Finance & Crypto

Integrate Criminal IP Threat Intelligence into Securonix ThreatQ: A Step-by-Step Guide

2026-05-01 23:07:03

Introduction

Raw threat intelligence feeds often flood analysts with indicators but lack the real-world context needed to prioritize and respond effectively. Without understanding the exposure level, risk, or relevance of a given IP or domain, security teams waste precious time chasing false positives or missing critical threats. The partnership between Criminal IP and Securonix ThreatQ solves this by embedding exposure-based intelligence directly into the ThreatQ platform. This guide walks you through setting up the integration, automating the enrichment of alerts with contextual data, and accelerating your investigation workflows—turning raw data into actionable insights.

Integrate Criminal IP Threat Intelligence into Securonix ThreatQ: A Step-by-Step Guide
Source: www.bleepingcomputer.com

What You Need

Step-by-Step Integration Guide

Step 1: Prepare Your Criminal IP API Token

Log into your Criminal IP account and navigate to the API Management section. Generate a new API token with scope for IP enrichment and domain lookups. Copy the token and store it securely—you’ll need it in later steps. Ensure your token has sufficient quota for the expected volume of queries from ThreatQ.

Step 2: Configure ThreatQ Source for Criminal IP

Inside ThreatQ, go to Administration > Sources and click Add Source. Name it “Criminal IP Exposure Intelligence”. Choose the type as “External API”. Enter the base URL provided by Criminal IP (e.g., https://api.criminalip.io/v1). In the authentication field, select Bearer Token and paste the API token from Step 1. Save the source. This creates a bridge that pushes enriched context back into the ThreatQ indicator lifecycle.

Step 3: Map Data Fields and Classification

In the same source configuration, define how Criminal IP fields map to ThreatQ indicator attributes. At minimum, map:

Use ThreatQ’s field mapping tool to create these associations. This step ensures that every enriched indicator carries the exposure context visible in investigation workbenches.

Step 4: Create Automation Rules for Real-Time Enrichment

Navigate to Automation > Rules and create a new rule. Name it “Auto-Enrich Indicators with Criminal IP”. Set the trigger to On Indicator Creation or On Indicator Ingestion. Define conditions: for example, if the indicator type is IP address or domain. Then add an action: Enrich via External API and select the Criminal IP source configured earlier.

Configure the enrichment action to automatically query the indicator against Criminal IP’s IP/domain exposure endpoint. Set the response handling to update the indicator’s attributes (score, classification, tags) immediately. Enable the rule and run a test with a known indicator to verify the enrichment works.

Step 5: Integrate with ThreatQ Workbenches for Analyst Efficiency

Now that indicators are enriched automatically, analysts can see the Criminal IP score next to each indicator in the Workbench. Create a custom dashboard widget that filters indicators with high exposure scores (e.g., >80). This prioritizes critical threats. Additionally, configure a notification rule to alert teams when a new high-score indicator appears—this speeds up response to the riskiest exposures.

Integrate Criminal IP Threat Intelligence into Securonix ThreatQ: A Step-by-Step Guide
Source: www.bleepingcomputer.com

To further reduce manual effort, set up a contextual search action that adds one-click links from the indicator detail page to the full Criminal IP report for deep investigation.

Step 6: Test and Validate the Pipeline

Before going live, perform a limited test:

  1. Ingest a small batch of sample IP addresses (both known benign and known malicious).
  2. Verify that each indicator receives a Criminal IP exposure score and tags in ThreatQ.
  3. Check that the automation rule fires correctly (logs in ThreatQ’s automation history).
  4. Simulate an alert scenario in a workbench and confirm the contextual data appears.
  5. If using ThreatQ’s Object Relationships, ensure associated domains and ASNs are linked.

Fix any mapping or connectivity issues. Once satisfied, activate the rule for all incoming indicators.

Step 7: Monitor and Refine Over Time

After deployment, monitor the enrichment performance via ThreatQ’s Reporting & Analytics. Look for:

Adjust the automation rule conditions (e.g., only enrich external IPs, or those with a certain threat level) to avoid wasting API calls. Also consider creating a white list for known internal IPs to skip enrichment.

Tips for a Successful Integration

By following these steps, you transform raw threat data into enriched, contextual intelligence that accelerates investigations and reduces false positives. The Criminal IP / Securonix ThreatQ integration closes the gap between noise and actionable insight.

Explore

NVIDIA, Adobe, and WPP Launch Autonomous AI Agents for Real-Time Personalized Marketing at Scale Crypto Markets Steady as Ledger Eyes $4B IPO and Regulatory Momentum Builds North Korean Cyber Group Strikes Again: AI-Crafted npm Malware, Bogus Firms, and Remote Access Tools Target Developers AWS Unveils Claude Opus 4.7 AI Model and General Availability of Interconnect Services Inside the Shai-Hulud Attack: A Guide to Detecting and Defending Against the Lightning PyPI Supply Chain Compromise