RiskIQ PassiveTotal
Visit Website
riskiq.com
Loading

RiskIQ PassiveTotal

Hands-on threat investigation and monitoring workflows with RiskIQ PassiveTotal
Rating
Your vote:
Screenshots
1 / 3
Visit Website
riskiq.com
Loading

Start your investigation from a single clue—an IP, domain, or certificate fingerprint—and move fast. In RiskIQ PassiveTotal, drop that artifact into search, then pivot through DNS resolutions, registrar ownership, page components, and certificate reuse to map connected assets in minutes. Use the timeline to spot first‑seen events and bursts of activity. Check risk indicators, malware sightings, and blocklist hits to decide: escalate, contain, or close. Save relevant items to a project and tag them for team visibility.

For alert triage, wire PassiveTotal into your SIEM or EDR workflow. When an alert fires, open the artifact’s profile, review historical hosts, co-occurring trackers, and host pairs to see how users might be redirected. Compare infrastructure against known-good baselines. Add suspicious domains to a staging denylist, export IP ranges for firewall rules, and attach a snapshot of the graph to the ticket. Document the decision path directly in the case notes so handoffs to the next shift are clean.

Build proactive monitoring by creating watchlists for your brand, VIPs, or critical vendors. Track new subdomains, WHOIS changes, and certificate issuances tied to your keywords. Configure alerts when a fresh resolver appears or an old certificate resurfaces on an unexpected host. Schedule a weekly review, batch-export changes to CSV, and feed them to your SIEM for correlation. Share a read-only case link with legal or fraud teams so they can follow progress without extra accounts. more

Review Summary

Features

  • Unified artifact profiles with historical context
  • Passive DNS, WHOIS, and TLS certificate datasets
  • Tracker, component, and host-pair pivots
  • Interactive graphing and infrastructure mapping
  • Risk signals, sightings, and reputation context
  • Projects, tags, and case notes for collaboration
  • Custom watchlists and real-time alerts
  • CSV export and evidence snapshots
  • REST API for enrichment and automation
  • Integrations with SIEM, SOAR, EDR, and ticketing

How It’s Used

  • SOC alert triage and disposition
  • Infrastructure mapping for phishing and malware
  • Brand and executive impersonation monitoring
  • Third-party and vendor exposure tracking
  • Incident response and containment planning
  • Takedown coordination with registrars and hosts
  • Threat hunting across shared components
  • Automated enrichment in ingestion pipelines
  • Shift handoffs with case notes and graph snapshots
  • Reporting to legal, fraud, and leadership

Plans & Pricing

Riskiq Passivetotal

Custom

Rapid Threat Investigations
Neutralize Attacker Opportunities
Scale Threat Hunting, Automate Response
Automated Data Assembly
Tailored Watchlists
Threat Intelligence, Attribution
Security Integrations

Comments

User

Your vote: