Powerful Threat Detection with Dark Web API
Big Dark Web Data
Access millions of sites, forums, marketplaces, and other sites in the deep and dark web
Monitor encrypted and password-protected illicit content, indexed by entities, keywords, sites, and more
Easily track dark web threats with standardized and structured data feeds
Big Darknet Data
Dynamic Profiling
Enriched data feed with quick profiling of threat agents, groups, and relevant platforms
Unrivaled Coverage
Largest repositories of dark and deep web sources with millions of sites, forums, marketplaces, and messaging platforms crawled daily in multiple languages
Constant Monitoring
Critical structured data that enables monitoring solutions to identify, classify, and take quick action
Deep and Dark Web Data
Digital Risk Protection
Gain contextualized real-time insight to protect organizations from cyber risks, including cyber attacks, ransomware, and phishing
Fraud Detection
Create an automatic alert system for leaked credit card numbers, PII, and monitor blockchain addresses involved in Illegal cryptocurrency transactions
Brand Protection
Mitigate risk factors such as counterfeiting attempts, unlicensed use, and leaked information to protect your brand and avoid crises
Web Intelligence
Monitor darknet marketplaces, forums, and networks for illicit drug and weapon trafficking, and hacking activities, and track hidden communications between terrorists and other bad actors
Cryptocurrency Investigations
Search cryptocurrency addresses and transactions to “follow the money” and trace cryptocurrency footprints as part of anti-money laundering, compliance, and due diligence investigations
Dark Web Monitoring
Track threats, threat actors, groups, and malicious trends on the deep and dark web
VIP Protection
Investigate cyber threats against company executives, board members, investors, and key personnel
Threat Intelligence
Monitor cyber threats on forums, marketplaces, and other hidden spaces on the dark web
Big Dark Web Data
cyberDocs: [
{
url: “https://bitbin.it/JIbUubiV/” ,
uuid: “2ab0386122c244d6a2e429f538e67c0a96f320f2” ,
parent_uuid: “2ab0386122c244d6a2e429f538e67c0a96f320f2” ,
title: “Ryuk 2.0 Ransomware” ,
text: “Ryuk 2.0 Ransomware (ransomware) This crypto ransomware encrypts business user and enterprise data with AES + RSA and then demands a 15-50 BTC ransom to get the files back. Original title: Ryuk . The file says: horrible. Development environment: Visual Studio 2015 or newer. Some researchers believe that the well-known Lazarus Group is behind the development and implementation. According to other sources, the group calls itself the Wizard Spider. In the West, they believe that this is a Russian group, but it is unsubstantiated. As they say: There are three types of lies: lies, blatant lies and statistics. Price: 1200$ Connection: str******@ro.ru Telegram: HAUNTED_01 https://satoshi-box.com/pay/CCfMlo” ,
highlightText: “” ,
highlightTitle: “” ,
author: [
“StreetAthlet228btc”
] ,
author_extended: [
{
display_name: “StreetAthlet228btc” ,
user_id: NULL ,
user_link: NULL
} ,
] ,
language: “english” ,
referring_url: NULL ,
referring_file_type: NULL ,
rating: NULL ,
published: “2021-06-13T14:31:00.000+03:00” ,
site: {
name: “BitBin” ,
is_live: true ,
domain: “bitbin.it” ,
type: “paste” ,
country: “IT” ,
categories: NULL
} ,
thread: {
url: “https://bitbin.it/JIbUubiV/” ,
uuid: “2ab0386122c244d6a2e429f538e67c0a96f320f2” ,
title: “Ryuk 2.0 Ransomware” ,
full_title: “Ryuk 2.0 Ransomware – BitBin” ,
published: “2021-06-13T14:31:00.000+03:00” ,
site_section: “https://bitbin.it/” ,
section_title: “BitBin” ,
replies_count: 0 ,
participants_count: 1 ,
spam_score: 0.32 ,
main_image: “”
} ,
ord_in_thread: 0 ,
extended: {
external_links: [
“https://satoshi-box.com/pay/CCfMlo”
] ,
external_images: [ ] ,
external_videos: [ ] ,
file_links: [ ] ,
file_type: “html” ,
network: “openweb” ,
required_login: false
} ,
enriched: {
categories: [
“hacking”
] ,
persons: {
value: [
“ryuk”
] ,
count: 1
} ,
organizations: {
value: [
“lazarus group” ,
“aes”
] ,
count: 2
} ,
locations: {
value: [
“west”
] ,
count: 1
} ,
emails: {
value: [
“str******@ro.ru”
] ,
count: 1
} ,
phones: NULL ,
credit_cards: NULL ,
ssns: NULL ,
wallet_ids: NULL ,
ips: NULL ,
domains: {
value: [
“satoshi-box.com”
] ,
count: 1
}
} ,
crawled: “2021-06-13T15:41:08.550+03:00” ,
updated: “2021-06-13T15:41:08.550+03:00” ,
cache_link: “/dark-cache?token=a948bd43-9517-413c-a844-bc50be66d494&id=A5R8Llu2PYWDuBEkurW3clPFkDDUuz3nCUKyVB0d1-fr8W7Ys1noVPh_lfTIUvoj”
} ,
] ,
totalResults: 1 ,
moreResultsAvailable: 0 ,
next: “/cyberFilter?token=a948bd43-9517-413c-a844-bc50be66d494&format=html&ts=1623588068550&q=uuid%3A2ab0386122c244d6a2e429f538e67c0a96f320f2” ,
requestsLeft: 49301 ,
warnings: NULL
Dark Web Intelligence
uuid: “4cf1dee756027361087b9ff1fb250e2f4c187a53” ,
author: [
“Foxprox”
] ,
author_extended: [
{
display_name: “Foxprox” ,
user_id: “236677” ,
user_link: “https://xss.is/members/236677/”
} ,
] ,
language: “russian” ,
site: {
name: “XSS” ,
is_live: true ,
domain: “xss.is” ,
type: “discussions” ,
country: “RU”
}
uuid: “8f324448660dbe2a12e12042f3129eaac7fd2ad0” ,
external_links: [
“https://www.instagram.com/ef7gqhk4wdnyuqrc.onion/” ,
“http://asim5qa2epcoftyg.onion” ,
“https://feeds2.feedburner.com/ef7gqhk4wdnyuqrc.onion” ,
“https://twitter.com/ef7gqhk4wdnyuqrc.onion” ,
“https://www.malwarebytes.com”
] ,
external_images: [
{
url: “http://documents.trendmicro.com/images/TEx/articles/password-hack.jpg” ,
meta_info: “/imageFilter?token=a948bd43-9517-413c-a844-bc50be66d494&format=json&q=uuid:151210890091777400541684210162620275161” ,
uuid: “151210890091777400541684210162620275161” ,
label: [
“Phone” ,
“Electronics” ,
“Cell Phone” ,
“Mobile Phone” ,
“Text”
] ,
text: “Password: *********”
} ,
]
uuid: “0e537a1202234554f9cd0a48df735bd0f9d1d4b5” ,
categories: [
“financial” ,
“pii”
] ,
emails: {
value: [
“Gemini******@shaw.ca” ,
“aheath****@gmail.com” ,
“Shayne*****@shaw.ca”
] ,
count: 3
} ,
phones: {
value: [
“+1769802****” ,
“+1416725****”
] ,
count: 2
} ,
credit_cards: {
value: [
“4724090243******” ,
“4506445713******” ,
“4506446469******”
] ,
count: 3
} ,
ssns: {
value: [
“475-83-****”
] ,
count: 1
} ,
wallet_ids: NULL ,
ips: {
value: [
“70.49.**.***” ,
“184.151.***.***” ,
“174.118.***.*”
] ,
count: 3
}