For those of you who know me, Henry was my basset hound, and the fictitious name used during (ahem) special research. I'm a former intelligence officer, a professional analyst, and a blogger since 2004 writing about my experiences on the journey --information security, cyber intelligence, education, thoughts. Some love my writings others hate it. If you like it, follow me!
Threat Recon™ is a new threat intelligence API developed by Wapack Labs and powered by GO.
The Threat Recon™ threat intelligence API leverages Wapack Labs human analysis, open source information, and machine generated metadata such as Whois records, historical and current DNS information, tagging, and includes a proprietary confidence algorithm to provide as much context as possible about a single indicator, and a prioritization by confidence.
Basics and Getting Started
Getting started is easy!
First sign-up to receive your free API key. Read the 'Usage' section for example queries.
Need tools? Test it from command line, or if you prefer, download example scripts from the Threat Recon™ hosted github repository. First scripts were provided by us in Python. Shortly into beta and load testing, Justin and Nick at CBTS converted them to Ruby, and our friends Bart O and Brian at HP authored and posted Maltego Transforms! Any programming language that can parse our JSON output will work with the API.
Give us a try! Get your first 1000 queries for free. Sign-up is easy at threatrecon.co. Feedback so far has been amazing. If you have any questions, comments, or problems, please let us know... firstname.lastname@example.org.