Full API Documentation Available

Interactive API explorer, code examples, and integration guides

Threat Intelligence API

Export aggregated threat intelligence from 30+ cybersecurity sources directly into your security stack. Compatible with Splunk, Microsoft Sentinel, QRadar, Elastic, and more.

Works with:SplunkMicrosoft SentinelIBM QRadarElastic SecurityGoogle Chronicle

Quick Start

# Get your API key from the "API Keys" tab, then:

curl -H "Authorization: Bearer YOUR_API_KEY" \
  "https://socdefenders.ai/api/v1/iocs?type=ipv4&limit=100"

# Response (JSON):
{
  "meta": { "total": 1523, "limit": 100 },
  "data": [
    {
      "type": "ipv4",
      "value": "192.168.1.100",
      "confidence": "high",
      "source": { "feed_name": "CISA Alerts", "category": "government" }
    }
  ]
}

Supported Formats

JSON / CSV

Free

REST API with pagination and rich filtering

IOC Lookup

Free

Single-value enrichment with AI risk + hunting queries

News Articles

Free

Aggregated articles from 30+ feeds — filter, search, delta-poll

STIX 2.1

Pro

Industry-standard threat intel bundles

TAXII 2.1

Pro

Automated feed polling protocol for SIEMs

CEF / Syslog

Pro

Common Event Format for log pipelines

MISP

Pro

Malware Information Sharing Platform events

OpenIOC

Pro

Mandiant OpenIOC XML

Sigma rules

Pro

Deployable YAML detection rules per IOC

Articles NDJSON / CSV

Pro

Bulk news export with cursor pagination

EndpointTierWhat it returns
GET /api/v1/iocsFreeList IOCs with filtering by type, category, confidence, since, industry.
GET /api/v1/iocs/searchFreeFind a specific IOC value across the feed.
GET /api/v1/lookupnewFreeSingle-IOC enrichment: AI risk, MITRE techniques, Splunk/KQL hunting queries.
GET /api/v1/articlesnewFreeAggregated news articles — filters, full-text search, cursor pagination, delta polling, IOC/CVE/threat-actor expansions. NDJSON/CSV bulk export requires Pro.
GET /api/v1/articles/{id}newFreeSingle article with all expansions (iocs, cves, threat actors, MITRE techniques) by default.
GET /api/v1/iocs/statsProTotals by type, category, source for analytics dashboards.
GET /api/v1/iocs/stixProSTIX 2.1 bundle (indicators + identity).
GET /api/v1/iocs/mispProMISP JSON event.
GET /api/v1/iocs/cefProCEF or Syslog stream for SIEM ingestion.
GET /api/v1/iocs/openiocProOpenIOC XML document.
GET /api/v1/iocs/sigmanewProMulti-document Sigma YAML — deployable detection rules per IOC.
GET /api/taxii2/ProTAXII 2.1 discovery (api_roots + server metadata).
GET /api/taxii2/api/collections/ProList TAXII collections (all, IPs only, hashes only, CVEs, etc.).
GET /api/taxii2/api/collections/{id}/objects/ProPaginated STIX objects from a TAXII collection.

IOC Types

IPv4IPv6DomainURLMD5SHA1SHA256CVEMITRE ATT&CKEmail

Pricing

Free

Free

Perfect for getting started and personal projects

  • 10 requests/minute
  • 1,000 requests/day
  • 1 day IOC lookback / 7 day articles lookback
  • JSON IOC export + paginated news articles
  • Up to 100 results per request
  • Up to 3 API keys
  • Community support

Pro

$299/mo

or $2990/yr ($249/mo)

For security teams, SOC analysts, and organizations

  • 1,000 requests/minute
  • 1,000,000 requests/day
  • 365 day lookback period
  • All export formats (STIX, TAXII, MISP, CEF, OpenIOC)
  • Full statistics access
  • Up to 10,000 IOCs per request
  • Up to 50 API keys
  • Priority email support
  • 99.9% uptime SLA

99.9% SLA uptime guarantee

Tier Comparison

FeatureFreePro
Rate Limit10/min, 1K/day1,000/min, 1M/day
Lookback Period1 day1 year
Results per Request10010,000
JSON/CSV Export
STIX 2.1 / TAXII 2.1
MISP / CEF / OpenIOC
SupportCommunityPriority email
SLA Uptime99.9%