{"id":7941,"date":"2025-01-09T10:36:06","date_gmt":"2025-01-09T10:36:06","guid":{"rendered":"\/cybersecurity-blog\/?p=7941"},"modified":"2025-12-01T13:46:32","modified_gmt":"2025-12-01T13:46:32","slug":"ti-feeds-integration","status":"publish","type":"post","link":"\/cybersecurity-blog\/ti-feeds-integration\/","title":{"rendered":"Integrate ANY.RUN Threat Intelligence Feeds with Your Security Platform"},"content":{"rendered":"\n<p>The ANY.RUN <a href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_feeds_integration&amp;utm_term=110624&amp;utm_content=linktotifeeds\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a> provide data on the known indicators of compromise: malicious IPs, URLs, domains, files, and ports.&nbsp; &nbsp;<\/p>\n\n\n\n<p>The data is collected and pre-processed from malware and phishing samples analyzed by our community of 500,000 researchers in the <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_feeds_integration&amp;utm_term=110624&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN sandbox environment<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How ANY.RUN\u2019s TI Feeds Help Organizations<\/h2>\n\n\n\n<p>Cyber Threat Intelligence Feeds from ANY.RUN extend the threat coverage of your SIEM and TIP systems. They provide IOCs of recently seen cyber threats so you can proactively prepare to defend your infrastructure against them, as well as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Expand Threat Coverage<\/strong>: Improve system\u2019s ability to detect emerging malware and phishing attacks. &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improve Incident Response<\/strong>: Enrich incident response processes with contextual data, providing deeper insights into threats and their behaviors. &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strengthen Security Posture<\/strong>: Ensure proactive defense against new and evolving threats. &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Optimize Threat Hunting<\/strong>: Streamline threat hunting activities, identifying and investigating potential threats more effectively.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Feeds are easy to use. It\u2019s practically a plug and play solution (as long as your team is already using a SIEM or TIP system).&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n\nContact us and we&#8217;ll help you integrate <span class=\"highlight\">ANY.RUN TI Feeds<\/span> <br>in your organization&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=ti_feeds_integration&#038;utm_term=110624&#038;utm_content=linktotifeedsform#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact Sales\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Indicators Provided by ANY.RUN\u2019s TI Feeds<\/h2>\n\n\n\n<p>The IOCs include information on malicious IP addresses, domain names, and URLs, enriched with contextual details such as related files and ports. &nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IP addresses&nbsp;<\/h3>\n\n\n\n<p>IP addresses are important for detecting and preventing malicious network activity. They serve as digital markers of cybercriminal operations, often linked to Command-and-Control (C2) servers or phishing campaigns.&nbsp;<\/p>\n\n\n\n<p>By analyzing IP addresses, cybersecurity teams can identify and block malicious sources, trace attack origins and monitor threat patterns.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Domains&nbsp;<\/h3>\n\n\n\n<p>Domains are often used as staging points for cyberattacks. They provide a higher-level view of malicious activity, often connecting multiple IPs or malware instances within a single campaign.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN\u2019s TI feeds provide comprehensive information about domains, including all the details available for IP addresses, such as threat names, types, detection timestamps, and related file hashes.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">URLs&nbsp;<\/h3>\n\n\n\n<p>URL addresses serve as gateways to distribute malware, execute phishing campaigns, or redirect users to malicious content. Their flexibility and ease of use make them a preferred tool for attackers.&nbsp;<\/p>\n\n\n\n<p>By analyzing URLs, cybersecurity teams can uncover attack patterns, block harmful traffic, and prevent unauthorized access to systems and data.&nbsp;<\/p>\n\n\n\n<p>More information on TI Feeds\u2019 structure and additional IOCs &nbsp;\u2014 <a href=\"https:\/\/any.run\/cybersecurity-blog\/inside-cyber-threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">in our blog post<\/a>. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Features of ANY.RUN\u2019s TI Feeds<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fresh Indicators: <\/strong>Mined from the latest samples uploaded to our interactive sandbox by a global network of over 500,000 security professionals and updated in real time. &nbsp;<\/li>\n\n\n\n<li><strong>Contextual Information<\/strong>: Offer more than just IOCs by providing direct links to sandbox sessions that include memory dumps, network traffic, and events. &nbsp;<\/li>\n\n\n\n<li><strong>Rigorous Pre-Processing<\/strong>: Advanced algorithms and proprietary technology used for data filtering and validation. &nbsp;<\/li>\n\n\n\n<li><strong>STIX\/TAXII format<\/strong>: Deliver threat intelligence feeds in the STIX\/TAXII format, making it easy for security teams to integrate our data into their existing infrastructure. &nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Try Demo Sample of ANY.RUN&#8217;s TI Feeds&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"607\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-1024x607.png\" alt=\"\" class=\"wp-image-17076\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-1024x607.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-300x178.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-768x455.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-1536x910.png 1536w, \/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-370x219.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-270x160.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main-740x438.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/ti_feeds_main.png 1821w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Setting up TI Feeds is simple<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We provide <a href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_feeds_integration&amp;utm_term=110624&amp;utm_content=linktofeeds\" target=\"_blank\" rel=\"noreferrer noopener\">free samples of ANY.RUN&#8217;s Threat Intelligence Feeds<\/a> with data from 6 months ago, so you can test them in your security setting.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_feeds_integration&amp;utm_term=110624&amp;utm_content=linktotifeedsform#contact-sales\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us to access the most up-to-date TI Feeds version<\/a> or make a purchase.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n\nContact us to access the full version of <span class=\"highlight\">ANY.RUN TI Feeds<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=ti_feeds_integration&#038;utm_term=110624&#038;utm_content=linktotifeedsform#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact Sales\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Which vendors can integrate with ANY.RUN?&nbsp;<\/h2>\n\n\n\n<p>Our threat intelligence feeds share data in the standardized STIX\/TAXII format. This means that you can practically integrate ANY.RUN feeds with any vendor, including popular platforms like <a href=\"https:\/\/any.run\/cybersecurity-blog\/opencti-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">OpenCTI<\/a> and <a href=\"https:\/\/knowledge.threatconnect.com\/docs\/creating-an-http-feed\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatConnect<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_feeds_integration&amp;utm_term=110624&amp;utm_content=linktotifeedsform#contact-sales\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us to get assistance with your integration.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How TI Feeds Support Business Performance&nbsp;<\/h2>\n\n\n\n<p>Adding Threat Intelligence feeds to your cybersecurity framework significantly raises the sustainability of your organization. &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cost reduction: <\/strong>Investing in TI feeds can lead to significant cost savings by preventing data breaches and minimizing the need for reactive security measures. &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Informed decision-making<\/strong>: Quality TI feeds provide critical insights, ensuring that security efforts are focused on the most pressing threats. &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Brand reputation<\/strong>: Early detection of threats reduces the likelihood of incidents that could damage a company\u2019s name.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Operational efficiency<\/strong>: Integrating CTI feeds can contribute to better response process, improving mean time to resolution (MTTR).&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Compliance: <\/strong>TI feeds help document incidents, enrich security reports, and meet requirements for frameworks like GDPR, HIPAA, and PCI. &nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_feeds_integration&amp;utm_term=110624&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_feeds_integration&amp;utm_term=110624&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s services \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ANY.RUN Threat Intelligence Feeds provide data on the known indicators of compromise: malicious IPs, URLs, domains, files, and ports.&nbsp; &nbsp; The data is collected and pre-processed from malware and phishing samples analyzed by our community of 500,000 researchers in the ANY.RUN sandbox environment. How ANY.RUN\u2019s TI Feeds Help Organizations Cyber Threat Intelligence Feeds from [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[57,10,15],"class_list":["post-7941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-anyrun","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Integrate ANY.RUN TI Feeds Into Your Security Platform<\/title>\n<meta name=\"description\" content=\"Learn how you can integrate ANY.RUN&#039;s Threat Intelligence Feeds into your security infrastructure and get access to a free feeds sample.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"Integrate ANY.RUN Threat Intelligence Feeds with Your Security Platform\",\n\t            \"datePublished\": \"2025-01-09T10:36:06+00:00\",\n\t            \"dateModified\": \"2025-12-01T13:46:32+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\"\n\t            },\n\t            \"wordCount\": 831,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"ANYRUN\",\n\t                \"cybersecurity\",\n\t                \"malware\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Cybersecurity Lifehacks\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\",\n\t            \"name\": \"Integrate ANY.RUN TI Feeds Into Your Security Platform\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2025-01-09T10:36:06+00:00\",\n\t            \"dateModified\": \"2025-12-01T13:46:32+00:00\",\n\t            \"description\": \"Learn how you can integrate ANY.RUN's Threat Intelligence Feeds into your security infrastructure and get access to a free feeds sample.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Cybersecurity Lifehacks\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Integrate ANY.RUN Threat Intelligence Feeds with Your Security Platform\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Integrate ANY.RUN TI Feeds Into Your Security Platform","description":"Learn how you can integrate ANY.RUN's Threat Intelligence Feeds into your security infrastructure and get access to a free feeds sample.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Integrate ANY.RUN Threat Intelligence Feeds with Your Security Platform","datePublished":"2025-01-09T10:36:06+00:00","dateModified":"2025-12-01T13:46:32+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/"},"wordCount":831,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/","url":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/","name":"Integrate ANY.RUN TI Feeds Into Your Security Platform","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-01-09T10:36:06+00:00","dateModified":"2025-12-01T13:46:32+00:00","description":"Learn how you can integrate ANY.RUN's Threat Intelligence Feeds into your security infrastructure and get access to a free feeds sample.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"Integrate ANY.RUN Threat Intelligence Feeds with Your Security Platform"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7941"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=7941"}],"version-history":[{"count":47,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7941\/revisions"}],"predecessor-version":[{"id":17086,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7941\/revisions\/17086"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/10919"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=7941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=7941"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=7941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}