{
	"id": "e9581728-6e8e-4ca9-9e07-e0bd6dc85110",
	"created_at": "2026-04-06T00:08:45.394294Z",
	"updated_at": "2026-04-10T03:20:25.193203Z",
	"deleted_at": null,
	"sha1_hash": "4d09b8244e814129b3401a82cd27d0bf3563635f",
	"title": "Proactive Infrastructure Hunting with ThreatConnect \u0026 DomainTools",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 131752,
	"plain_text": "Proactive Infrastructure Hunting with ThreatConnect \u0026\r\nDomainTools\r\nArchived: 2026-04-05 22:20:36 UTC\r\nDataminr for Cyber Defense\r\nFuse real-time intelligence with detailed internal posture to contextualize, prioritize, and automate the\r\nentire threat management lifecycle\r\nDataminr for Cyber Defense\r\nThreat Intelligence Platform\r\nThe industry's only threat intelligence operations platform.\r\nPolarity\r\nUnified threat intel, context, and knowledge at the point of analysis and decision-making.\r\nRisk Quantifier\r\nUse automation to help quantify cyber risk in financial terms.\r\nUse Cases\r\nUnified Threat Library\r\nThreat Detection and Prevention\r\nVulnerability Prioritization\r\nAlert Triage\r\nAccelerate Threat Hunting\r\nIncident Response\r\nFederated Search\r\nContinuous Control Monitoring\r\nWhy ThreatConnect?\r\nhttps://threatconnect.com/blog/infrastructure-research-hunting/\r\nPage 1 of 4\n\nCustomer Stories\r\nRead how our customers' enhanced their security operations with ThreatConnect.\r\nAwards \u0026 Recognition\r\nSee how ThreatConnect is recognized as a leader in cybersecurity.\r\nNews\r\nCatch up on the latest ThreatConnect press releases and media coverage.\r\nLearn More\r\nhttps://threatconnect.com/blog/infrastructure-research-hunting/\r\nPage 2 of 4\n\nBlog\r\nRead our newest insights, thought leadership, cyber news, and platform updates.\r\nEvents\r\nCheck out and register for our upcoming events, conferences, and webinars.\r\nResources\r\nExplore our resources about cyber threat intelligence, investigative operations, and risk quantification.\r\nBecome a Partner\r\nTechnology Partners\r\nSolution Providers\r\nMarketplace\r\nKnowledge Base\r\nhttps://threatconnect.com/blog/infrastructure-research-hunting/\r\nPage 3 of 4\n\nDeveloper Documentation\r\nAPI Documentation\r\nReview ThreatConnect\r\nLeadership\r\nBoard of Directors\r\nCareers\r\nRequest a Demo Contact ThreatConnect\r\nSource: https://threatconnect.com/blog/infrastructure-research-hunting/\r\nhttps://threatconnect.com/blog/infrastructure-research-hunting/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://threatconnect.com/blog/infrastructure-research-hunting/"
	],
	"report_names": [
		"infrastructure-research-hunting"
	],
	"threat_actors": [],
	"ts_created_at": 1775434125,
	"ts_updated_at": 1775791225,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4d09b8244e814129b3401a82cd27d0bf3563635f.pdf",
		"text": "https://archive.orkl.eu/4d09b8244e814129b3401a82cd27d0bf3563635f.txt",
		"img": "https://archive.orkl.eu/4d09b8244e814129b3401a82cd27d0bf3563635f.jpg"
	}
}