Blueliv
Community
community

Welcome to the cyber threat ecosystem

Be part of a strong cyber threat ecosystem. The Blueliv cyber threat ecosystem includes external cyber security experts and alliances with organizations with whom we share threat data, cyber attack trends, and best practices. A strong, collaborative community improves everyone’s ability to fight cyber threats more effectively. Come join the fight against cyber crime.

Visit the Map

Real-Time Cyber Threat Map:

Get access and see the geolocation and number of live crime servers that are actively engaged in criminal events, which countries are hosting them as well as the type of malicious activity.

Live Crime Server Activity API Access:

Start blocking connections and analyzing your company navigation logs with the data of verified online crime servers conducting malicious activity.

Malicious IP Query:

Analyze your IPs to see if they are interacting with crime servers and gain a deeper insight into what attack vectors are being deployed.

Malware Analysis Sandbox:

Upload and analyze a malware sample to obtain a report that includes the connections that the sample made during runtime analysis.

Threat Exchange Network:

Keep updated with the latest threats and share IoCs such as IPs, URLs and file hashes to protect the community. By providing expert threat data, the Blueliv Threat Exchange Network allows you and your peers improve incident response and get recognized for your contributions by earning different statuses.
Join The Threat Exchange Network

Real-Time Cyber Threat Map:

Get access and see the geolocation and number of live crime servers that are actively engaged in criminal events, which countries are hosting them as well as the type of malicious activity. Each of the data points on the map come from verified online crime servers.
Visit the Map

Malware Analysis Sandbox:

Upload and analyze a malware sample to obtain a report that includes the connections that the sample made during runtime analysis. Get valuable information for an analysis (anti-virus matching, signature matching, network connections, etc.), and some early indicators ready to scan your infrastructure for existing infections.
ANALYZE A MALWARE SAMPLE

Live Crime Server Activity API Access:

Start blocking connections and analyzing your company navigation logs with the data of verified online crime servers conducting malicious activity.
Get access to the API

Malicious IP Query:

Analyze your IPs to see if they are interacting with crime servers or have visited malicious URLs. Gain a deeper insight into what attack vectors are being deployed and establish a definitive understanding of the IOCs.
Check your IP address

Github:

Visit our Github repository to find open-source SIEMS tools, API use case examples, and more..
See documents

Plugins

With these plugins you will be able to retrieve a live stream of crime servers used by fraudsters to infect computers and steal information from end users. You can access for free to Blueliv’s real-time global intelligence such as malware distribution domains, C&Cs, phishing, exploit kits to backdoors to help prevent attacks.

logo-splunk

Splunk App for Blueliv

Splunk App for Blueliv provides users with an easy and clear interface to get fast and useful cyber threat results and monitor most active hacktivism OPS.

SEE VIDEO TUTORIAL >

Get it here

logo-alienvault

Blueliv Plugin for AlienVault

This plugin allows users to gain cyber threat visibility to enhance your security posture.

SEE VIDEO TUTORIAL >

Get it here

logo-elastic

Blueliv Plugin for Logstash

ELK users will be able to access Blueliv’s global intelligence through Kibana Dashboards.

SEE VIDEO TUTORIAL >

Get it here