Security & Infrastructure Tools
Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations
Criminal IP is partnering with Securonix to embed Criminal IP’s exposure-based threat intelligence into ThreatQ, enabling real-time enrichment of IP indicators within ThreatQ and automated workflows that keep context current. The integration adds contextual data such as maliciousness scores, VPN/proxy detection, remote access exposure, open ports, and known vulnerabilities, helping security teams triage faster and prioritize more accurately. Analysts can perform on-demand lookups and access enriched indicators directly in the ThreatQ dashboard, while the investment in the ThreatQ Orchestrator automates ingestion and filtering of exposure intelligence, enhancing investigation graphs and overall incident response workflows.

CRIMINAL IP AND THREATQ COLLABORATE TO ENHANCE THREAT INTELLIGENCE OPERATIONS
Sponsored by Criminal IP
A new collaboration between Criminal IP and Securonix ThreatQ is bringing exposure-based threat intelligence directly into security operations. By embedding Criminal IP’s real-time visibility into internet-facing assets and infrastructure within ThreatQ, organizations can enrich IP indicators with actionable context, streamline investigations, and accelerate response without disrupting existing workflows.
Overview: Bridging exposure data and workflow orchestration
- The partnership enables ThreatQ to centralize threat data from multiple sources while enriching it with continuously updated exposure intelligence from Criminal IP.
- Unlike conventional feeds that focus on past indicators, Criminal IP highlights how assets and infrastructure are exposed across the internet, delivering real-world context to investigations.
- The integration aims to strengthen investigation and response workflows by adding granular, current context without adding complexity or manual work for analysts.
Automated Intelligence Enrichment at Scale
- Within the ThreatQ environment, Criminal IP’s threat intelligence APIs automatically enrich incoming IP indicators with contextual data.
- Enrichment includes maliciousness scoring, VPN and proxy detection, remote access exposure, open ports, and known vulnerabilities.
- Powered by ThreatQ’s data-driven orchestration engine, automated workflows continuously evaluate indicators against Criminal IP’s threat database.
- The result is up-to-date threat context that reduces manual analyst effort, enabling faster triage and more consistent prioritization.
Integrate Criminal IP Intelligence into ThreatQ Workflows
- The integration is designed to enrich IP indicators in ThreatQ with real-time exposure-based intelligence, aligning analysis with current risk landscapes.
- Automated analysis includes maliciousness scoring, VPN/proxy detection, and infrastructure insights to speed up investigation and response.
- This seamless integration supports a unified workflow where external intelligence becomes a natural part of existing threat management processes.
- Explore Criminal IP Integration: to learn more about how to connect Criminal IP’s exposure-based threat intelligence to ThreatQ, visit the integration resources available for ThreatQ.
Real-Time Investigation Within a Unified Workspace
- Criminal IP intelligence appears directly in the ThreatQ dashboard, providing unified visibility into enriched indicators and risk context.
- Analysts can validate suspicious IP activity in real time within ThreatQ without switching tools.
- On-demand Criminal IP lookups can be performed from indicator detail views or investigation boards, delivering additional context during active investigations.
- The investigation graph in ThreatQ is enhanced to reveal relationships between IP addresses, associated infrastructure, and attack activity, helping analysts identify connections and patterns more efficiently.
Intelligence-Driven Prioritization and Response
- Criminal IP enrichment is integrated into ThreatQ’s Orchestrator, enabling automated ingestion and filtering of exposure-based IP intelligence into analysis workflows.
- By aligning Criminal IP data with ThreatQ’s scoring framework, organizations can tailor risk evaluation to their unique operational environments.
- This enables more precise prioritization and supports informed decision-making during investigations.
- Enriched data can be visualized in dashboards to reveal trends in malicious activity, VPN usage, and risk distribution across indicators.
Expanding Visibility with Exposure Intelligence
- The collaboration underscores the growing importance of exposure-based intelligence in modern threat analysis.
- Continuous monitoring of internet-facing assets and IP infrastructure provides differentiated visibility beyond traditional indicator-based approaches.
- As stated by leadership, the integration brings IP reputation and exposure intelligence into ThreatQ to support faster analysis and more effective responses throughout the investigation lifecycle.
- By integrating this intelligence into existing workflows, security teams can improve visibility and make more informed decisions without adding operational overhead.
What this Means for Security Operations
- Real-time context: Analysts receive up-to-date exposure insights embedded within their existing ThreatQ workspace, enabling quicker and more accurate assessments.
- End-to-end enrichment: Automated scoring, detection of VPNs/proxies, and infrastructure-level insights feed into a unified risk picture.
- Prioritized actions: ThreatQ’s orchestration capabilities, enhanced with Criminal IP data, improve prioritization, helping security teams focus on the most relevant threats.
- Relationship mapping: The enriched investigation graph reveals connections between IPs, infrastructure, and observed activity, aiding in pattern recognition and attribution.
About the Partners
Criminal IP
- A cyber threat intelligence solution operated by AI SPERA that delivers decision-ready IP address and domain reputation data to security teams worldwide.
- By continuously scanning the global internet, Criminal IP aggregates signals across IPs, domains, URLs, and attack infrastructure, covering malicious indicators, known vulnerabilities, exposed assets, and attacker behavior.
- The mission is to provide organizations with real visibility into their cyber landscape and to accelerate threat detection and response.
Securonix
- A cloud-native security operations platform that unifies detection, investigation, and response, with a focus on scalable, outcomes-driven security operations.
- Recognized for leadership and customer choice in the SIEM space, Securonix emphasizes accountable, human-in-the-loop security operations and AI-assisted productivity within the SOC.
Operationalizing Threat Intelligence at Scale
- The joint solution emphasizes automation and orchestration to reduce manual workloads and accelerate enforcement actions.
- By combining ThreatQ’s data-driven workflows with Criminal IP’s exposure intelligence, security teams can achieve faster enrichment and more precise triage.
- The collaboration supports the ongoing shift toward proactive defense by making exposure-based intelligence an integral part of incident response and threat hunting.
Notes and Context
- The partnership highlights a broader industry trend toward integrating external intelligence with internal workflows to enhance decision-making and operational efficiency.
- Real-time access to contextual data inside the ThreatQ interface helps teams validate signals faster, strengthen risk assessment, and improve overall security posture without overhauling existing processes.
Enduring Value
- The integration aligns with modern security operations goals: faster detection, better prioritization, and more effective response.
- By centralizing exposure intelligence within ThreatQ, organizations can maintain consistent risk assessment across the threat lifecycle and operate with greater confidence in their security decisions.
Sponsored and provided for awareness of ongoing developments in threat intelligence and security operations. For more information on the ThreatQ and Criminal IP integration, see the integrated ThreatQ workflow resources and Criminal IP’s Threat Quotient integration materials.