The SI Suite is WhoisXML API’s ultimate WHOIS, IP, DNS, and subdomain data package for all types of security product enrichment, open-source intelligence (OSINT) pivoting, indicator of compromise (IoC) expansion analyses, phishing and fraud detection programs, and more.
The suite combines extensive threat intelligence access with flexibility so you can choose the data sources and consumption models most suitable to your information security needs.
Contact us at
The SI Suite has billions of historical WHOIS, passive DNS, IP, and subdomain records. Our data sources are highly compatible to enable easy pivoting and threat correlation so you can stay on top of the latest Internet events potentially affecting your or your clients’ security posture.
The rationale behind the SI Suite is to provide access to all our intelligence in one place with versatile consumption models so you can get the threat intelligence you need the way you need it to level up your security products, security operations center (SOC) capabilities, OSINT investigations, and more.
For the past decade, we have established connections with thousands of registrars, Internet service providers (ISPs), and other data exchange partners. That helped us build and maintain continuous streams of extensive and constantly refreshed data with high relevance for information security.
The Security Intelligence (SI) Suite is available through custom packages so you can select the products most relevant to you:
|1||WHOIS Data Feed||Daily + Quarterly|
|2||Subdomains Data Feed||Daily + Quarterly|
|2||Website Contacts & Categorization Database||Daily|
|1||DNS Data Feed Download (A, DNS, MX)||Weekly|
|2||IP Netblocks (IPv4 + IPv6)||Daily|
|2||IP Geolocation Database||Daily|
|2||Typosquatting Data Feed (standard + enriched)||Daily|
|2||Disposable Email Domains Feed||Daily|
|1||10 Million Queries / Month||Enterprise APIs and Threat Intelligence APIs|
Check our use case sheet to learn how security enterprises have successfully integrated the SI Suite into their business and network protection operations.Download the use case sheet