Criminal IP Integrates with IBM QRadar SIEM and SOAR for Faster Threat Response


Criminal IP now works directly with IBM QRadar SIEM and SOAR. This AI-powered threat intelligence platform enriches firewall logs and IP data in real time. Security teams get risk scores and context without leaving their QRadar console.

The integration pulls external threat data into QRadar’s core workflows. Firewall traffic shows High, Medium, or Low risk labels for IPs automatically. Analysts spot malicious C2 servers, VPNs, proxies, and IOCs faster. This cuts investigation time during busy SOC shifts.

QRadar SOAR gains two new playbooks. One enriches IP artifacts with Criminal IP reports. The other scans URLs for threats and adds results as case notes. Automation handles the lookups so humans focus on response.

AI SPERA CEO Byungtak Kang said: “The integration highlights the growing importance of real-time, exposure-based intelligence in modern SOC environments.” He added it “underscores Criminal IP’s focus on improving detection confidence and operational efficiency.”

Key Features Table

FeatureQRadar SIEMQRadar SOAR
IP Risk ScoringAuto-classify traffic logsEnrich artifacts
Right-Click LookupDetailed IP reportsPlaybook automation
Threat CoverageC2, VPNs, proxies, IOCsURL scans (lite/full)
Workflow ImpactNo tool switchingCase notes direct

Real-Time Benefits

Firewall logs feed into Criminal IP API instantly. IPs get scored by AI and OSINT data from 150+ countries. Right-click any IP in Log Activity for full context like historical attacks or exposure signals. SOAR playbooks run enrichment without manual steps.

High-risk IPs trigger priority alerts. Teams block access or escalate fast. The API-first design fits any security stack.

Supported Threat Types

  • Command-and-control servers.
  • Masking services (VPNs, proxies).
  • Domains and URLs with bad reputation.
  • Active IOCs from global feeds.

Integration Setup

StepActionTime Required
SIEM ContentInstall app packs15 minutes
SOAR PlaybooksImport IP/URL services10 minutes
API ConfigAdd Criminal IP key5 minutes
TestRun sample lookupsVerify instantly

FAQ

What does Criminal IP add to QRadar?

Real-time IP/URL threat scoring and context from AI+OSINT.

How do SIEM analysts use it?

Right-click IPs in logs for instant reports.

Which SOAR playbooks exist?

IP Threat Service and URL Threat Service.

What threats does it detect?

C2 servers, VPNs/proxies, IOCs, bad domains.

Is setup complex?

No, API-first with pre-built packs for SIEM/SOAR.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages