Threat Indicator Database

Use Oracle Cloud Infrastructure Threat Intelligence to search for information about known threat indicators, including suspicious IP addresses, domain names, and other digital fingerprints.

You can view the types of threats that Threat Intelligence defines.

You can perform the following tasks:

Required IAM Policy

To use Oracle Cloud Infrastructure, you must be granted the required type of access in a policy written by an administrator, whether you're using the Console or the REST API with an SDK, CLI, or other tool.

If you try to perform an action and get a message that you don’t have permission or are unauthorized, confirm with your administrator the type of access you were granted and which compartment  you are supposed to work in.

For example, to allow users in the group SecurityAdmins to search for and view threat indicators in Threat Intelligence:

Allow group SecurityAdmins to read threat-intel-family in tenancy

See Threat Intelligence IAM Policies.