Port Six Threat Intelligence API Documentation
What is Port Six?
Port Six transforms raw threat indicators into scored, contextualized, actionable intelligence ready for your security stack. We enrich IPs, domains, URLs, and file hashes with behavioral classification, malware attribution, and multi-dimensional risk scoring.
Sub-100ms response times mean you can enrich every firewall connection, validate every URL in email, and block C2 callbacks before data leaves your network.
Why Port Six
Intelligence, Not Just Indicators
Raw IOC feeds tell you an IP is "bad." We tell you why:
- Behavioral classification - Is this C2, phishing, cryptomining, or ransomware infrastructure?
- Malware family attribution - Cobalt Strike, Emotet, Sliver, AsyncRAT, and 100+ families
- Threat actor context - APT attribution when confidence is high
- Temporal analysis - When first seen, how active, is it stale?
Actionable Scoring
Every observable receives three scores to help you tune detection thresholds:
- Risk Score (0-100) - How dangerous is this indicator?
- Confidence Score (0-100) - How certain are we about this assessment?
Block high-risk/high-confidence immediately. Alert on medium for review.
Operational Readiness
Export in formats your security tools understand:
- External Dynamic Lists - Palo Alto, Fortinet, Cisco
- STIX 2.1 / TAXII 2.1 - Standard threat sharing
- Suricata/Snort rules - IDS/IPS ready
- CSV/JSON - Bulk import anywhere
Not Another Portal
Platform Fatigue is Real
The average SOC juggles 25+ security tools. Every new portal means another tab, another login, another context switch. Your analysts are drowning in dashboards.
We're an API, Not a Portal
Port Six is designed to disappear into your existing stack:
- Enrich alerts directly in Splunk, Sentinel, or QRadar
- Push blocklists automatically to your firewall
- Query from scripts, playbooks, and SOAR workflows
- No new tab to check. No new login to remember.
Your analysts stay in their tools. Our intelligence comes to them.
When You Do Need a Dashboard
Our portal exists for API key management and usage analytics - not for manual IOC lookups. Track consumption by endpoint, monitor response times, and forecast credit usage. Then get back to your SIEM.
Platform Highlights
What We Cover
- 100+ malware families tracked with C2 infrastructure mapping
- 50+ threat actor groups monitored with campaign attribution
- Behavioral tags across 12 threat categories (C2, phishing, ransomware, etc.)
- Global coverage with GeoIP, ASN, and cloud provider detection
Enrichment Depth
- IP Addresses: GeoIP, ASN, cloud provider, Tor/VPN/proxy detection, threat tags
- Domains: WHOIS, DNS records, SSL certificates, age analysis, reputation
Documentation
Getting Started
Quick start guide, API key setup, and your first enrichment request in 5 minutes.
Authentication
API key management, header format, security best practices, and key rotation.
API Reference
Full endpoint documentation for IP, domain, and hash lookups with request/response examples.
Tagging Taxonomy
Behavioral tags, malware families, threat actors, MITRE ATT&CK mapping, and infrastructure classification.
Scoring
Risk and confidence scoring methodology, score ranges, and how to use scores for detection tuning.
Data Coverage
Observable types, malware family coverage, geographic reach, and intelligence source overview.
Use Cases
SIEM enrichment, threat hunting, incident response, perimeter defense, and SOC automation workflows.
Integrations
Splunk, Elastic, Palo Alto EDL, Microsoft Sentinel, Chronicle SIEM, and rate limiting guidance.
Pricing & Usage
Credit system, tier comparison, usage analytics, and cost estimation calculator.