Effective Date: January 1st, 2024
Terms of Service
ThreatSearch Platform / TIP: The ThreatSearch Threat Intelligence Platform. It provides users with access to threat intelligence data, tools, and insights to support cybersecurity activities. The platform is free and open-access, allowing anyone to explore threat intelligence resources. It is maintained and updated to provide timely and relevant information.
IoCs: Indicators of Compromise, such as IP addresses, domains, URLs, and file hashes, used to identify potential threats and suspicious activity. These indicators help users detect malicious activity in networks and systems. They are updated regularly based on new intelligence from multiple sources.
User Content: Any data, reports, or submissions provided by users of the platform. Users remain responsible for the accuracy and legality of their submissions. Submitted content may be used by ThreatSearch to improve threat intelligence and analytics. Users should ensure their submissions do not violate any laws or third-party rights.
API: Application Programming Interface that allows users to access ThreatSearch data automatically for analysis, research, or integration with other systems. The API enables faster and programmatic use of intelligence. Users must follow usage limits and avoid excessive or disruptive requests.
Integrations: Connections between ThreatSearch and other security tools or platforms that allow seamless use of threat intelligence. Integrations help users incorporate data into their existing security workflows. Proper configuration and responsible use are required to maintain platform security.
Third-Party Content: Data or threat feeds provided by external sources, which may include public or partner-supplied information. ThreatSearch does not guarantee the accuracy or completeness of third-party content. Users should verify third-party data before relying on it for security decisions.
Providing clear definitions helps users understand the terms, reduces confusion, and ensures transparency in how the platform and its data are used. It also clarifies the roles and responsibilities of both ThreatSearch and its users, helping maintain safe and effective use of the platform.