Live Data · Updated Hourly

Threat Intelligence Database

507M+ records from 49+ sources. Every vulnerability enriched with exploit data, ransomware attribution, and predictive scoring.

0 M+

Million Records

0 +

Data Sources

0

Tables

0

Exploit Forecast AUC

0.837

Exploit Forecast AUC

Our ML model predicts whether a CVE will be exploited in the wild within 90 days, using 328 features across vulnerability characteristics, threat actor patterns, and exploit ecosystem signals.

CVE detail page showing risk assessment scores, exploit prediction probability, and threat intelligence enrichment

Intelligence Categories

333,000+
NVD CVEs with EPSS
312,966
EPSS Scores
1,494
CISA KEV (Exploited CVEs)
46,478
Exploits (ExploitDB/Metasploit)
1,821,455
Malicious IPs
308,520
Malicious Domains
2,453,675
Unified IOCs
26,158
C2 Servers
28,164,264
CVE-Ransomware Links
38,202
CMS Vulnerabilities
1,046,157
Malware Hashes
3,100+
Sigma Rules
5,918
YARA Rules
12,300+
Nuclei Templates
209,000+
Malicious Packages
1,042
MITRE ATT&CK Techniques
313
Ransomware Groups
191
APT/Threat Groups
THREAT FEED PREVIEW
CVE-2024-3400PAN-OS Command Injection | CVSS 10.0 | CISA KEV | CVE-2024-1709ConnectWise ScreenConnect Auth Bypass | CVSS 10.0 | CVE-2024-21762Fortinet FortiOS RCE | CVSS 9.8 | CISA KEV | CVE-2023-46805Ivanti Connect Secure Auth Bypass | CVSS 8.2 | CVE-2024-3400PAN-OS Command Injection | CVSS 10.0 | CISA KEV | CVE-2024-1709ConnectWise ScreenConnect Auth Bypass | CVSS 10.0 | CVE-2024-21762Fortinet FortiOS RCE | CVSS 9.8 | CISA KEV | CVE-2023-46805Ivanti Connect Secure Auth Bypass | CVSS 8.2
Threat intelligence console with CVE search, threat actor lookup, MITRE ATT&CK browser, and CISA KEV catalog

Ransomware Economics

Real-time economics tracking across 318 ransomware groups with year-over-year trends.

$4.32M
Avg. Demand
▲ 13.7% YoY
$1.54M
Median Payment
▲ 28.3% YoY
29%
Payment Rate
▼ 21.6% YoY
24 days
Avg. Downtime
▲ 14.3% YoY
LockBit
Russia
1,400
victims
ALPHV/BlackCat
Russia
800
victims
Cl0p
Russia
600
victims
Play
Unknown
350
victims
Akira
Unknown
250
victims
Royal
Russia
300
victims

Global Threat Landscape

214 countries profiled with malicious infrastructure, C2 server counts, and geo-threat intelligence.

Global threat landscape with geospatial threat distribution heat map, 1.6M malicious IPs, 8.9K C2 servers across 214 countries
Monthly threat trends with emerging threat patterns by industry and CWE category

Threat Actor Profiles

900+ actors with MITRE ATT&CK technique mappings, IOC feeds, and campaign attribution.

APT

APT29 (Cozy Bear)

Russia · 47 techniques · 3,200 IOCs

Russian SVR-linked group targeting government and diplomatic organizations worldwide

APT

Lazarus Group

North Korea · 38 techniques · 2,800 IOCs

North Korean state-sponsored group focused on financial theft and cyber espionage

RW

LockBit

Russia · 28 techniques · 2,847 IOCs

Prolific RaaS operation with 1,400+ victims across all industries globally

APT

Volt Typhoon

China · 22 techniques · 1,500 IOCs

Chinese state-sponsored group targeting US critical infrastructure systems

Threat actor database showing ransomware groups with CVE counts, IOC tracking, and incident history
Akira ransomware threat actor profile with 72,474 linked CVEs, 88 MITRE TTPs, attack methods and tools

Intelligence Modules

Deep-dive reference databases covering every major security framework. Each module is fully searchable, cross-referenced with CVEs, and linked to detection rules.

Click any screenshot to enlarge and browse the full gallery.

ATT&CK

MITRE ATT&CK Framework

Browse all techniques and sub-techniques with linked CVEs, Sigma detection rules, and threat intelligence context.

Filter by tactic phase, search by technique ID or name. Each technique shows KEV CVE count, Sigma rules, and related threat actors.

MITRE ATT&CK technique browser with CVE counts and Sigma rules per technique
T1059 Command and Scripting: 170 KEV CVEs, 324 Sigma rules, 12 sub-techniques
CWE

CWE Weakness Database

Common Weakness Enumeration catalog with CAPEC attack patterns, mitigations, and severity ratings.

Each weakness links to related CVE examples, MITRE techniques, and detection rules. Filter by category: Web, Injection, Auth, Crypto, Memory.

CWE weakness catalog with CAPEC pattern counts and severity classifications
CWE-200: Exposure of Sensitive Information — severity, mitigations, CVE examples
OWASP

OWASP Top 10

Every OWASP version (2025, 2021, 2017 and earlier) with attack vectors, impact analysis, and prevention guidance.

Each entry includes descriptions, real-world examples, and specific controls. Mapped to your scan findings so you know exactly where you stand.

OWASP Top 10 2025: Broken Access Control, Security Misconfiguration, Injection
Broken Access Control: attack vectors, impact, prevention steps
IOC

IOC Lookup

Search IPs, domains, hashes, and URLs across 2.43M+ indicators of compromise with threat context.

Each result includes a quality score, geolocation map, ASN data, threat actor attribution, and infrastructure details. Auto-detects indicator type.

IOC Lookup: 2.5M IPs, 1.9M domains, 319K critical indicators
IOC detail: IP intelligence with quality score 60, geolocation, ASN, threat context

Detection Engineering

21,000+ detection rules mapped to 1,042 MITRE ATT&CK techniques.

sigma
3,100+
Detection Rules
MITRE Coverage
67%
yara
5,918
Detection Rules
MITRE Coverage
54%
nuclei
12,300+
Detection Rules
MITRE Coverage
82%

Get Threat-Enriched Results

Every vulnerability cross-referenced against 507M+ threat intelligence records.