Fraudulent attempt to obtain sensitive information such as user credentials or credit card details
Distribution of malicious software intended to control and/or damage infrastructure, systems or networks
Networks of devices infected with Malware, often used to carry out distributed denial of service attacks (DDOS)
Fraudulent websites set up with malicious intent to deceive end-users. Often referred to as fake webshops
Domains names used to send unsolicited emails to end users. Often used as a carrier of other types of malicious behavior.
Domain names and websites that have been compromised by hackers. Often used as a carrier of other types of malicious behavior.
Add the domain names you manage to monitor them for Malicious Behavior and get notified instantly.
By continuously crawling the DNS, we can match your IP's against incoming threat reports, and deliver them as they come in.
With Name Servers as the common feature, finding ongoing malicious behavior for a host or service is easy.
It's quick and easy to get started.
|per monthper year||per monthper year||per monthper year|
|IP, NS and MX Threat Monitor|
|Email, Ticket and API Reports|
|Reports per Month||50||125||250|
Your account starts with 10 free reports. This gives you time to decide which subscription suits your needs.
You can upgrade your subscription, or buy additional reports at any time. Make sure that you never miss a report.
Picked a plan with more reports than you need? Don't worry, they accumulate and never lose their value.
iQ Threat Intelligence is curated and maintained by iQ Global AS. We are a global team of domain industry veterans that provide trusted cybersecurity, business intelligence, and consulting services.