Skip to content

Commit 9fe3a60

Browse files
authored
Merge pull request #299 from hslatman/herman/cleanup-20251002
Reorder Q-Feeds and ELLIO
2 parents 297dbc9 + 9128547 commit 9fe3a60

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

README.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -19,22 +19,6 @@ Some consider these sources as threat intelligence, opinions differ however.
1919
A certain amount of (domain- or business-specific) analysis is necessary to create true threat intelligence.
2020

2121
<table>
22-
<tr>
23-
<td>
24-
<a href="https://qfeeds.com" target="_blank">Q-Feeds Threat Intelligence</a>
25-
</td>
26-
<td>
27-
Q-Feeds is a cybersecurity company that brings together data from OSINT, proprietary research, and commercial threat intelligence feeds to offer a well-rounded and highly actionable solution. Their Threat Intelligence Portal (TIP) makes it easy for organizations to access and manage this data in real-time. By integrating with firewalls, SIEMs, and other security platforms, Q-Feeds helps businesses proactively block connections to known malicious IPs, domains, and URLs—before threats can do harm. They also have a community version available on request.
28-
</td>
29-
</tr>
30-
<tr>
31-
<td>
32-
<a href="https://feed.ellio.tech" target="_blank">ELLIO: IP Feed (community free version)</a>
33-
</td>
34-
<td>
35-
A threat list of known malicious IP addresses anticipated to pose potential threats to your network in the near future, known benign scanners, and IP addresses of actors with unknown intent. It is provided with a 24-hour delay for personal, non-commercial use but still provides exceptional protection compared to other open IP threat lists/feeds..
36-
</td>
37-
</tr>
3822
<tr>
3923
<td>
4024
<a href="https://www.abuseipdb.com/" target="_blank">AbuseIPDB</a>
@@ -203,6 +187,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
203187
Free intelligence source for current and historical DNS information, WHOIS information, finding other websites associated with certain IPs, subdomain knowledge and technologies. There is a <a href="https://securitytrails.com/">IP and domain intelligence API available</a> as well.
204188
</td>
205189
</tr>
190+
<tr>
191+
<td>
192+
<a href="https://feed.ellio.tech" target="_blank">ELLIO: IP Feed (community free version)</a>
193+
</td>
194+
<td>
195+
A threat list of known malicious IP addresses anticipated to pose potential threats to your network in the near future, known benign scanners, and IP addresses of actors with unknown intent. It is provided with a 24-hour delay for personal, non-commercial use but still provides exceptional protection compared to other open IP threat lists/feeds.
196+
</td>
197+
</tr>
206198
<tr>
207199
<td>
208200
<a href="http://rules.emergingthreats.net/fwrules/" target="_blank">Emerging Threats Firewall Rules</a>
@@ -496,6 +488,14 @@ The primary goal of Malpedia is to provide a resource for rapid identification a
496488
PickupSTIX is a feed of free, open-source, and non-commercialized cyber threat intelligence. Currently, PickupSTIX uses three public feeds and distributes about 100 new pieces of intelligence each day. PickupSTIX translates the various feeds into STIX, which can communicate with any TAXII server. The data is free to use and is a great way to begin using cyber threat intelligence.
497489
</td>
498490
</tr>
491+
<tr>
492+
<td>
493+
<a href="https://qfeeds.com" target="_blank">Q-Feeds Threat Intelligence</a>
494+
</td>
495+
<td>
496+
Q-Feeds is a cybersecurity company that brings together data from OSINT, proprietary research, and commercial threat intelligence feeds to offer a well-rounded and highly actionable solution. Their Threat Intelligence Portal (TIP) makes it easy for organizations to access and manage this data in real-time. By integrating with firewalls, SIEMs, and other security platforms, Q-Feeds helps businesses proactively block connections to known malicious IPs, domains, and URLs—before threats can do harm. They also have a community version available on request.
497+
</td>
498+
</tr>
499499
<tr>
500500
<td>
501501
<a href="https://rescure.fruxlabs.com/" target="_blank">REScure Threat Intel Feed</a>

0 commit comments

Comments
 (0)