Skip to main content

DomainTools Iris Detect

This Integration is part of the DomainTools Iris Detect Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.8.0 and later.

DomainTools Iris Detect#

Threat Actors Move Fast. Detect Helps You Move Faster.#

Iris Detect is an Internet infrastructure detection, monitoring, and enforcement tool built on the industry’s fastest and broadest domain discovery engine and the largest databases of domain data. Capturing key data on new domains and risk-scoring them within minutes of discovery, Detect is a game-changer for brand managers, digital risk and fraud prevention teams, and network defenders.

Key Benefits#

Rapid Discovery of Infringing Domains Continuous Monitoring of Evolving Infrastructure Enforcement Actions for Dangerous Domains

Fastest New Domain Discovery#

Iris Detect employs the most sophisticated and extensive new-domain discovery capabilities, across all TLDs globally. Domains are enriched with preliminary Whois, DNS, and Risk Score data. The Iris Detect for Cortex XSOAR integration can create incidents as frequently as hourly, incidents containing mapped indicators of newly-discovered domains matching the monitored keywords.

Watch Suspicious Domains for Changes#

Through ad-hoc War-Room commands or on the incidents directly, domains of interest may be added to Iris Detect’s Watchlist, which triggers automatic daily updates, looking for hosting infrastructure or webpage changes. These changes can be consumed as their own incidents or sent to a separate workflow, giving you the ability to track evolving threat campaigns, classify, and identify which domains are most likely to do harm.

Enable Effective Enforcement#

Merely knowing about malicious infrastructure is not enough. Iris Detect offers impactful enforcement options: Block flagged domains from incidents directly or using ad-hoc War-Room commands. Additionally, blocked domains can appear on their own feed, enabling you to take scripted enforcement actions in your security controls. Take action by sending domains to Google Phishing Protection, which can block them in Chrome, Firefox, and Safari, among other browsers.

Configure DomainTools Iris Detect on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for DomainTools Iris Detect.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    DomainTools API UsernameDomainTools API UsernameTrue
    DomainTools API KeyDomainTools API Key to use for authenticationTrue
    Enabled on New DomainsMonitors the Iris Detect endpoint for newly discovered domains for active monitors in an account. This is the most commonly used option. If selected, each pull will create a new incident every time the enrichment is run, with the new domains attached as indicators to the incident. Whois and DNS information is preserved in comments.False
    Enabled on Changed DomainsMonitors the Iris Detect endpoint for recent changes to domains added to the watchlist. This is useful for monitoring changes to infrastructure after a domain has been triaged from the "new" endpoint or within the Iris Detect UI. If selected, each pull will create a new incident every time the enrichment is run, with the new domains attached as indicators to the incident. Whois and DNS information is preserved in comments.False
    Enabled on Blocked DomainsMonitors the Iris Detect endpoint for additions to domains added to the blocklist. Additions can be made via this app or the Iris Detect UI. This is useful for teams wishing to route triage domains to firewall software for blocking. If selected, each pull will create a new incident every time the enrichment is run, with the new domains attached as indicators to the incident. Whois and DNS information is preserved in comments.False
    Risk score RangesOptionally specify a risk score range to triage higher risk indicators to different routing. A higher number indicates higher confidence a domain is likely to be used for malicious purposes.False
    Include Domain DataIncludes DNS and whois data in the responseFalse
    First fetch timestampFor the first time the enrichment is run, specify how far back should it pull indicators. First Fetch timestamp, Default is 3 days. The maximum time range is 30 days.False
    Trust any certificate (not secure)Trust any certificate (not secure)False
    Use system proxy settingsUse system proxy settingsFalse
    Incident typeOptionally specify an incident type for incidents created by this integration to work with specific playbooksFalse
    Fetch incidentsThis is a required field by XSOAR and should be set to 3, one for each possible feed type: new, changed, blocked.False
  4. To ensure that fetch incidents works:

    1. Select the Fetches incidents radio button.
    2. Select DomainTools Iris Detect - Classifier from classifier drop-down.
    3. Select DomainTools Iris Detect - Incoming Mapper from mapper drop-down.
    4. Select Create Incidents and Import Indicators from Enabled on New Domains drop-down.
    5. Select Create Incidents and Import Indicators from Enabled on Changed Domains drop-down.
    6. Select Create Incidents and Import Indicators from Enabled on Blocked Domains drop-down.
  5. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

domaintools-iris-detect-escalate-domains#


Reports a domain to Google's Safe Browsing API. After approval, their block list is picked up by Chrome and most modern browsers.

Base Command#

domaintools-iris-detect-escalate-domains

Input#

Argument NameDescriptionRequired
watchlist_domain_idsList of Iris Detect domain IDs to escalate. The domain ID can be found using 'domaintools-iris-detect-get-new-domains' command.Required

Context Output#

PathTypeDescription
DomainToolsIrisDetect.EscalatedDomain.watchlist_domain_idStringThe blocked domain ID.
DomainToolsIrisDetect.EscalatedDomain.escalation_typeStringThe escalation type.
DomainToolsIrisDetect.EscalatedDomain.idStringThe ID.
DomainToolsIrisDetect.EscalatedDomain.created_dateStringThe date and time when the domain was created.
DomainToolsIrisDetect.EscalatedDomain.updated_dateStringThe date and time when the domain was updated.
DomainToolsIrisDetect.EscalatedDomain.created_byStringThe email address of the person who created the escalated entry.

Command example#

!domaintools-iris-detect-escalate-domains watchlist_domain_ids="ba476NwNJW"

Context Example#

{
"DomainToolsIrisDetect": {
"EscalatedDomain": [
{
"dt_created_by": "user@example.com",
"dt_created_date_result": "2023-06-18T07:09:56.638704+00:00",
"dt_escalation_type": "google_safe",
"dt_id": "LpbmA0lboB",
"dt_updated_date": "2023-06-18T07:09:56.638704+00:00",
"dt_watchlist_domain_id": "ba476NwNJW"
}
]
}
}

Human Readable Output#

Escalated Domains#

dt_created_bydt_created_date_resultdt_escalation_typedt_iddt_updated_datedt_watchlist_domain_id
user@example.com2023-06-18T07:09:56.638704+00:00google_safeLpbmA0lboB2023-06-18T07:09:56.638704+00:00ba476NwNJW

domaintools-iris-detect-blocklist-domains#


Mark a given domain as blocked, which allows a script against the Iris Detect API to pass these domains on to other teams or security controls within your organization to block them in email, web, or other filtering controls.

Base Command#

domaintools-iris-detect-blocklist-domains

Input#

Argument NameDescriptionRequired
watchlist_domain_idsList of Iris Detect domain IDs to escalate. The domain ID can be found using 'domaintools-iris-detect-get-new-domains, domaintools-iris-detect-get-watched-domains' commands.Required

Context Output#

PathTypeDescription
DomainToolsIrisDetect.BlockedDomain.watchlist_domain_idStringThe blocked domain ID.
DomainToolsIrisDetect.BlockedDomain.escalation_typeStringThe escalation type.
DomainToolsIrisDetect.BlockedDomain.idStringThe ID.
DomainToolsIrisDetect.BlockedDomain.created_dateStringThe date and time when the domain was created.
DomainToolsIrisDetect.BlockedDomain.updated_dateStringThe date and time when the domain was updated.
DomainToolsIrisDetect.BlockedDomain.created_byStringThe email address of the person who created the blocked entry.

Command example#

!domaintools-iris-detect-blocklist-domains watchlist_domain_ids="7WbwkN9wGa"

Context Example#

{
"DomainToolsIrisDetect": {
"BlockedDomain": [
{
"dt_created_by": "user@example.com",
"dt_created_date_result": "2023-06-18T07:09:48.626367+00:00",
"dt_escalation_type": "blocked",
"dt_id": "qabz2ekbP1",
"dt_updated_date": "2023-06-18T07:09:48.626367+00:00",
"dt_watchlist_domain_id": "7WbwkN9wGa"
}
]
}
}

Human Readable Output#

Blocked Domains#

dt_created_bydt_created_date_resultdt_escalation_typedt_iddt_updated_datedt_watchlist_domain_id
user@example.com2023-06-18T07:09:48.626367+00:00blockedqabz2ekbP12023-06-18T07:09:48.626367+00:007WbwkN9wGa

domaintools-iris-detect-watch-domains#


Mark a given domain as watched, which will trigger more frequent scanning by DomainTools automation. Changes to watched domains can trigger incidents if enabled, or manually queried via the domaintools-iris-detect-get-watched-domains command.

Base Command#

domaintools-iris-detect-watch-domains

Input#

Argument NameDescriptionRequired
watchlist_domain_idsList of Iris Detect domain IDs to escalate. The domain ID can be found using 'domaintools-iris-detect-get-new-domains' command.Required

Context Output#

PathTypeDescription
DomainToolsIrisDetect.WatchedDomain.stateStringIndicates that the domain is watched.
DomainToolsIrisDetect.WatchedDomain.domainStringThe domain name.
DomainToolsIrisDetect.WatchedDomain.discovered_dateStringThe date and time when the domain was discovered (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.WatchedDomain.changed_dateStringThe date and time when the domain information was last changed (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.WatchedDomain.idStringThe domain ID.
DomainToolsIrisDetect.WatchedDomain.assigned_byStringThe email address of the person who assigned the domain to the watchlist.
DomainToolsIrisDetect.WatchedDomain.assigned_dateStringThe date and time when the domain was assigned to the watchlist (e.g.,"2023-04-20T13:13:23.000000+00:00").

Command example#

!domaintools-iris-detect-watch-domains watchlist_domain_ids="Ya2q68ldnW"

Context Example#

{
"DomainToolsIrisDetect": {
"WatchedDomain": [
{
"dt_changed_date": "2023-06-18T02:18:06.000000+00:00",
"dt_discovered_date": "2023-06-18T02:08:14.821000+00:00",
"dt_domain": "suspicious-domain",
"dt_domain_id": "Ya2q68ldnW",
"dt_state": "watched"
}
]
}
}

Human Readable Output#

Watched Domains#

dt_changed_datedt_discovered_datedt_domaindt_domain_iddt_state
2023-06-18T02:18:06.000000+00:002023-06-18T02:08:14.821000+00:00suspicious-domainYa2q68ldnWwatched

domaintools-iris-detect-ignore-domains#


Ignore a given domain, removing it from new and block lists, if applicable.

Base Command#

domaintools-iris-detect-ignore-domains

Input#

Argument NameDescriptionRequired
watchlist_domain_idsList of Iris Detect domain IDs to escalate. The domain ID can be found using 'domaintools-iris-detect-get-new-domains, domaintools-iris-detect-get-watched-domains' command.Required

Context Output#

PathTypeDescription
DomainToolsIrisDetect.IgnoredDomain.stateStringIndicates that the domain is ignored.
DomainToolsIrisDetect.IgnoredDomain.domainStringThe domain name.
DomainToolsIrisDetect.IgnoredDomain.discovered_dateStringThe date and time when the domain was discovered (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.IgnoredDomain.changed_dateStringThe date and time when the domain information was last changed (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.IgnoredDomain.idStringThe domain ID.
DomainToolsIrisDetect.IgnoredDomain.assigned_byStringThe email address of the person who assigned the domain to the watchlist.
DomainToolsIrisDetect.IgnoredDomain.assigned_dateStringThe date and time when the domain was assigned to the watchlist (e.g.,"2023-04-20T13:13:23.000000+00:00").

Command example#

!domaintools-iris-detect-ignore-domains watchlist_domain_ids="XEmKQoLBPW"

Context Example#

{
"DomainToolsIrisDetect": {
"IgnoredDomain": [
{
"dt_changed_date": "2023-06-18T03:21:47.000000+00:00",
"dt_discovered_date": "2023-06-18T02:44:42.448000+00:00",
"dt_domain": "benign-domain.com",
"dt_domain_id": "XEmKQoLBPW",
"dt_state": "ignored"
}
]
}
}

Human Readable Output#

Ignored Domains#

dt_changed_datedt_discovered_datedt_domaindt_domain_iddt_state
2023-06-18T03:21:47.000000+00:002023-06-18T02:44:42.448000+00:00benign-domain.comXEmKQoLBPWignored

domaintools-iris-detect-get-monitors-list#


This command allows users to retrieve the list of monitored terms and respective IDs associated with your organization's Iris Detect account. New terms can only be set up and configured directly within the Iris Detect UI (https://iris.domaintools.com/detect/). The results are limited to 100 monitors if include_counts is True, or 500 otherwise.

Base Command#

domaintools-iris-detect-get-monitors-list

Input#

Argument NameDescriptionRequired
datetime_counts_sinceISO 8601 datetime format: default None. Conditionally required if the include_counts parameter is set to True. for example 2022-05-18T12:19:51.685496.Required
include_countsIncludes counts for each monitor for new, watched, changed, and escalated domains. Possible values are: True, False.Optional
sortSort order for monitor list. Valid values are an ordered list of the following: ["term", "created_date", "domain_counts_changed", "domain_counts_discovered"].Optional
orderSort order "asc" or "desc".Optional

Context Output#

PathTypeDescription
DomainToolsIrisDetect.Monitor.termStringThe keyword being monitored.
DomainToolsIrisDetect.Monitor.match_substring_variationsBooleanA boolean indicating whether substring variations of the term should be matched.
DomainToolsIrisDetect.Monitor.nameserver_exclusionsUnknownAn array for nameserver exclusions.
DomainToolsIrisDetect.Monitor.text_exclusionsunknownAn array for text exclusions.
DomainToolsIrisDetect.Monitor.idStringA unique identifier for the monitor entry.
DomainToolsIrisDetect.Monitor.created_dateStringThe timestamp when the monitor entry was created.
DomainToolsIrisDetect.Monitor.updated_dateStringThe timestamp when the monitor entry was last updated.
DomainToolsIrisDetect.Monitor.stateStringThe state of the monitor entry.
DomainToolsIrisDetect.Monitor.statusStringThe status of the monitor entry.
DomainToolsIrisDetect.Monitor.created_byStringThe email address of the person who created the monitor entry..

Command example#

!domaintools-iris-detect-get-monitors-list datetime_counts_since="2022-01-01"

Context Example#

{
"DomainToolsIrisDetect": {
"Monitor": [
{
"created_by": "user@example.com",
"created_date": "2022-09-20T06:01:56.760955+00:00",
"id": "QEMba8wmXo",
"match_substring_variations": false,
"nameserver_exclusions": [],
"state": "active",
"status": "completed",
"term": "monitored_term1",
"text_exclusions": [],
"updated_date": "2022-09-20T06:02:33.358799+00:00"
},
{
"created_by": "user@example.com",
"created_date": "2022-09-16T22:29:20.567614+00:00",
"id": "rA7bn46jq3",
"match_substring_variations": false,
"nameserver_exclusions": [],
"state": "active",
"status": "completed",
"term": "monitored_term2",
"text_exclusions": [],
"updated_date": "2022-09-16T22:30:16.212269+00:00"
},
{
"created_by": "user@example.com",
"created_date": "2022-09-20T05:35:21.203482+00:00",
"id": "YNrbr6GbKx",
"match_substring_variations": false,
"nameserver_exclusions": [],
"state": "active",
"status": "completed",
"term": "monitored_term3",
"text_exclusions": [],
"updated_date": "2022-09-20T05:35:28.630194+00:00"
}
]
}
}

Human Readable Output#

Monitor List#

dt_created_bydt_created_datedt_match_substring_variationsdt_monitor_iddt_nameserver_exclusionsdt_statedt_statusdt_termdt_text_exclusionsdt_updated_date
user@example.com2022-09-20T06:01:56.760955+00:00falseQEMba8wmXoactivecompletedmonitored_term12022-09-20T06:02:33.358799+00:00
user@example.com2022-09-16T22:29:20.567614+00:00falserA7bn46jq3activecompletedmonitored_term22022-09-16T22:30:16.212269+00:00
user@example.com2022-09-20T05:35:21.203482+00:00falseYNrbr6GbKxactivecompletedmonitored_term32022-09-20T05:35:28.630194+00:00

domaintools-iris-detect-get-new-domains#


Manually retrieve new domains matching all of your monitored terms, or a specific term specified by a "monitor_id" that can be retrieved using the domaintools-iris-detect-get-monitors-list command. The number of domains returned is limited to 50 if including DNS and whois details, or 100 otherwise. Use the page and page_size parameter for pagination.

Base Command#

domaintools-iris-detect-get-new-domains

Input#

Argument NameDescriptionRequired
discovered_sinceFilter domains by when they were discovered. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
monitor_idMonitor ID is used when requesting domains for a specific monitor. The monitor ID can be found using the 'domaintools-iris-detect-get-monitors-list' command.Optional
tldsList of TLDs to filter domains by. E.g. top.Optional
mx_existsFilter domains by if they have an MX record in DNS. Possible values are: True, False.Optional
risk_score_rangesList of risk score ranges to filter domains by. Valid values are: ["0-0", "1-39", "40-69", "70-99", "100-100"].Optional
searchA "contains" search for any portion of a domain name.Optional
sortSort order for domain list. Valid values are an ordered list of the following: ["discovered_date", "changed_date", "risk_score"].Optional
include_domain_dataIncludes DNS and whois data in the response. Possible values are: True, False.Optional
preview"Preview" mode is helpful for initial setup and configuration. It limits the results to the first 10 results but removes hourly API restrictions. Possible values are: True, False.Optional
orderSort order "asc" or "desc".Optional
limitDefault 100. Limit for pagination. Restricted to maximum 50 if include_domain_data is set to True.Optional
pageThe page number. Default is 1.Optional
page_sizeThe number of requested results per page. Default is 50.Optional

Context Output#

PathTypeDescription
DomainToolsIrisDetect.New.stateStringIndicates that the domain is newly discovered.
DomainToolsIrisDetect.New.domainStringThe domain name.
DomainToolsIrisDetect.New.statusStringIndicates the status of the Domain (e.g., "active").
DomainToolsIrisDetect.New.discovered_dateStringThe date and time when the domain was discovered (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.New.changed_dateStringThe date and time when the domain information was last changed (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.New.risk_scoreStringThe risk score associated with the domain.
DomainToolsIrisDetect.New.risk_score_statusNumberThe status of the risk score.
DomainToolsIrisDetect.New.risk_score_components.proximityNumberThe domain's proximity risk score.
DomainToolsIrisDetect.New.risk_score_components.threat_profile.phishingNumberThe domain's phishing threat score.
DomainToolsIrisDetect.New.risk_score_components.threat_profile.malwareNumberThe domain's malware threat score.
DomainToolsIrisDetect.New.risk_score_components.threat_profile.spamNumberThe domain's spam threat score.
DomainToolsIrisDetect.New.risk_score_components.threat_profile.evidenceunknownThe list of evidence supporting the threat scores.
DomainToolsIrisDetect.New.mx_existsBooleanIndicates that there is no MX record for the domain.
DomainToolsIrisDetect.New.tldStringThe top-level domain.
DomainToolsIrisDetect.New.idStringThe domain ID.
DomainToolsIrisDetect.New.escalations.escalation_typeStringThe type of escalation.
DomainToolsIrisDetect.New.escalations.idStringThe escalation ID.
DomainToolsIrisDetect.New.escalations.createdStringThe date and time when the escalation was created.
DomainToolsIrisDetect.New.escalations.created_byStringThe email address of the person who assigned the domain to the watchlist.
DomainToolsIrisDetect.New.monitor_idsStringAn array containing a single monitor ID.
DomainToolsIrisDetect.New.assigned_byStringThe email address of the person who assigned the domain to the watchlist.
DomainToolsIrisDetect.New.assigned_dateStringThe date and time when the domain was assigned to the watchlist (e.g.,"2023-04-20T13:13:23.000000+00:00").
DomainToolsIrisDetect.New.registrant_contact_emailStringRegistrant Email.
DomainToolsIrisDetect.New.name_serverStringAn array of objects containing name server information.
DomainToolsIrisDetect.New.registrarStringThe domain registrar.
DomainToolsIrisDetect.New.create_dateStringThe date when the domain was created.
DomainToolsIrisDetect.New.ip.country_codeStringCountry code for the ip.
DomainToolsIrisDetect.New.ip.ipStringAssociated ip for the Domain.
DomainToolsIrisDetect.New.ip.ispStringAssociated isp for the Domain.

Command example#

!domaintools-iris-detect-get-new-domains limit="2"

Context Example#

{
"DomainToolsIrisDetect": {
"New": [
{
"changed_date": "2023-04-11T05:16:56.483000+00:00",
"discovered_date": "2023-04-11T05:16:56.483000+00:00",
"domain": "fakedomaintask.shop",
"escalations": [],
"id": "KW3ykVGZRE",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": false,
"risk_score": null,
"risk_score_status": null,
"state": "new",
"status": "active",
"tld": "shop"
},
{
"changed_date": "2023-04-11T05:15:42.000000+00:00",
"discovered_date": "2023-04-11T05:12:22.081000+00:00",
"domain": "fakedomain.com",
"escalations": [],
"id": "gWlYVZxmJa",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": false,
"risk_score": 79,
"risk_score_components": {
"proximity": 4,
"threat_profile": {
"phishing": 79
}
},
"risk_score_status": "provisional",
"state": "new",
"status": "active",
"tld": "com"
}
]
}
}

Human Readable Output#

New Domains#

dt_changed_datedt_create_datedt_discovered_datedt_domaindt_domain_iddt_escalationsdt_monitor_idsdt_mx_existsdt_proximity_scoredt_registrant_contact_emaildt_registrardt_risk_scoredt_risk_statusdt_statedt_statusdt_threat_profile_evidencedt_threat_profile_malwaredt_threat_profile_phishingdt_threat_profile_spamdt_tld
2023-04-11T05:16:56.483000+00:002023-04-11T05:16:56.483000+00:00fakedomaintask.shopKW3ykVGZRErA7bn46jq3falsenewactiveshop
2023-04-11T05:15:42.000000+00:002023-04-11T05:12:22.081000+00:00fakedomain.comgWlYVZxmJarA7bn46jq3false479provisionalnewactive79com

domaintools-iris-detect-get-watched-domains#


Manually retrieve changes to domains that have been marked as "watched" by users of your organization, matching all of your monitored terms, or a specific term specified by a "monitor_id" that can be retrieved using the domaintools-iris-detect-get-monitors-list command. The number of domains returned is limited to 50 if including DNS and whois details, or 100 otherwise. Use the page and page_size parameter for pagination.

Base Command#

domaintools-iris-detect-get-watched-domains

Input#

Argument NameDescriptionRequired
escalation_typesescalation_types: List[str]: default None. List of escalation types to filter domains by. Valid values are: ["blocked", "google_safe"].Optional
monitor_idMonitor ID is used when requesting domains for a specific monitor. The monitor ID can be found using the 'domaintools-iris-detect-get-monitors-list' command.Optional
tldsList of TLDs to filter domains by. E.g. top.Optional
mx_existsFilter domains by if they have an MX record in DNS. Possible values are: True, False.Optional
changed_sinceFilter domains by when they were last changed. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
searchA "contains" search for any portion of a domain name.Optional
sortSort order for domain list. Valid values are an ordered list of the following: ["discovered_date", "changed_date", "risk_score"].Optional
include_domain_dataIncludes DNS and whois data in the response. Possible values are: True, False.Optional
preview"Preview" mode is helpful for initial setup and configuration. It limits the results to the first 10 results but removes hourly API restrictions. Possible values are: True, False.Optional
escalated_sinceFilter domains by when they were last escalated. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
orderSort order "asc" or "desc".Optional
risk_score_rangesList of risk score ranges to filter domains by. Valid values are: ["0-0", "1-39", "40-69", "70-99", "100-100"].Optional
limitDefault 100. Limit for pagination. Restricted to maximum 50 if include_domain_data is set to True.Optional
pageThe page number. Default is 1.Optional
page_sizeThe number of requested results per page. Default is 50.Optional

Context Output#

PathTypeDescription
DomainToolsIrisDetect.Watched.stateStringIndicates that the domain is being watched.
DomainToolsIrisDetect.Watched.domainStringThe domain name.
DomainToolsIrisDetect.Watched.statusStringIndicates the status of the Domain (e.g., "active").
DomainToolsIrisDetect.Watched.discovered_dateStringThe date and time when the domain was discovered (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Watched.changed_dateStringThe date and time when the domain information was last changed (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Watched.risk_scoreStringThe risk score associated with the domain.
DomainToolsIrisDetect.Watched.risk_score_statusNumberThe status of the risk score.
DomainToolsIrisDetect.Watched.risk_score_components.proximityNumberThe domain's proximity risk score.
DomainToolsIrisDetect.Watched.risk_score_components.threat_profile.phishingNumberThe domain's phishing threat score.
DomainToolsIrisDetect.Watched.risk_score_components.threat_profile.malwareNumberThe domain's malware threat score.
DomainToolsIrisDetect.Watched.risk_score_components.threat_profile.spamNumberThe domain's spam threat score.
DomainToolsIrisDetect.Watched.risk_score_components.threat_profile.evidenceUnknownThe list of evidence supporting the threat scores.
DomainToolsIrisDetect.Watched.mx_existsBooleanIndicates that there is no MX record for the domain.
DomainToolsIrisDetect.Watched.tldStringThe top-level domain.
DomainToolsIrisDetect.Watched.idStringThe domain ID.
DomainToolsIrisDetect.Watched.escalations.escalation_typeStringThe type of escalation.
DomainToolsIrisDetect.Watched.escalations.idStringThe escalation ID.
DomainToolsIrisDetect.Watched.escalations.createdStringThe date and time when the escalation was created.
DomainToolsIrisDetect.Watched.escalations.created_byStringThe email address of the person who created the escalation.
DomainToolsIrisDetect.Watched.monitor_idsStringAn array containing a single monitor ID.
DomainToolsIrisDetect.Watched.assigned_byStringThe email address of the person who assigned the domain to the watchlist.
DomainToolsIrisDetect.Watched.assigned_dateStringThe date and time when the domain was assigned to the watchlist (e.g.,"2023-04-20T13:13:23.000000+00:00").
DomainToolsIrisDetect.Watched.registrant_contact_emailStringRegistrant Email.
DomainToolsIrisDetect.Watched.name_serverStringThe domain registrar.
DomainToolsIrisDetect.Watched.registrarStringThe domain registrar.
DomainToolsIrisDetect.Watched.create_dateStringThe date when the domain was created.
DomainToolsIrisDetect.Watched.ip.country_codeStringCountry code for the ip.
DomainToolsIrisDetect.Watched.ip.ipStringAssociated ip for the Domain.
DomainToolsIrisDetect.Watched.ip.ispStringAssociated isp for the Domain.

Command example#

!domaintools-iris-detect-get-watched-domains limit="2"

Context Example#

{
"DomainToolsIrisDetect": {
"Watched": [
{
"assigned_by": "user@example.com",
"assigned_date": "2023-04-11T04:46:39.000000+00:00",
"changed_date": "2023-04-10T07:52:11.000000+00:00",
"discovered_date": "2023-04-10T07:45:31.478000+00:00",
"domain": "fakedomain.net.tr",
"escalations": [
{
"created": "2023-04-11T04:46:39.181378+00:00",
"created_by": "user@example.com",
"escalation_type": "google_safe",
"id": "43gB2PwG6m"
}
],
"id": "8Wq8Qj9x7P",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": false,
"risk_score": 8,
"risk_score_components": {
"proximity": 5,
"threat_profile": {
"evidence": [],
"malware": 1,
"phishing": 6,
"spam": 8
}
},
"risk_score_status": "full",
"state": "watched",
"status": "active",
"tld": "net.tr"
},
{
"changed_date": "2023-04-10T05:58:01.000000+00:00",
"discovered_date": "2023-04-10T04:52:28.545000+00:00",
"domain": "fakedomain.co",
"escalations": [
{
"created": "2023-04-10T14:33:11.342255+00:00",
"created_by": "user@example.com",
"escalation_type": "blocked",
"id": "nzgWDr3B9Y"
}
],
"id": "gaeMyYl1va",
"monitor_ids": [
"QEMba8wmXo"
],
"mx_exists": true,
"risk_score": 21,
"risk_score_components": {
"proximity": 21,
"threat_profile": {
"evidence": [],
"malware": 20,
"phishing": 15,
"spam": 17
}
},
"risk_score_status": "full",
"state": "watched",
"status": "active",
"tld": "co"
}
]
}
}

Human Readable Output#

Watched Domains#

dt_changed_datedt_create_datedt_discovered_datedt_domaindt_domain_iddt_escalationsdt_monitor_idsdt_mx_existsdt_proximity_scoredt_registrant_contact_emaildt_registrardt_risk_scoredt_risk_statusdt_statedt_statusdt_threat_profile_evidencedt_threat_profile_malwaredt_threat_profile_phishingdt_threat_profile_spamdt_tld
2023-04-10T07:52:11.000000+00:002023-04-10T07:45:31.478000+00:00fakedomain.net.tr8Wq8Qj9x7P{'escalation_type': 'google_safe', 'id': '43gB2PwG6m', 'created': '2023-04-11T04:46:39.181378+00:00', 'created_by': 'user@example.com'}rA7bn46jq3false58fullwatchedactive168net.tr
2023-04-10T05:58:01.000000+00:002023-04-10T04:52:28.545000+00:00fakedomain.cogaeMyYl1va{'escalation_type': 'blocked', 'id': 'nzgWDr3B9Y', 'created': '2023-04-10T14:33:11.342255+00:00', 'created_by': 'user@example.com'}QEMba8wmXotrue2121fullwatchedactive201517co

domaintools-iris-detect-get-ignored-domains#


Manually retrieve domains that your organization has marked as ignored, matching all of your monitored terms, or a specific term specified by a "monitor_id" that can be retrieved using the domaintools-iris-detect-get-monitors-list command. This is most useful in cases when a domain might have been mistakenly ignored. The number of domains returned is limited to 50 if including DNS and whois details, or 100 otherwise. Use the page and page_size parameter for pagination.

Base Command#

domaintools-iris-detect-get-ignored-domains

Input#

Argument NameDescriptionRequired
risk_score_rangesList of risk score ranges to filter domains by. Valid values are: ["0-0", "1-39", "40-69", "70-99", "100-100"].Optional
monitor_idMonitor ID is used when requesting domains for a specific monitor. The monitor ID can be found using the 'domaintools-iris-detect-get-monitors-list' command.Optional
tldsList of TLDs to filter domains by. E.g. top.Optional
mx_existsFilter domains by if they have an MX record in DNS. Possible values are: True, False.Optional
changed_sinceFilter domains by when they were last changed. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
escalated_sinceFilter domains by when they were last escalated. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
searchA "contains" search for any portion of a domain name.Optional
sortSort order for domain list. Valid values are an ordered list of the following: ["discovered_date", "changed_date", "risk_score"].Optional
include_domain_dataIncludes DNS and whois data in the response. Possible values are: True, False.Optional
preview"Preview" mode is helpful for initial setup and configuration. It limits the results to the first 10 results but removes hourly API restrictions. Possible values are: True, False.Optional
orderSort order "asc" or "desc".Optional
limitDefault 100. Limit for pagination. Restricted to maximum 50 if include_domain_data is set to True.Optional
pageThe page number. Default is 1.Optional
page_sizeThe number of requested results per page. Default is 50.Optional

Context Output#

PathTypeDescription
DomainToolsIrisDetect.Ignored.stateStringIndicates that the domain is being ignored.
DomainToolsIrisDetect.Ignored.domainStringThe domain name.
DomainToolsIrisDetect.Ignored.statusStringIndicates the status of the Domain (e.g., "active").
DomainToolsIrisDetect.Ignored.discovered_dateStringThe date and time when the domain was discovered (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Ignored.changed_dateStringThe date and time when the domain information was last changed (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Ignored.risk_scoreStringThe risk score associated with the domain.
DomainToolsIrisDetect.Ignored.risk_score_statusNumberThe status of the risk score.
DomainToolsIrisDetect.Ignored.risk_score_components.proximityNumberThe domain's proximity risk score.
DomainToolsIrisDetect.Ignored.risk_score_components.threat_profile.phishingNumberThe domain's phishing threat score.
DomainToolsIrisDetect.Ignored.risk_score_components.threat_profile.malwareNumberThe domain's malware threat score.
DomainToolsIrisDetect.Ignored.risk_score_components.threat_profile.spamNumberThe domain's spam threat score.
DomainToolsIrisDetect.Ignored.risk_score_components.threat_profile.evidenceunknownThe list of evidence supporting the threat scores.
DomainToolsIrisDetect.Ignored.mx_existsBooleanIndicates that there is no MX record for the domain.
DomainToolsIrisDetect.Ignored.tldStringThe top-level domain.
DomainToolsIrisDetect.Ignored.idStringThe domain ID.
DomainToolsIrisDetect.Ignored.escalations.escalation_typeStringThe type of escalation.
DomainToolsIrisDetect.Ignored.escalations.idStringThe escalation ID.
DomainToolsIrisDetect.Ignored.escalations.createdStringThe date and time when the escalation was created.
DomainToolsIrisDetect.Ignored.escalations.created_byStringThe email address of the person who created the escalation.
DomainToolsIrisDetect.Ignored.monitor_idsStringAn array containing a single monitor ID.
DomainToolsIrisDetect.Ignored.assigned_byStringThe email address of the person who assigned the domain to the watchlist.
DomainToolsIrisDetect.Ignored.assigned_dateStringThe date and time when the domain was assigned to the watchlist (e.g.,"2023-04-20T13:13:23.000000+00:00").
DomainToolsIrisDetect.Ignored.registrant_contact_emailStringRegistrant Email.
DomainToolsIrisDetect.Ignored.name_serverStringAn array of objects containing name server information.
DomainToolsIrisDetect.Ignored.registrarStringThe domain registrar.
DomainToolsIrisDetect.Ignored.create_dateStringThe date when the domain was created.
DomainToolsIrisDetect.Ignored.ip.country_codeStringCountry code for the ip.
DomainToolsIrisDetect.Ignored.ip.ipStringAssociated ip for the Domain.
DomainToolsIrisDetect.Ignored.ip.ispStringAssociated isp for the Domain.

Command example#

!domaintools-iris-detect-get-ignored-domains limit="2"

Context Example#

{
"DomainToolsIrisDetect": {
"Ignored": [
{
"assigned_by": "user@example.com",
"assigned_date": "2023-03-27T04:45:19.000000+00:00",
"changed_date": "2023-03-30T09:07:59.000000+00:00",
"discovered_date": "2023-03-21T13:57:47.094000+00:00",
"domain": "fakedomainn.shop",
"escalations": [
{
"created": "2023-03-21T17:33:51.787271+00:00",
"created_by": "user@example.com",
"escalation_type": "blocked",
"id": "VrxaQQ2xNK"
},
{
"created": "2023-03-21T17:35:10.150279+00:00",
"created_by": "user@example.com",
"escalation_type": "google_safe",
"id": "kzbwQQ2EY2"
}
],
"id": "VE87zKvOxa",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": true,
"risk_score": 100,
"risk_score_components": {
"proximity": 100,
"threat_profile": {
"evidence": [
"registrant",
"domain name",
"name server"
],
"malware": 98,
"phishing": 99,
"spam": 82
}
},
"risk_score_status": "full",
"state": "ignored",
"status": "active",
"tld": "shop"
},
{
"changed_date": "2023-03-25T08:04:15.000000+00:00",
"discovered_date": "2023-02-08T10:32:18.665000+00:00",
"domain": "walletfakedomain.com",
"escalations": [],
"id": "ya6dKwrRzP",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": true,
"risk_score": 100,
"risk_score_components": {
"proximity": 100,
"threat_profile": {
"evidence": [
"domain name",
"registrar",
"name server"
],
"malware": 19,
"phishing": 95,
"spam": 43
}
},
"risk_score_status": "full",
"state": "ignored",
"status": "active",
"tld": "com"
}
]
}
}

Human Readable Output#

Ignored Domains#

dt_changed_datedt_create_datedt_discovered_datedt_domaindt_domain_iddt_escalationsdt_monitor_idsdt_mx_existsdt_proximity_scoredt_registrant_contact_emaildt_registrardt_risk_scoredt_risk_statusdt_statedt_statusdt_threat_profile_evidencedt_threat_profile_malwaredt_threat_profile_phishingdt_threat_profile_spamdt_tld
2023-03-30T09:07:59.000000+00:002023-03-21T13:57:47.094000+00:00fakedomainn.shopVE87zKvOxa{'escalation_type': 'blocked', 'id': 'VrxaQQ2xNK', 'created': '2023-03-21T17:33:51.787271+00:00', 'created_by': 'user@example.com'}, {'escalation_type': 'google_safe', 'id': 'kzbwQQ2EY2', 'created': '2023-03-21T17:35:10.150279+00:00', 'created_by': 'user@example.com'}rA7bn46jq3true100100fullignoredactiveregistrant, domain name, name server989982shop
2023-03-25T08:04:15.000000+00:002023-02-08T10:32:18.665000+00:00walletfakedomain.comya6dKwrRzPrA7bn46jq3true100100fullignoredactivedomain name, registrar, name server199543com

domaintools-iris-detect-get-escalated-domains#


Manually retrieve domains that your organization has escalated to Google Safe Browsing, matching all of your monitored terms, or a specific term specified by a "monitor_id" that can be retrieved using the domaintools-iris-detect-get-monitors-list command. The number of domains returned is limited to 50 if including DNS and whois details, or 100 otherwise. Use the page and page_size parameter for pagination.

Base Command#

domaintools-iris-detect-get-escalated-domains

Input#

Argument NameDescriptionRequired
risk_score_rangesList of risk score ranges to filter domains by. Valid values are: ["0-0", "1-39", "40-69", "70-99", "100-100"].Optional
monitor_idMonitor ID is used when requesting domains for a specific monitor. The monitor ID can be found using the 'domaintools-iris-detect-get-monitors-list' command.Optional
tldsList of TLDs to filter domains by. E.g. top.Optional
mx_existsFilter domains by if they have an MX record in DNS.Optional
changed_sinceFilter domains by when they were last changed. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
escalated_sinceFilter domains by when they were last escalated. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
searchA "contains" search for any portion of a domain name.Optional
sortSort order for domain list. Valid values are an ordered list of the following: ["discovered_date", "changed_date", "risk_score"].Optional
include_domain_dataIncludes DNS and whois data in the response. Possible values are: True, False.Optional
preview"Preview" mode is helpful for initial setup and configuration. It limits the results to the first 10 results but removes hourly API restrictions. Possible values are: True, False.Optional
orderSort order "asc" or "desc".Optional
limitDefault 100. Limit for pagination. Restricted to maximum 50 if include_domain_data is set to True.Optional
pageThe page number. Default is 1.Optional
page_sizeThe number of requested results per page. Default is 50.Optional

Context Output#

PathTypeDescription
DomainToolsIrisDetect.Escalated.stateStringIndicates that the domain is being watched.
DomainToolsIrisDetect.Escalated.domainStringThe domain name.
DomainToolsIrisDetect.Escalated.statusStringIndicates the status of the Domain (e.g., "active").
DomainToolsIrisDetect.Escalated.discovered_dateStringThe date and time when the domain was discovered (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Escalated.changed_dateStringThe date and time when the domain information was last changed (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Escalated.risk_scoreStringThe risk score associated with the domain.
DomainToolsIrisDetect.Escalated.risk_score_statusNumberThe status of the risk score.
DomainToolsIrisDetect.Escalated.risk_score_components.proximityNumberThe domain's proximity risk score.
DomainToolsIrisDetect.Escalated.risk_score_components.threat_profile.phishingNumberThe domain's phishing threat score.
DomainToolsIrisDetect.Escalated.risk_score_components.threat_profile.malwareNumberThe domain's malware threat score.
DomainToolsIrisDetect.Escalated.risk_score_components.threat_profile.spamNumberThe domain's spam threat score.
DomainToolsIrisDetect.Escalated.risk_score_components.threat_profile.evidenceUnknownThe list of evidence supporting the threat scores.
DomainToolsIrisDetect.Escalated.mx_existsBooleanIndicates that there is no MX record for the domain.
DomainToolsIrisDetect.Escalated.tldStringThe top-level domain.
DomainToolsIrisDetect.Escalated.idStringThe domain ID.
DomainToolsIrisDetect.Escalated.escalations.escalation_typeStringThe type of escalation.
DomainToolsIrisDetect.Escalated.escalations.idStringThe escalation ID.
DomainToolsIrisDetect.Escalated.escalations.createdStringThe date and time when the escalation was created.
DomainToolsIrisDetect.Escalated.escalations.created_byStringThe email address of the person who created the escalation.
DomainToolsIrisDetect.Escalated.monitor_idsStringAn array containing monitor IDs.
DomainToolsIrisDetect.Escalated.assigned_byStringThe email address of the person who assigned the domain to the watchlist.
DomainToolsIrisDetect.Escalated.assigned_dateStringThe date and time when the domain was assigned to the escalated list (e.g.,"2023-04-20T13:13:23.000000+00:00").
DomainToolsIrisDetect.Escalated.registrant_contact_emailStringRegistrant Email.
DomainToolsIrisDetect.Escalated.name_serverStringAn array of objects containing name server information.
DomainToolsIrisDetect.Escalated.registrarStringThe domain registrar.
DomainToolsIrisDetect.Escalated.create_dateStringThe date when the domain was created.
DomainToolsIrisDetect.Escalated.ip.country_codeStringCountry code for the ip.
DomainToolsIrisDetect.Escalated.ip.ipStringAssociated ip for the Domain.
DomainToolsIrisDetect.Escalated.ip.ispStringAssociated isp for the Domain.

Command example#

!domaintools-iris-detect-get-escalated-domains limit="2"

Context Example#

{
"DomainToolsIrisDetect": {
"Escalated": [
{
"assigned_by": "user@example.com",
"assigned_date": "2023-04-11T04:46:39.000000+00:00",
"changed_date": "2023-04-10T07:52:11.000000+00:00",
"discovered_date": "2023-04-10T07:45:31.478000+00:00",
"domain": "fakedomain.net.tr",
"escalations": [
{
"created": "2023-04-11T04:46:39.181378+00:00",
"created_by": "user@example.com",
"escalation_type": "google_safe",
"id": "43gB2PwG6m"
}
],
"id": "8Wq8Qj9x7P",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": false,
"risk_score": 8,
"risk_score_components": {
"proximity": 5,
"threat_profile": {
"evidence": [],
"malware": 1,
"phishing": 6,
"spam": 8
}
},
"risk_score_status": "full",
"state": "watched",
"status": "active",
"tld": "net.tr"
},
{
"assigned_by": "user@example.com",
"assigned_date": "2023-04-11T05:18:05.000000+00:00",
"changed_date": "2023-04-05T12:44:21.000000+00:00",
"discovered_date": "2023-04-05T12:07:54.646000+00:00",
"domain": "fakedomain.nexus",
"escalations": [
{
"created": "2023-04-11T05:18:05.262047+00:00",
"created_by": "user@example.com",
"escalation_type": "google_safe",
"id": "43gB2a3G6m"
}
],
"id": "ZadmVQOj0E",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": false,
"risk_score": 0,
"risk_score_components": {
"proximity": 0,
"threat_profile": {
"phishing": 53
}
},
"risk_score_status": "full",
"state": "watched",
"status": "active",
"tld": "nexus"
}
]
}
}

Human Readable Output#

Escalated Domains#

dt_changed_datedt_create_datedt_discovered_datedt_domaindt_domain_iddt_escalationsdt_monitor_idsdt_mx_existsdt_proximity_scoredt_registrant_contact_emaildt_registrardt_risk_scoredt_risk_statusdt_statedt_statusdt_threat_profile_evidencedt_threat_profile_malwaredt_threat_profile_phishingdt_threat_profile_spamdt_tld
2023-04-10T07:52:11.000000+00:002023-04-10T07:45:31.478000+00:00fakedomain.net.tr8Wq8Qj9x7P{'escalation_type': 'google_safe', 'id': '43gB2PwG6m', 'created': '2023-04-11T04:46:39.181378+00:00', 'created_by': 'user@example.com'}rA7bn46jq3false58fullwatchedactive168net.tr
2023-04-05T12:44:21.000000+00:002023-04-05T12:07:54.646000+00:00fakedomain.nexusZadmVQOj0E{'escalation_type': 'google_safe', 'id': '43gB2PwG6m', 'created': '2023-04-11T05:18:05.262047+00:00', 'created_by': 'user@example.com'}rA7bn46jq3false00fullwatchedactive53nexus

domaintools-iris-detect-get-blocklist-domains#


Manually retrieve domains that your organization has marked as "blocklisted", matching all of your monitored terms, or a specific term specified by a "monitor_id" that can be retrieved using the domaintools-iris-detect-get-monitors-list command. The number of domains returned is limited to 50 if including DNS and whois details, or 100 otherwise. Use the page and page_size parameter for pagination. Use the page and page_size parameter for pagination.

Base Command#

domaintools-iris-detect-get-blocklist-domains

Input#

Argument NameDescriptionRequired
monitor_idMonitor ID is used when requesting domains for a specific monitor. The monitor ID can be found using the 'domaintools-iris-detect-get-monitors-list' command.Optional
tldsList of TLDs to filter domains by. E.g. top.Optional
mx_existsFilter domains by if they have an MX record in DNS. Possible values are: True, False.Optional
changed_sinceFilter domains by when they were last changed. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
searchSort order for domain list. Valid values are an ordered list.Optional
sortSort order for domain list. Possible values are: discovered_date, changed_date, risk_score.Optional
include_domain_dataIncludes DNS and whois data in the response. Possible values are: True, False.Optional
preview"Preview" mode is helpful for initial setup and configuration. It limits the results to the first 10 results but removes hourly API restrictions. Possible values are: True, False.Optional
escalated_sinceFilter domains by when they were last escalated. Provide a datetime in ISO 8601 format, for example 2022-05-18T12:19:51.685496.Optional
orderSort order "asc" or "desc".Optional
risk_score_rangesList of risk score ranges to filter domains by. Valid values are: ["0-0", "1-39", "40-69", "70-99", "100-100"].Optional
limitDefault 100. Limit for pagination. Restricted to maximum 50 if include_domain_data is set to True.Optional
pageThe page number. Default is 1.Optional
page_sizeThe number of requested results per page. Default is 50.Optional

Context Output#

PathTypeDescription
DomainToolsIrisDetect.Blocked.stateStringIndicates that the domain is being watched.
DomainToolsIrisDetect.Blocked.domainStringThe domain name.
DomainToolsIrisDetect.Blocked.statusStringIndicates the status of the Domain (e.g., "active").
DomainToolsIrisDetect.Blocked.discovered_dateStringThe date and time when the domain was discovered (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Blocked.changed_dateStringThe date and time when the domain information was last changed (e.g., "2023-04-21T01:56:14.652000+00:00").
DomainToolsIrisDetect.Blocked.risk_scoreStringThe risk score associated with the domain.
DomainToolsIrisDetect.Blocked.risk_score_statusNumberThe status of the risk score.
DomainToolsIrisDetect.Blocked.risk_score_components.proximityNumberThe domain's proximity risk score.
DomainToolsIrisDetect.Blocked.risk_score_components.threat_profile.phishingNumberThe domain's phishing threat score.
DomainToolsIrisDetect.Blocked.risk_score_components.threat_profile.malwareNumberThe domain's malware threat score.
DomainToolsIrisDetect.Blocked.risk_score_components.threat_profile.spamNumberThe domain's spam threat score.
DomainToolsIrisDetect.Blocked.risk_score_components.threat_profile.evidenceUnknownThe list of evidence supporting the threat scores.
DomainToolsIrisDetect.Blocked.mx_existsBooleanIndicates that there is no MX record for the domain.
DomainToolsIrisDetect.Blocked.tldStringThe top-level domain.
DomainToolsIrisDetect.Blocked.idStringThe domain ID.
DomainToolsIrisDetect.Blocked.escalations.escalation_typeStringThe type of escalation.
DomainToolsIrisDetect.Blocked.escalations.idStringThe escalation ID.
DomainToolsIrisDetect.Blocked.escalations.createdStringThe date and time when the escalation was created.
DomainToolsIrisDetect.Blocked.escalations.created_byStringThe email address of the person who created the escalation.
DomainToolsIrisDetect.Blocked.monitor_idsStringAn array containing monitor IDs.
DomainToolsIrisDetect.Blocked.assigned_byStringThe email address of the person who assigned the domain to the watchlist..
DomainToolsIrisDetect.Blocked.assigned_dateStringThe date and time when the domain was assigned to the blocked list (e.g.,"2023-04-20T13:13:23.000000+00:00").
DomainToolsIrisDetect.Blocked.registrant_contact_emailStringRegistrant Email.
DomainToolsIrisDetect.Blocked.name_serverStringAn array of objects containing name server information.
DomainToolsIrisDetect.Blocked.registrarStringThe domain registrar.
DomainToolsIrisDetect.Blocked.create_dateStringThe date when the domain was created.
DomainToolsIrisDetect.Blocked.ip.country_codeStringCountry code for the ip.
DomainToolsIrisDetect.Blocked.ip.ipStringAssociated ip for the Domain.
DomainToolsIrisDetect.Blocked.ip.ispStringAssociated isp for the Domain.

Command example#

!domaintools-iris-detect-get-blocklist-domains limit="2"

Context Example#

{
"DomainToolsIrisDetect": {
"Blocked": [
{
"changed_date": "2023-04-10T05:58:01.000000+00:00",
"discovered_date": "2023-04-10T04:52:28.545000+00:00",
"domain": "fakedomain.co",
"escalations": [
{
"created": "2023-04-10T14:33:11.342255+00:00",
"created_by": "user@example.com",
"escalation_type": "blocked",
"id": "nzgWDr3B9Y"
}
],
"id": "gaeMyYl1Va",
"monitor_ids": [
"QEMba8wmXo"
],
"mx_exists": true,
"risk_score": 21,
"risk_score_components": {
"proximity": 21,
"threat_profile": {
"evidence": [],
"malware": 20,
"phishing": 15,
"spam": 17
}
},
"risk_score_status": "full",
"state": "watched",
"status": "active",
"tld": "co"
},
{
"assigned_by": "user@example.com",
"assigned_date": "2023-04-11T05:18:00.000000+00:00",
"changed_date": "2023-04-05T15:08:54.000000+00:00",
"discovered_date": "2023-04-05T15:01:50.701000+00:00",
"domain": "fakedomain.mov",
"escalations": [
{
"created": "2023-04-11T05:17:59.782456+00:00",
"created_by": "user@example.com",
"escalation_type": "blocked",
"id": "nzgWDAzB9Y"
}
],
"id": "gaeMVJX8ea",
"monitor_ids": [
"rA7bn46jq3"
],
"mx_exists": false,
"risk_score": 0,
"risk_score_components": {
"proximity": 0,
"threat_profile": {
"phishing": 53
}
},
"risk_score_status": "full",
"state": "watched",
"status": "active",
"tld": "mov"
}
]
}
}

Human Readable Output#

Blocked Domains#

dt_changed_datedt_create_datedt_discovered_datedt_domaindt_domain_iddt_escalationsdt_monitor_idsdt_mx_existsdt_proximity_scoredt_registrant_contact_emaildt_registrardt_risk_scoredt_risk_statusdt_statedt_statusdt_threat_profile_evidencedt_threat_profile_malwaredt_threat_profile_phishingdt_threat_profile_spamdt_tld
2023-04-10T05:58:01.000000+00:002023-04-10T04:52:28.545000+00:00fakedomain.cogaeMyYl1Va{'escalation_type': 'blocked', 'id': 'nzgWDr3B9Y', 'created': '2023-04-10T14:33:11.342255+00:00', 'created_by': 'user@example.com'}QEMba8wmXotrue2121fullwatchedactive201517co
2023-04-05T15:08:54.000000+00:002023-04-05T15:01:50.701000+00:00fakedomain.movgaeMVJX8ea{'escalation_type': 'blocked', 'id': 'nzgWDr3B9Y', 'created': '2023-04-11T05:17:59.782456+00:00', 'created_by': 'user@example.com'}rA7bn46jq3false00fullwatchedactive53mov

domaintools-iris-detect-reset-fetch-indicators#


This command will reset your fetch history.

Base Command#

domaintools-iris-detect-reset-fetch-indicators

Input#

There are no input arguments for this command.

Context Output#

There is no context output for this command.

Command example#

!domaintools-iris-detect-reset-fetch-indicators

Human Readable Output#

Fetch history deleted successfully