARM Framework
Open Source Threat IntelDISARM is a framework designed for describing and understanding disinformation incidents. This connector import DISARM framework into OpenCTI.
External importDISINFOX
Threat IntelligenceFIMIDISINFOX is a Threat Intelligence Exchange Platform developed by the University of Murcia, Spain, and specialized in disinformation campaigns and fake news. It is a platform that allows to spread intelligence about disinformation campaigns and fake news in real-time to allow organizations with CTI capabilities to act on it
External importDoppel
Commercial Threat IntelDoppel is a modern Digital Risk Protection solution that detects phishing and brand cyberattacks across channels like social media, domains, ads, and the dark web. By identifying malicious content and threats early, Doppel helps organizations proactively remove digital risks.
External importDragos
Commercial Threat IntelDragos is a cybersecurity company specializing in industrial control systems (ICS) and operational technology (OT) security. Their platform provides threat intelligence, incident response, and vulnerability management tailored to ICS/OT environments.
External importEmail Intel IMAP
EmailThreat IntelligenceThe Email Intel IMAP Connector enables the ingestion of cyber threat intelligence reports received via email into the OpenCTI platform using the IMAP protocol.
External importEmail Intel Microsoft
EmailThreat IntelligenceThe Email Intel Microsoft Connector allows for the ingestion of cyber threat intelligence reports received via email in a Microsoft 365/Exchange Online mailbox.
External importFeedly
Commercial Threat IntelFeedly Connector imports curated intelligence from Feedly into OpenCTI, enhancing threat tracking.
External importFlashpoint
Commercial Threat IntelFlashpoint Ignite consolidates team-tailored intelligence across various groups into a single workspace, enabling security teams to connect, collaborate, and remediate risk more efficiently with timely and active intelligence.
External importGoogle Threat Intelligence
Commercial Threat IntelGoogle Threat Intelligence provides unparalleled visibility into threats, enabling the delivery of detailed and timely intelligence to security teams worldwide.
External importGreyNoise Feed
Commercial Threat IntelGreyNoise Feed provides threat intelligence by distinguishing between benign internet noise and real threats, reducing false positives. Its integration with OpenCTI enables automatic ingestion of IP threat data, improving threat detection accuracy and efficiency.
External importHarfangLab Incidents
Incident Response & TicketingEDRHarfangLab Connector imports endpoint incident data from HarfangLab EDR into OpenCTI, enriching threat intelligence.
External importHunt.io
Commercial Threat IntelHunt.io connector imports Observables linked to C2 infrastructures detected by HuntIO sensors.
External importIBM X-Force
Commercial Threat IntelIBM X-Force Connector integrates X-Force threat reports and IOCs into OpenCTI, enhancing threat intelligence.
External importInfoblox
Commercial Threat IntelInfoblox Connector imports threat indicators and observables from Infoblox into OpenCTI, enhancing threat analysis.
External importCognyte Luminar
Commercial Threat IntelCognyte is a global leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world. Our open software fuses, analyzes and visualizes disparate data sets at scale to help security organizations find the needles in the haystacks.
External importMandiant
Commercial Threat IntelImport threat actors, malware, campaigns, vulnerabilities, and indicators from Mandiant Advantage.
External importMISP
Open Source Threat IntelImport threat intelligence events, indicators, and observables from MISP instances.
External importMITRE ATLAS
Open Source Threat IntelMITRE ATLAS is a globally accessible, living knowledge base of adversary tactics and techniques against AI-enabled systems based on real-world attack observations and realistic demonstrations from AI red teams and security groups.
External importMITRE ATT&CK
Open Source Threat IntelMITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
External importPhishunt
Open Source Threat IntelPhishingPhishunt tracks and analyzes phishing threats, helping organizations detect and mitigate email-based attacks. Integration with OpenCTI automates the import of up-to-date phishing intelligence, enhancing the ability to identify and respond to phishing threats.
External importProofpoint TAP
Commercial Threat IntelIncident Response & TicketingPhishingThe Proofpoint TAP connector for OpenCTI allows for the ingestion of phishing campaign data from Proofpoint TAP into the OpenCTI platform.
External importRansomware.live
Open Source Threat IntelRansomware.live is a threat intelligence service focused on ransomware activities, providing real-time insights into ransomware campaigns.
External importRecorded Future
Commercial Threat IntelRecorded Future is a cybersecurity company that specializes in providing real-time threat intelligence to help organizations anticipate, identify, and mitigate cyber threats.
External importRed Flag Domains
Open Source Threat IntelRed Flag Domains are lists of very recently registered probably malicious domain names in french TLDs.
External importSekoia.io
Commercial Threat IntelSekoia.io Cyber Threat Intelligence provides assimilable and relevant reports on the evolving threat landscape, accessible to a broader audience.
External importSentinelOne Incidents
Incident Response & TicketingSIEM & AnalyticsSentinelOne delivers passive and active EDR security via AI threat detection and autonomous response. The OpenCTI SentinelOne Incidents connector will ingest alert data from SentinelOne into the OpenCTI threat intelligence platform. This integration enables security teams to centralise and enrich incident data from SentinelOne, facilitating comprehensive threat analysis and response.
External importServiceNow
Incident Response & TicketingIngestion of SIR and SIT as Case Incident and Tasks.
External importSilobreaker
Commercial Threat IntelSilobreaker helps organizations transform data from millions of open and dark web sources into timely, actionable intelligence for a range of use cases.
External importSOC Prime
Commercial Threat IntelSOC Prime builds collective cyber defense by fusing Detection as Code, Sigma, and MITRE ATT&CK® to help teams proactively defend against emerging threats.
External importSpycloud
Incident Response & TicketingSpyCloud monitors and tracks compromised data, such as login credentials and personal information, across the web and other sources.
External importTenable Security Center
Vulnerability ManagementTenable delivers comprehensive solutions for vulnerability management within IT infrastructures, using detailed assessments and analytics to reduce cyber risk. Integration with OpenCTI allows for seamless import of vulnerability data, enhancing threat intelligence and prioritization.
External importTenable Vulnerability Management
Vulnerability ManagementTenable delivers comprehensive solutions for vulnerability management within IT infrastructures, using detailed assessments and analytics to reduce cyber risk. Integration with OpenCTI allows for seamless import of vulnerability data, enhancing threat intelligence and prioritization.
External importThreatFox
Open Source Threat IntelThreatFox is a platform from abuse.ch and Spamhaus dedicated to sharing indicators of compromise (IOCs) associated with malware, with the infosec community, AV vendors and cyber threat intelligence providers.
External importURLhaus
Open Source Threat IntelURLhaus is a platform from abuse.ch and Spamhaus dedicated to sharing malicious URLs that are being used for malware distribution.
External importVulnCheck
Vulnerability ManagementCommercial Threat IntelVulnCheck provides detailed insights into software vulnerabilities, helping prioritize and remediate security weaknesses. Its integration with OpenCTI brings timely vulnerability data to the platform, enhancing patching prioritization and maintaining a strong security posture.
External importZvelo
Commercial Threat IntelThe Zvelo connector ingests indicators of compromise (IOCs) from Zvelo Cyber Threat Intelligence Feeds.
External importAbuseIPDB
Enrichment & AnalysisAbuseIPDB collects and shares data on malicious IP addresses to help identify and block abusive activities. Integration with OpenCTI imports this data for real-time threat context, enhancing IP blocking and monitoring efforts.
Internal enrichmentFIRST EPSS
Vulnerability ManagementEnrichment & AnalysisFIRST's Exploit Prediction Scoring System (EPSS) predicts the likelihood of a vulnerability being exploited, helping prioritize vulnerability management. Integration with OpenCTI adds exploit probability scores, enhancing risk-based remediation efforts.
Internal enrichmentGoogle DNS
Enrichment & AnalysisGoogle Public DNS is a Google service that provides recursive DNS servers to Internet users used to enrich.
Internal enrichmentHygiene
Enrichment & AnalysisProactively reduces false positives in OpenCTI by matching observables against curated allowlists (e.g., MISP Warninglists), lowering scores for benign items, tagging them with a hygiene label to avoid reprocessing and inform analysts, and when configured with high max confidence safely overriding prior scores so only actionable indicators flow to detection and blocking.
Internal enrichmentIPinfo
Enrichment & AnalysisIPinfo.io provides detailed data on IP ownership, geolocation, and more, enhancing understanding of network traffic origins. Integration with OpenCTI enriches threat intelligence, improving threat analysis and incident response accuracy.
Internal enrichmentShodan
Enrichment & AnalysisShodan is a metadata search engine that scans the internet for connected devices (like servers, routers, webcams). It gathers information such as open ports, SSL certificates, and banners.
Internal enrichmentURLScan Enrichment
Enrichment & AnalysisURLScan is an online service that allows you to scan URLs to analyze and detect potential security threats. It provides a platform where users can submit links to be scanned to obtain information about the page's content, loaded external resources, potential threats, and other relevant security details. The integration of URLScan with OpenCTI enables the automatic enrichment and analysis of IP addresses and URLs.
Internal enrichmentVirusTotal Downloader
Enrichment & AnalysisMalware AnalysisVirusTotal Downloader Connector is an internal enrichment Connector that enables automated and manual submissions of file hashes (MD5, SHA1, and SHA256) to VirusTotal to attempt to retrieve associated file contents. If the file is found in VirusTotal, a new Observable of type Artifact will be uploaded.
Internal enrichmentVirusTotal
Enrichment & AnalysisMalware AnalysisVirusTotal aggregates data from antivirus products and scanners to analyze files and URLs, aiding in the quick identification of malicious content. Its integration with OpenCTI imports analysis results, enriching threat intelligence for efficient threat confirmation and response.
Internal enrichmentVMray Analyzer
Malware AnalysisVMRay provides advanced threat analysis and detection by integrating its unique agentless hypervisor-based sandbox with a real-time reputation engine.
Internal enrichmentYARA Scan
Malware AnalysisThis OpenCTI connector enriches Artifact Observables by scanning their contents using every YARA Indicator in the system. When a rule matches, the connector creates a relationship between the Artifact and Indicator.
Internal enrichmentGoogle SecOps SIEM
SIEM & AnalyticsGoogle SecOps SIEM offers a cloud-based security information and event management solution that helps organizations collect, analyze, and respond to security incidents across their networks.
Microsoft Defender Intel
EDRMicrosoft Defender for Endpoint is an EDR platform that helps enterprise networks detect, prevent, respond to advanced threats, and perform investigations.
Microsoft Sentinel Intel
SIEM & AnalyticsMicrosoft Sentinel is a scalable, cloud-native security information and event management (SIEM) that delivers scalable, cost-efficient security across multicloud and multi-platform environments with built-in AI, automation, threat intelligence, and a modern data lake architecture. Microsoft Sentinel provides cyberthreat detection, investigation, response, and proactive hunting, with a bird's-eye view across your enterprise.
MISP Intel
Open Source Threat IntelReal-time streaming connector that exports OpenCTI containers and their content to MISP events, enabling bidirectional threat intelligence synchronization.
IBM QRadar
SIEM & AnalyticsIBM® QRadar® is a threat detection and response solution designed to help security teams manage and respond to incidents more efficiently. It supports enterprise-scale operations and enables organizations to strengthen their security posture across core technologies.
SentinelOne Intel
SIEM & AnalyticsEDRThe OpenCTI SentinelOne Intelligence connector facilitates real-time synchronisation of threat intelligence. By leveraging OpenCTI's live stream capabilities, this connector ensures that Indicators of Compromise (IOCs) are promptly shared with SentinelOne, enhancing the organisation's ability to detect and respond to threats effectively.
Splunk SOAR Push
SIEM/SOARIncident ResponseReal-time push connector that exports OpenCTI incidents as SOAR events and containers as SOAR cases for automated incident response.
Sumo Logic Intel
SIEM & AnalyticsSumo Logic SIEM is a cloud-native security information and event management system for modern enterprises. It manages security data by automating data ingestion, analysis, and visualization processes.