TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/Top-open-source-and-commercial-threat-intelligence-feeds

Top open source and commercial threat intelligence feeds

By Karen Kent

Cybersecurity threat intelligence feeds play an important role in security. They detail current attacks and their sources. These characteristics, better known as indicators of compromise, include, among other factors, IP addresses, domain names, URLs, email addresses, malware file hashes and filenames.

Security teams use this information to improve how quickly and accurately they can detect potential attacks and to better estimate the severity of an incursion. This helps prioritize the organization's response strategy -- especially automated responses.

A wide variety of cybersecurity tools -- among them firewalls, SIEM, security orchestration, automation and response and endpoint detection and response technologies -- consume machine-readable threat intelligence feeds. Organizations also use integrated threat intelligence platforms that bring together multiple feeds to provide machine-readable data that is prioritized, actionable and accurate.

Let's take a closer look at cybersecurity threat intelligence feeds and highlight some leading options -- both open source and commercial.

Criteria for feed evaluation

Every threat intelligence feed is different. While some feeds contain similar information, other feeds contain much different data or only target specialized subsets, such as phishing-related data. As CISOs and their security teams evaluate potential feeds for their organization, consider the following:

Examples of open source feeds

Open source feeds, also known as OSINT, are typically compiled from security researchers, service providers and other operational personnel who observe attack activity and voluntarily document and report it.

Open source feeds have their role, but they lack the financial and organizational resources of commercial feeds. As a result, many security teams use both open source and commercial feeds to improve their attack detection accuracy and speed.

abuse.ch

Abuse.ch is a community effort in partnership with Spamhaus, a nonprofit internet security organization, that encompasses a reported 15,000 security researchers. It hosts several separate databases and repositories with attack-related information. These include the following:

LevelBlue's Open Threat Exchange

LevelBlue's OTX, which succeeded AlienVault, is available for free with a basic registration. It claims a user base of more than 200,000 and a database of more than 20 million IOCs, submitted every day.

Teams can integrate LevelBlue's OTX feed with their security technologies through an API, STIX, TAXII, and an SDK. LevelBlue also fosters discussion and sharing of threat data and related observations among OTX users.

The Shadowserver Foundation

The Shadowserver Foundation is a nonprofit organization that collects data on malware, IP addresses, SSL certificates and other IOCs. This data is shared with thousands of verified network owners every day through reports. Teams can also use APIs to process the reports as a machine-readable threat intelligence feed.

Examples of commercial feeds

Vendors of commercial cybersecurity threat intelligence feeds charge subscription fees. The primary advantage of commercial feeds over open source feeds is the dedicated human and automated resources that commercial feed vendors have for analyzing and enriching IOC data.

CrowdStrike Falcon Adversary Intelligence

CrowdStrike Falcon Adversary Intelligence provides a variety of threat intelligence-related features that can be integrated with a company's existing detection technologies. Capabilities include a sandbox for evaluating malware, dark web activity monitoring and an IOC threat intelligence feed.

Premium features include YARA and Snort detection rule support and access to threat hunting libraries and special threat reports.

ESET's Global Threat Intelligence

ESET's Global Threat Intelligence features many real-time IOC feeds in JSON and STIX formats. Feeds include the following:

Additional feeds pertain to particular types of threats, including Android infostealers and other Android threats, scam URLs, crypto scams, malicious email attachments, phishing URLs, SMS phishing domains and SMS scams.

FalconFeeds.io

FalconFeeds.io brings together dark web, deep web and open web intelligence. Teams can integrate the feed with their detection technologies through an API. It has three subscription tiers:

GreyNoise

GreyNoise provides real-time IP address blocklists for firewalls and other network infrastructure and network security technologies to ingest and use. It includes a set of predefined blocklists for addresses attacking several security vendors and their products, addresses sending traffic from certain countries, all addresses recently generating suspicious network traffic and addresses observed exploiting vulnerabilities or participating in botnets.

Two options are available. GreyNoise Block is intended for smaller organizations; the full GreyNoise platform is geared to larger ones.

OpenPhish

OpenPhish specializes in phishing IOC threat intelligence data. It offers three tiers. The Community tier is free, but is only updated twice daily and contains only a subset of phishing URLs. The Premium and Platinum tiers offer comprehensive phishing URLs, phishing IP addresses, SSL metadata and permission for organizations to reuse the data for commercial purposes.

Karen Kent is the co-founder of Trusted Cyber Annex. She provides cybersecurity research and publication services to organizations and was formerly a senior computer scientist for NIST.

04 Feb 2026

All Rights Reserved, Copyright 2000 - 2026, TechTarget | Read our Privacy Statement