No available replacement.
BitcoinAbuse.com is a public database of bitcoin addresses used by hackers and criminals. Supported Cortex XSOAR versions: 5.5.0 and later.
In order to use Bitcoin Abuse service, you need to get your API key. The API key is free and can be achieved by doing the following:
- Navigate to https://www.bitcoinabuse.com and click on "Register" on top right corner of your screen.
- Fill in your details (Name, Email, Password, etc...)
- After your account have been set, go to Settings, and click on "API" section.
- Give your API token a name, and click on "Create", a screen containing your generated API key will appear.
Navigate to Settings > Integrations > Servers & Services.
Search for BitcoinAbuse.
Click Add instance to create and configure a new integration instance.
Parameter Description Required feed Fetch indicators False api_key API Key True insecure Trust any certificate (not secure) False proxy Use system proxy settings False initial_fetch_interval First Fetch Time True feedReputation Indicator Reputation False feedReliability Source Reliability True feedExpirationPolicy False tlp_color Traffic Light Protocol Color False feedFetchInterval Feed Fetch Interval False feedExpirationInterval False feedBypassExclusionList Bypass exclusion list False feedTags Tags False
Click Test to validate the URLs, token, and connection.
When configuring an integration instance, you will be required to enter the first fetch parameter which will set the timeframe to pull Indicators in the first fetch, Two options are available:
- 30 Days - Indicators recorded in the last 30 days (updates every Sunday between 2am-3am UTC.)
- Forever - All recorded indicators (updates every 15th of the month between 2am-3am UTC.)
- Whenever Forever is selected, in order to bring as much data as possible in the first fetch, we merge the Forever CSV together the 30 Days CSV file to avoid missing as much data as possible.
- Restrictions will be that any data reported between Sunday (after 30 Days file update) to the day of the first fetch will not be fetched
Each fetch after the initial fetch will return indicators reported on the previous day (updates once a day between 2am-3am UTC). Therefore, fetching more than once a day will not have any effect.
You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
Reports an abuser to Bitcoin Abuse service. 'abuse_type_other' field is required when 'abuse_type' is other
|Address of the abuser.
|Information about the abuser.
|Description of the abuse.
|Type of abuse. The "abuse_type_other" field is required when the value of the "abuse_type" field is "other". Possible values are "ransomware", "darknet market", "bitcoin tumber", "blackmail scam", "sextortion", and "other". Possible values are: ransomware, darknet market, bitcoin tumbler, blackmail scam, sextortion, other.
|Description of the abuse type. The "abuse_type_other" field is required when the value of the "abuse_type" field is "other".
There is no context output for this command.
!bitcoinabuse-report-address address=abcde12345 email@example.com abuse_type="bitcoin tumbler" description="this is a description of the abuse"
Bitcoin address abcde12345 by abuse bitcoin user firstname.lastname@example.org was reported to BitcoinAbuse API
Gets indicators from the feed.
|The maximum number of results to return. Default is 50.
There is no context output for this command.
value type fields bitcoin:1MfhfDZdv2QXmBBZMom5ZnZzp8VVrJUENw Cryptocurrency Address Value: bitcoin:1MfhfDZdv2QXmBBZMom5ZnZzp8VVrJUENw
description: I know **** is one of your password on day of hack..
Lets get directly to the point.
Not one person has paid me to check about you.
You do not know me and you're probably thinking why you are getting this email?
in fact, i actually placed a malware on the adult vids (adult porn) website and you know what, you visited this site to experience fun (you know what i mean).
When you were viewing videos, your browser started out operating as a RDP having a key logger which provided me with accessibility to your display and web cam.
immediately after that, my malware obtained every one of your contacts from your Messenger, FB, as well as email account.
after that i created a double-screen video. 1st part shows the video you were viewing (you have a nice taste omg), and 2nd part displays the recording of your cam, and its you.
Best solution would be to pay me $2763.
We are going to refer to it as a donation. in this situation, i most certainly will without delay remove your video.
Bitcoin address: 1MfhfDZdv2QXmBBZMom5ZnZzp8VVrJUENw
[case SeNSiTiVe, copy & paste it]
You could go on your life like this never happened and you will not ever hear back again from me.
You'll make the payment via Bitcoin (if you do not know this, search 'how to buy bitcoin' in Google).
if you are planning on going to the law, surely, this e-mail can not be traced back to me, because it's hacked too.
I have taken care of my actions. i am not looking to ask you for a lot, i simply want to be paid.
if i do not receive the bitcoin;, i definitely will send out your video recording to all of your contacts including friends and family, co-workers, and so on.
Nevertheless, if i do get paid, i will destroy the recording immediately.
If you need proof, reply with Yeah then i will send out your video recording to your 8 friends.
it's a nonnegotiable offer and thus please don't waste mine time & yours by replying to this message.