Port Six

Aggregated, enriched, scored threat intelligence via API.

No portal. No dashboard. Just data.

Threat Intelligence API for Security Teams

Raw threat feeds tell you an IP is "bad." Port Six tells you why — with behavioral classification, malware attribution, and risk scoring delivered via a fast REST API that integrates directly into your SIEM, firewall, and SOC workflows.

Intelligence, Not Indicators

Every observable comes with context:

Actionable Scoring

Tune your detection thresholds:

  • Risk Score (0-100) — How dangerous is this?
  • Confidence Score (0-100) — How certain are we?

Block high/high. Alert on medium.

Works With Your Stack

Export in formats your tools understand:

Ready to enrich your threat data?

Start with 75 free credits. No credit card required.

View Docs

The Difference

Same query. Different intelligence.

Typical Threat Intel API
GET /api/ip/185.220.101.45

{
  "ip": "185.220.101.45",
  "malicious": true,
  "threat_type": "tor",
  "last_updated": "2024-03-15"
}
Port Six
GET /v1/ip/185.220.101.45

{
  "value": "185.220.101.45",
  "status": "active",
  "risk_score": 43.74,
  "geo": {
    "country_name": "Germany",
    "city": "Berlin"
  },
  "asn": {
    "asn": 60729,
    "org_name": "TORSERVERS-NET"
  },
  "rdns": {
    "hostname": "tor-exit-45.for-privacy.net"
  },
  "threat_intel": {
    "tags": [
      "Anon: Tor", "Anon: Vpn", "Attacks",
      "Brute Force", "Protocol: SSH", "Protocol: SIP"
    ],
    "sources": [
      "alienvault_otx",
      "greensnow-blocklist",
      "ssh-bruteforce"
    ],
    "first_seen": "2025-12-01T03:14:09Z",
    "last_seen": "2025-12-30T06:44:02Z",
    "confidence": 90
  },
  "relationships": [{
    "relationship_type": "resolves_to",
    "target_value": "for-privacy.net",
    "confidence": 0.85
  }]
}

Why It Matters

A binary "malicious: true" verdict forces your team to research every alert. With enriched context, you immediately know this is a Tor exit node used for SSH brute force attacks, it's actively reported across multiple sources, and it resolves to a known privacy network domain. Your SOC can triage in seconds instead of minutes.

At a Glance

5+
Tags per observable
19
Tag taxonomies
<100ms
Response time
100%
Observable coverage

SIEM & Security Tool Integrations

Works with what you already have. View integration guides →

SIEM

Splunk, QRadar, Sentinel, Elastic, Chronicle

Firewall

Palo Alto (EDL), Cisco, Fortinet, pfSense

EDR

CrowdStrike, Defender, Carbon Black

Export

JSON, CSV, STIX 2.1, TAXII

Get Started

5-minute quickstart. Free tier with 75 credits. No credit card required.

You already have enough dashboards. This is just an API.