ThreatConnect Marketplace
  • Apps
  • Playbooks
  • Apps
  • Playbooks
Home » Playbook Overview » RiskIQ Playbooks
Back to Apps

Categories:
  • Data Enrichment
Built by

ThreatConnect

RiskIQ Playbooks

There are 3 RiskIQ Playbook templates that are consolidated under this listing.

The Create RiskIQ Event Playbook template will allow you to create an event in RiskIQ. The component allows the user to create phish, content, domain-infringement, social, rogue-mobile-app, and custom event types. Once the event is created, the component will parse the response for the event ID and expose that as an output variable to be used by downstream apps.

The Create RiskIQ Inventory Asset Playbook template will allow a user to create an Inventory Asset in RiskIQ’s platform. The component allows the user to create WebSite, NameServer, MailServer, Host, Domain, IpBlock, ASN, SSL Certificate, and Contact Asset types. Once the Asset is created, RiskIQ will not return an API response so the Component will only expose the HTTP Status Code as an output variable.

The Create RiskIQ Landing Page Playbook template will allow you to submit a URL RiskIQ’s Landing Page API endpoint. Landing Pages are a means to submit and receive data on particular URLs. Once the URL is created, the component will parse the response for the various pieces of information returned and expose those as output variables to be used by downstream apps.

These Playbook templates can be found in the App Catalog under the names: Create RiskIQ Inventory Asset, Create RiskIQ Inventory Asset, and Create RiskIQ Landing Page


Related Playbooks

Cisco Umbrella Reporting
Data Enrichment

With the Cisco Umbrella Reporting integration you are able to retrieve reports from Cisco Umbrella Reporting.

DomainTools Iris Search Hash Monitoring Playbook
Data Enrichment

This playbook not only provides DomainTools Iris enrichment, but can also be utilized to monitor specific Iris Search hashes...

Hyas Insight Enrichment Playbooks
Data Enrichment

With the HYAS Insight integration for ThreatConnect, SOC, CSIRT, and threat intel teams can connect specific attack instances...

Developers

  • Knowledge Base
  • Training Site

Company

  • ThreatConnect
  • Contact Us
  • Blog
  • Twitter
  • Facebook
  • Linkedin
© Copyright - ThreatConnect Marketplace
Scroll to top