Providers
A "provider" is a third party company who has partnered with Pangea to deliver their security capabilities, technology or data through a new or enhanced Pangea service.
Supported data providers and use cases
Each provider cultivates data from different sources that yield different information. Some provider data sets and results may be more appropriate for your use case than others. Review each provider description carefully and pick one that best suits your requirements.
This section lists Pangea's supported providers, the endpoints associated with the providers, the partner technologies used in the endpoints, and gives example use cases for these partner powered Pangea services.
Provider | Endpoint | Partner documentation | Example use case |
---|---|---|---|
ReversingLabs | file-intel/v2/reputation | ReversingLabs File reputation service This endpoint is powered by the ReversingLabs TitaniumCloud Reputation Service, which is a data set comprised of up-to-date threat classification and rich context on tens of billions of goodware and malware files. This provider is used to determine if a given file hash is known by ReversingLabs to be malicious. When using this provider, hashes for newly created files are not likely to be found in the data set. |
|
ReversingLabs | file-scan/v1/scan | ReversingLabs Cloud Deep Scan This endpoint is powered by the ReversingLabs Cloud Deep Scan technology. The scan uses unique ReversingLabs File Decomposition technology to extract detailed metadata, add global reputation context and classify threats. This endpoint is used to determine the likelihood that a file is malicious. Malware scanning can find previously known, but also some brand new threats. When using this endpoint, files are uploaded and scanned by ReversingLabs. Results include a verdict and risk score that allows a user to decide if the uploaded file is malicious. |
|
Domain Tools | domain-intel/v2/reputation | Domain Risk Score This endpoint is powered by DomainTools Domain Risk Score. Drawing upon data points from more than 390 million current Internet domains, DomainTools Risk Score predicts how likely a domain is to be malicious, often before it is weaponized. The score comes from two distinct algorithms: Proximity and Threat Profile. Proximity evaluates the likelihood a domain may be part of an attack by analyzing how closely connected it is to other known-bad domains. Threat Profile leverages machine learning to model how closely a domain’s intrinsic properties resemble others used for spam, phishing, or malware. This endpoint is used to determine the likelihood that a domain is malicious. When using this endpoint, a Domain Risk Score is returned for all domains. |
|
CrowdStrike | file-scan/v1/scan | CrowdStrike File Analyzer SDK This endpoint is powered by the CrowdStrike File Analyzer SDK. CrowdStrike’s File Analyzer SDK delivers in-depth context and rich data to inform. It leverages machine learning that is trained using tens of millions of files sourced from the CrowdStrike ecosystem. Its unique multi-threaded architecture and concise verdict values enable quick scan times and valuable outcomes. This endpoint is used to determine the likelihood that a file is malicious. When using this endpoint, files are first hashed and run against the Pangea File Intel/reputation endpoint with CrowdStrike as a provider. If the file is not known in the CrowdStrike dataset, the file is then scanned with the CrowdStrike File Analyzer. |
|
CrowdStrike | file-intel/v2/reputation | Falcon Intelligence This endpoint is powered by CrowdStrike's Falcon Intelligence. Falcon Intelligence allows you to expand your defenses with real-time access to global indicators of compromise (IOC) delivered by CrowdStrike. Falcon Intelligence leverages data from endpoint protection. It takes context from antivirus, endpoint detection, and response alerts to reveal the "who, why, and how" behind endpoint attacks. This endpoint is used to determine if a file is associated with malware detected on an endpoint and therefore likely to also be malicious. When using this endpoint, if the given file is not associated with malware metadata detected by CrowdStrike, it will not appear in the data set. |
|
CrowdStrike | domain-intel/v2/reputation | Falcon Intelligence This endpoint is powered by CrowdStrike's Falcon Intelligence. Falcon Intelligence allows you to expand your defenses with real-time access to global IOCs delivered by CrowdStrike. Falcon Intelligence leverages data from endpoint protection. It takes context from antivirus, endpoint detection, and response alerts revealing the "who, why, and how" behind endpoint attacks. This endpoint is used to determine if a domain is associated with malware detected on an endpoint and therefore likely to also be malicious. When using this endpoint, if the given domain is not associated with malware metadata detected by CrowdStrike, it will not appear in the data set. |
|
CrowdStrike | url-intel/v2/reputation | Falcon Intelligence This endpoint is powered by CrowdStrike's Falcon Intelligence. Falcon Intelligence allows you to expand your defenses with real-time access to global IOCs delivered by CrowdStrike. Falcon Intelligence leverages data from endpoint protection. It takes context from antivirus, endpoint detection, and response alerts revealing the "who, why, and how" behind endpoint attacks. This endpoint is used to determine if a URL is associated with malware detected on an endpoint and therefore likely to also be malicious. When using this endpoint, if the given URL is not associated with malware metadata detected by CrowdStrike, it will not appear in the data set. |
|
CrowdStrike | ip-intel/v2/reputation | Falcon Intelligence This endpoint is powered by CrowdStrike's Falcon Intelligence. Falcon Intelligence allows you to expand your defenses with real-time access to global IOCs delivered by CrowdStrike. Falcon Intelligence leverages data from endpoint protection. It takes context from antivirus, endpoint detection, and response alerts revealing the "who, why, and how" behind endpoint attacks. This endpoint is used to determine if an IP is associated with malware detected on an endpoint and therefore likely to also be malicious. When using this endpoint, if the given IP is not associated with malware metadata detected by CrowdStrike, it will not appear in the data set. |
|
Digital Element | ip-intel/v2/geolocate | NetAcuity This endpoint is powered by Digital Element's NetAcuity dataset. The dataset's global accuracy is more than 99.9 percent at the country level and 97+ percent at a city level. NetAcuity provides coverage for 99.9999 percent of the internet and collects billions points-of-view daily. This endpoint is used to determine the location of an IP address. When using this endpoint, reserved/private IPs will not return a location. |
|
Digital Element | ip-intel/v2/domain | Carrier Data This endpoint is powered by Digital Element's Carrier Data Insights. Digital Element examines all the allocation records for an IP range to determine the parent owner IP ranges are allocated by the Regional Internet Registries. These ranges can then be suballocated to business or individuals. Digital Element examines all the allocation records for an IP range to find the parent owner for the IP range. This endpoint is used to determine the domain which owns a given IP address. When using this endpoint, reserved/private IPs will not be found in the data set. |
|
Digital Element | ip-intel/v2/vpn ip-intel/v2/proxy | VPN and Proxy These endpoints are powered by Digital Element's Proxy and VPN Detection. Proxy detection enables you to identify non-human traffic, control the distribution of online content, prevent online fraud, comply with legal/embargo restrictions, and more with the world’s most comprehensive and up-to-date proxy database. The VPN Proxy database provides additional insights about proxy hosts, helping clients address the problem of malicious IP masking and enabling them to have greater control over their online channels. These endpoints/providers are used to determine if an IP address is the source of VPN or Proxy traffic. When using either of these endpoints, a True or False response will be returned. |
|
Team CYMRU | ip-intel/v2/reputation | Team CYMRU This endpoint is powered by Team Cymru's IP Reputation and Bot detection dataset. This information is gathered through a number of methods, including malware analysis, observation of botnet command and control (C&C) botnets that Team CYMRU have uniquely decoded, and monitoring of dark IP space (darknets). Every IP in the feed receives an individual reputation score using several different categories of patterns observed over the past 30 days. This endpoint is used to determine if an IP is a bot, controller, or is otherwise associated with botnet traffic. When using this endpoint, only IPs that are known to be associated with botnets will return results other than unknown. |
|
SpyCloud | user-intel/v2/user/breached | Consumer ATO Prevention This endpoint is powered by SpyCloud's consumer ATO Prevention API. SpyCloud researchers collect an estimated 12+ billion new breach assets per month, enabling you to determine when your customers’ data appears on the criminal underground, allowing your organization to act swiftly to lock bad actors out of compromised accounts. This endpoint is used to determine if an email, phone number, username, or IP Address has been in a breach. When using this endpoint, filtering can be used to only search for data that has been breached within a certain time range, such as since a user has last logged into an application. |
|
SpyCloud | user-intel/v2/password/breached | NIST Password Screening This endpoint is powered by SpyCloud's NIST Password Screening API. Using this service, SpyCloud is able to protect against exact employee credentials exposed in third-party breaches, “Fuzzy” credential matches, meaning a compromised password that has been reused with trivial changes, and any password that has appeared in the SpyCloud breach database, regardless of username. This service uses a process called K-anonymity to allow password hashes to be sent for analysis while still being secure. This endpoint is used to determine if a password hash was detected in a breach. When using this endpoint the full password hash is not sent to the endpoint. Instead only the hash of a prefix is sent, and results must be matched to the exact hash to protect anonymity. |
|
WhoisXML API | domain-intel/v2/whois | WhoisXML API This endpoint is powered by the WhoisXML API provider. This endpoint allows a user to query the WhoisXML API dataset for data on a given domain including Domain name, Registration date, Expiration date, Status (e.g., active, suspended, deleted), Registrar, Registrant information (e.g., name, address, email address), Name servers, and Updated date. In addition to this basic information, the WhoisXML API provider also returns a number of other data points, such as Domain age, NS records, and WHOIS server. This endpoint is used to lookup WHOIS information for a given domain. When using this endpoint, if a domain is not registered, it will return with a response showing that the domain is currently Available. Domains can still be registered through third-party companies for security, and will not always have accurate WHOIS information. |
|
Was this article helpful?