{"id":4254,"date":"2019-12-03T16:41:14","date_gmt":"2019-12-04T00:41:14","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4254"},"modified":"2022-10-20T13:20:24","modified_gmt":"2022-10-20T20:20:24","slug":"bloxone-threat-defense-intelligence-feeds-blog","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/","title":{"rendered":"BloxOne\u2122 Threat Defense Intelligence Feeds Blog"},"content":{"rendered":"<p>Did you know that Infoblox\u00ae provides 30 different threat intelligence feeds?\u00a0 Infoblox provides the most feeds of any DDI vendor. A Carnegie-Mellon University study of threat intelligence feeds from different sources or ISPs show that no two feeds are alike. By selecting more than one threat intelligence feed, you get more threat intelligence coverage. Most DDI vendors only sell one threat intelligence feed.<\/p>\n<p>Infoblox markets the TIDE feeds in 4 different packages:<\/p>\n<ul>\n<li>BloxOne\u2122 Threat Defense Essentials<\/li>\n<li>BloxOne\u2122 Threat Defense Business On-Premises and Business Cloud<\/li>\n<li>BloxOne\u2122 Threat Defense Advanced<\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td width=\"127\">\u2022 Base Hostnames<\/p>\n<p>\u2022 Anti-malware<\/td>\n<td width=\"130\">\u2022 Ransomware<\/p>\n<p>\u2022 Bogon<\/td>\n<td width=\"131\">\u2022 DHS_AIS_IP<\/p>\n<p>\u2022 DHS_AIS_ Hostname<\/td>\n<td width=\"127\">\u2022 DHS AIS NCCIC<\/p>\n<p>Watch list Hostnames<\/p>\n<p>and Domains<\/td>\n<td width=\"108\">\u2022 DHS AIS NCCIC Watch list IPs<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table width=\"624\">\n<tbody>\n<tr>\n<td width=\"120\">\u2022 Base Hostnames<\/p>\n<p>\u2022 Anti-malware<\/p>\n<p>\u2022 Ransomware<\/p>\n<p>\u2022 Bogon<\/p>\n<p>\u2022 DHS_AIS_IP<\/td>\n<td width=\"120\">\u2022 DHS_AIS_ Hostname<\/p>\n<p>\u2022 DHS AIS NCCIC<\/p>\n<p>Watch list Hostnames<\/p>\n<p>and Domains<\/p>\n<p>\u2022 DHS AIS NCCIC<\/p>\n<p>Watch list IPs<\/td>\n<td width=\"120\">\u2022 Malware IPs<\/p>\n<p>\u2022 Bot IPs<\/p>\n<p>\u2022 Exploit Kit IPs<\/p>\n<p>\u2022 Malware DGA hostnames<\/td>\n<td width=\"120\">\u2022 TOR Exit Node IPs<\/p>\n<p>\u2022 SURBL Multi domains<\/p>\n<p>\u2022 SURBL Multi Lite<\/p>\n<p>domains<\/p>\n<p>\u2022 SURBL Fresh domains<\/td>\n<td width=\"145\">\u2022 US OFAC Sanctions<\/p>\n<p>IPs<\/p>\n<p>\u2022 EECN IPs<\/p>\n<p>\u2022 Cryptocurrency hostnames<\/p>\n<p>and domains<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"125\">\u2022 Base Hostnames<\/p>\n<p>\u2022 Anti-malware<\/p>\n<p>\u2022 Ransomware<\/p>\n<p>\u2022 Bogon<\/p>\n<p>\u2022 DHS_AIS_IP<\/p>\n<p>\u2022 DHS_AIS_ Hostname<\/td>\n<td width=\"125\">\u2022 DHS AIS NCCIC<\/p>\n<p>Watch list Hostnames<\/p>\n<p>and Domains<\/p>\n<p>\u2022 DHS AIS NCCIC<\/p>\n<p>Watch list IPs<\/p>\n<p>\u2022 Malware IPs<\/p>\n<p>\u2022 Bot IPs<\/p>\n<p>\u2022 Exploit Kit IPs<\/td>\n<td width=\"125\">\u2022 Malware DGA hostnames<\/p>\n<p>\u2022 TOR Exit Node IPs<\/p>\n<p>\u2022 SURBL Multi domains<\/p>\n<p>\u2022 SURBL Multi Lite<\/p>\n<p>domains<\/p>\n<p>\u2022 SURBL Fresh domains<\/p>\n<p>\u2022 US OFAC Sanctions<\/p>\n<p>IPs<\/td>\n<td width=\"125\">\u2022 EECN IPs<\/p>\n<p>\u2022 Cryptocurrency hostnames<\/p>\n<p>and domains<\/p>\n<p>\u2022 Extended Base &amp;<\/p>\n<p>anti-malware Hostnames<\/p>\n<p>\u2022 Extended malware<\/p>\n<p>IPs<\/td>\n<td width=\"125\">\u2022 Extended TOR Exit<\/p>\n<p>Node IPs<\/p>\n<p>\u2022 Extended Ransomware<\/p>\n<p>IPs<\/p>\n<p>\u2022 Extended Exploit<\/p>\n<p>Kits IPs<\/p>\n<p>\u2022 SpamBot IPs<\/p>\n<p>\u2022 Spambot IPs DNSBL<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>BloxOne\u2122 Threat Defense Essentials in Detail<\/strong><\/p>\n<p>Eight threat intelligence feeds can be downloaded to Infoblox appliance DNS firewalls<\/p>\n<ol>\n<li>Base hostnames: The base hostnames set enables protection against known hostnames that are dangerous as destinations and are sources of threats such as APTs, bots, compromised host\/domains, exploit kits, malicious name servers and sinkholes.<\/li>\n<li>Anti-malware: This set enables protection against hostnames that contain known malicious threats that can act on or take control of your system, such as malwarecommand and control (C&amp;C), malware download and active phishing sites.<\/li>\n<li>Ransomware: The ransomware set enables protection against hostnames that contain malware that restricts access to the computer system that it infects and demands a ransom for removal of the restriction. Some forms of ransomware encrypt files on the system\u2019s hard drive. Others some may simply lock the system and display messages intended to coerce the user into paying.<\/li>\n<li>Bogon: Bogons are often the source addresses of DDoSattacks. \u201cBogon\u201d is an informal name for an IP packet on the public Internet that claims to be from an area of the IP address space reserved, but not yet allocated or delegated by the Internet Assigned Numbers Authority (IANA) or a delegated Regional Internet Registry (RIR). The areas of unallocated address space are called \u201cbogon space.\u201d Many ISPs and end-user firewalls filter and block bogons because they have no legitimate use, and usually are the result of accidental or malicious misconfiguration.<\/li>\n<\/ol>\n<p>5\/6. DHS AIS_IP and DHS AIS_Hostname (2 feeds): The Department of Homeland Security (DHS) Automated Indicator Sharing (AIS) program enables the exchange of cyber threat indicators between the federal government and the private sector. AIS is a part of the DHS\u2019s effort to create an ecosystem in which, as soon as a company or federal agency observes an attempted compromise, the indicator is shared with AIS program partners, including Infoblox. IP indicators contained in this feed are not validated by DHS because the emphasis is on velocity andvolume. Infoblox does not modify or verify the indicators. However, indicators from the AIS program are classified and normalized by Infoblox to ease consumption<\/p>\n<p>7\/8. DHS AIS NCCIC Watch list Hostnames and Domains and DHS AIS NCCIC Watch list IPs (2 feeds): Indicators contained in these feeds appear on the watch list from the National Cybersecurity and Communications Integration Center (NCCIC) and are not verified or validated by DHS or Infoblox. NCCIC acts as a hub for information-sharing activities among public and private sector partners to build awareness of vulnerabilities, incidents and mitigations. Data included in these AIS_IP, AIS_Hostname, DHS AISNCCIC Watch list Hostnames and Domains and DHS AIS NCCIC Watch list IPs feeds includes AIS data subject to the U.S. DHS Automated Indicator Sharing Terms of Use available: www.us-cert.gov\/ais. and must be handled in accordance with the Terms of Use. Prior to further distributing the AIS data, you may be required to sign and submit the Terms of Use available at: www.us-cert.gov\/ais. Please email ncciccustomerservice@hq.dhs.govfor additional information.<\/p>\n<p><strong>BloxOne\u2122 Threat Defense Business On-Premises and Business Cloud in Detail<\/strong><\/p>\n<p>BloxOne Threat Defense Business On-Premises and BloxOne Threat Defense Business Cloud offer data sets available with BloxOne Threat Defense Essentials plus additional data sets that can be applied to the security infrastructure, including Infoblox DNS Firewall RPZ policy. It provides a total of 19 feeds. The additional data sets included in BloxOne Threat Defense Business On-Premises and BloxOne Threat Defense Business Cloud are:<\/p>\n<ol start=\"9\">\n<li>Malware IPs: The malware IP set enables protection against known malicious or compromised IP addresses. These are known to host threats that can act on or control a system by way of C&amp;C malware downloads and active phishing sites.<\/li>\n<li>Bot IPs: This set enables protection against self-propagating malware designed to infect a host and connect back to a central server or servers that act as a C&amp;C center for an entire network of compromised devices, or \u201cbotnet.\u201d With a botnet, attackers can launch broad-based, remote-control flood-type attacks against targets. Bots can also log keystrokes, gather passwords, capture and analyze packets, gather financial information, launch DoS attacks, relay spam and open back doors on the infected host.<\/li>\n<li>Exploit kit IPs: This set enables protection against distributable packs that contain malicious programs used to execute \u201cdrive-by down-load\u201d attacks to infect user with malware. These exploit kits target vulnerabilities in the user\u2019s machine (usually due to unpatched versions of Java, Adobe Reader, Adobe Flash, Internet Explorer and other applications) to load malware onto the victim\u2019s computer.<\/li>\n<li>Malware DGA hostnames: Domain generation algorithms (DGA) appear in various families of malware used to periodically generate many domain names that can act as rendezvous points with their C&amp;C servers. Examples include Ramnit, Conficker and Banjori.<\/li>\n<li>Tor Exit Node IPs: Tor Exit Nodes are the gateways where encrypted Tor traffic hits the Internet. This means an exit node can monitor Tor traffic (after it leaves the onion network). The Tor network is designed to make it difficult to determine its traffic\u2019s source.<\/li>\n<li>SURBL Multi domains: This set of malicious domains includes up-to-date intelligence on active malware, phishing, botnet and spam domains, based on data provided by our partner SURBL.<\/li>\n<li>SURBL Multi Lite domains: A subset of SURBL Multithreat feed, Multi Lite is designed to fit on appliances with limitations on the number of threat intelligence entries that they can accommodate. SURBL Multi Lite offers more concise and targeted threat intelligence focusing on only the most current malicious sites. The combined set includes malware, phishing and botnet activity.<\/li>\n<li>SURBL Fresh domains: The SURBL Fresh feed deals with newly observed domains (NOD), providing critical, accurate information about when new domains are placed into service. This set of domains can be applied to Infoblox DNS Firewall RPZ security policies (e.g., block, quarantine, walled garden and others) to prevent resolution of new domains, based on the user\u2019s defined policies. The set is based on data from our partner SURBL.<\/li>\n<li>US OFAC Sanctions IPs: This policy-based feed contains IPs of U.S. sanctioned countries listed by the U.S. Treasury Office of Foreign Assets Control (OFAC), which administers and enforces economic sanctions imposed by the United States against foreign countries. More information is available on the \u201cSanctions Programs and Country Information\u201d page found here: www.treasury.gov\/resource-center\/sanctions\/Programs\/Pages\/Programs.aspx.<\/li>\n<li>EECN IPs: This policy-based feed contains IPs of countries in Eastern Europe and China that are often sources of cyberattacks seeking intellectual property or other sensitive or classified data, as well as theft of credit card or financial information.<\/li>\n<li>Cryptocurrency hostnames and domains: This feed features threats that allow malicious actors to perform illegal and\/or fraudulent activities, coinhives that allow site owners to embed cryptocurrency mining software into their webpages to replace normal advertising, cryptojacking that lets site owners mine for cryptocurrency without the owner\u2019s consent and cryptocurrency mining pools.<\/li>\n<\/ol>\n<p><strong>BloxOne\u2122 Threat Defense Advanced in Detail<\/strong><\/p>\n<p>BloxOne Threat Defense (B1TD) Advanced includes all the data feeds described above plus additional data feeds and the TIDE platform. It provides a total of 26 feeds. The additional data sets in BloxOne Threat Defense Advanced include:<\/p>\n<p>Extended TTL feeds: These feeds expand the base, anti-malware, ransomware, exploit kits and TOR Exit Node feeds that contain recently expired threats with an extended time-to-live (TTL) applied. The extended TTL feeds increase the reach of protection for a DNS Firewall. However, they may also increase the risk of false positives because indicators may no longer be active.<\/p>\n<p>The Extended TTL feeds are:<\/p>\n<ol start=\"20\">\n<li>Extended base &amp; anti-malware: Base and anti-malware hostname feeds combined into a single feed with the extended TTL feeds applied<\/li>\n<li>Extended malware IPs<\/li>\n<li>Extended TOR Exit Node IPs<\/li>\n<li>Extended ransomware IPs<\/li>\n<li>Extended exploit kit IPs<\/li>\n<li>Spambot IPs: This feed protects against a computer or bot node as part of a botnet seen sending spam. IPs listed are also frequently found with a poor or negative reputation for those addresses.<\/li>\n<li>Spambot IPs DNSBL: In DNSBL format, this feed contains IPs of known spam servers. It guards against a computer or bot node as part of a botnet seen sending spam. It can help block incoming spam or potentially malicious emails from known spam sources by feeding into your email platform or appliance.<\/li>\n<\/ol>\n<p><strong>3<sup>rd<\/sup> Party Feeds<\/strong><\/p>\n<p>Infoblox also offers third party feeds. They are available when you purchase the BloxOne Threat Defense Advanced package.<\/p>\n<p>Crowdstrike\u2122:\u00a0 This is a leading provider of next-generation endpoint protection, threat intelligence and services. CrowdStrike Falcon hostname and IP intelligence enables customers to prevent damage from targeted attacks, detect and attribute advanced malware and adversary activity in real time and effortlessly search all endpoints, reducing overall incident response time. Customers must purchase the CrowdStrike feed directly from CrowdStrike, but Infoblox can help to \u201cturn on\u201d thefeed in the TIDE platform.<\/p>\n<p>FireEye\u2122: Its IP and hostname cyber threat intelligence equips enterprises with strategic, operational and tactical analysis derived by its global team of experts. A ThreatScape subscription provides the intelligence necessary to align a security program with business risk management goals and to proactively defend against new and emerging cyber threats. Although customers to purchase the iSight feed directly from FireEye, Infoblox can help to \u201cturn on\u201d the feed in the TIDE platform.<\/p>\n<p>ThreatTrack\u2122 Security BorderPatrol Feed: The BorderPatrol Sites feed is a blacklist consisting of domains associated with the distribution of potentially unwanted software and advertising.<\/p>\n<p>Farsight Security\u2122 Newly Observed Domains (NOD) Feed: This feed supplies an incremental layer of defense to combat malware exfiltration, brand abuse and spam-based attacks that originate or terminate at newly launched domains.<\/p>\n<p>Proofpoint\u2122 Emerging Threats (ET,previously, IQRisk) IP and Domain Reputation Feed: This feed provides actionable IP and domain reputation entries that are scored based on observations of in-the-wild threat actor behavior and direct observations by Proofpoint\u2019s ET Labs. Built upon a proprietary process that leverages one of the world\u2019s largest active malware exchanges, victim emulation at massive scale, original detection technology and a global sensor network, Proofpoint ET Intelligence is updated in real time to provide organizations with the actionable intelligence to combat today\u2019s emerging threats.<\/p>\n<p>Which package should you choose? Different enterprises can experience different hits.\u00a0 It is best to try out all of the feeds to determine which ones get hit.\u00a0 The Infoblox sales account team can help in conducting a proof-of-concept testing.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you know that Infoblox\u00ae provides 30 different threat intelligence feeds?\u00a0 Infoblox provides the most feeds of any DDI vendor. A Carnegie-Mellon University study of threat intelligence feeds from different sources or ISPs show that no two feeds are alike. By selecting more than one threat intelligence feed, you get more threat intelligence coverage. Most [&hellip;]<\/p>\n","protected":false},"author":279,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[153,15,40],"class_list":{"0":"post-4254","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-security","7":"tag-bloxone","8":"tag-security","9":"tag-threat-intelligence","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>BloxOne Threat Defense Intelligence Feeds Blog<\/title>\n<meta name=\"description\" content=\"Infoblox offers several services related to network security that can help your business. Learn about BloxOne Threat Defense and how it can help your company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BloxOne\u2122 Threat Defense Intelligence Feeds Blog\" \/>\n<meta property=\"og:description\" content=\"Infoblox offers several services related to network security that can help your business. Learn about BloxOne Threat Defense and how it can help your company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-04T00:41:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-20T20:20:24+00:00\" \/>\n<meta name=\"author\" content=\"Thomas Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/\"},\"author\":{\"name\":\"Thomas Lee\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/09eef104302d85b2c7d7ce4bec738761\"},\"headline\":\"BloxOne\u2122 Threat Defense Intelligence Feeds Blog\",\"datePublished\":\"2019-12-04T00:41:14+00:00\",\"dateModified\":\"2022-10-20T20:20:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/\"},\"wordCount\":1988,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"keywords\":[\"BloxOne\u00ae\",\"Security\",\"Threat Intelligence\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/\",\"name\":\"BloxOne Threat Defense Intelligence Feeds Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"datePublished\":\"2019-12-04T00:41:14+00:00\",\"dateModified\":\"2022-10-20T20:20:24+00:00\",\"description\":\"Infoblox offers several services related to network security that can help your business. Learn about BloxOne Threat Defense and how it can help your company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/bloxone-threat-defense-intelligence-feeds-blog\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BloxOne\u2122 Threat Defense Intelligence Feeds Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/09eef104302d85b2c7d7ce4bec738761\",\"name\":\"Thomas Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_279_1571768676-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_279_1571768676-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_279_1571768676-96x96.jpg\",\"caption\":\"Thomas Lee\"},\"description\":\"Thomas Lee is a Technical Marketing Engineer at Infoblox. He has been with Infoblox for over 7 years. He works on the NIOS platform and does competitive analysis. He holds a Computer Science degree from California State University East Bay.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/thomas-lee\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"BloxOne Threat Defense Intelligence Feeds Blog","description":"Infoblox offers several services related to network security that can help your business. Learn about BloxOne Threat Defense and how it can help your company.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/","og_locale":"en_US","og_type":"article","og_title":"BloxOne\u2122 Threat Defense Intelligence Feeds Blog","og_description":"Infoblox offers several services related to network security that can help your business. Learn about BloxOne Threat Defense and how it can help your company.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/","og_site_name":"Infoblox Blog","article_published_time":"2019-12-04T00:41:14+00:00","article_modified_time":"2022-10-20T20:20:24+00:00","author":"Thomas Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thomas Lee","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/"},"author":{"name":"Thomas Lee","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/09eef104302d85b2c7d7ce4bec738761"},"headline":"BloxOne\u2122 Threat Defense Intelligence Feeds Blog","datePublished":"2019-12-04T00:41:14+00:00","dateModified":"2022-10-20T20:20:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/"},"wordCount":1988,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"keywords":["BloxOne\u00ae","Security","Threat Intelligence"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/","url":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/","name":"BloxOne Threat Defense Intelligence Feeds Blog","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"datePublished":"2019-12-04T00:41:14+00:00","dateModified":"2022-10-20T20:20:24+00:00","description":"Infoblox offers several services related to network security that can help your business. Learn about BloxOne Threat Defense and how it can help your company.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/bloxone-threat-defense-intelligence-feeds-blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"BloxOne\u2122 Threat Defense Intelligence Feeds Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/09eef104302d85b2c7d7ce4bec738761","name":"Thomas Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_279_1571768676-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_279_1571768676-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_279_1571768676-96x96.jpg","caption":"Thomas Lee"},"description":"Thomas Lee is a Technical Marketing Engineer at Infoblox. He has been with Infoblox for over 7 years. He works on the NIOS platform and does competitive analysis. He holds a Computer Science degree from California State University East Bay.","url":"https:\/\/www.infoblox.com\/blog\/author\/thomas-lee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/279"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4254"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4254\/revisions"}],"predecessor-version":[{"id":8163,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4254\/revisions\/8163"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}