Skip to main content

Infoblox Threat Defense with DDI

This Integration is part of the Infoblox Threat Defense with DDI Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

Infoblox Threat Defense with DDI integration leverages DNS as the first line of defense to detect and block cyber threats, while also using threat intelligence to manage insight incident response and enrich indicators. This integration was integrated and tested with version 1.0.0 of Infoblox Threat Defense with DDI.

Configure Infoblox Threat Defense with DDI in Cortex#

ParameterDescriptionRequired
Service API KeyTrue
Source ReliabilityReliability of the source providing the intelligence data.False
Create relationshipsCreate relationships between indicators as part of Enrichment.False
Fetch incidentsFalse
Incident typeFalse
Ingestion TypeSelect the ingestion type to fetch as XSOAR incident. Default is SOC Insight.False
SOC Insight StatusRetrieve the SOC Insights as specified status.False
SOC Insight Threat TypeRetrieve the SOC Insights as specified threat type.False
SOC Insight Priority LevelRetrieve the SOC Insights as specified priority level.False
DNS Security Event Feed NameRetrieve the DNS Security Events as specified feed name or custom list name.False
DNS Security Event NetworkRetrieve the DNS Security Events as specified network name.False
DNS Security Event Policy ActionRetrieve the DNS Security Events as specified policy action.False
DNS Security Event Policy NameRetrieve the DNS Security Events as specified policy name.False
DNS Security Event Queried NameRetrieve the DNS Security Events as specified queried name.False
DNS Security Event Threat ClassRetrieve the DNS Security Events as specified threat class.False
DNS Security Event Threat FamilyRetrieve the DNS Security Events as specified threat family.False
DNS Security Event Threat IndicatorRetrieve the DNS Security Events as specified threat indicator.False
DNS Security Event Threat LevelRetrieve the DNS Security Events as specified threat level.False
Max FetchThe maximum number of SOC Insights or DNS Security Events to fetch each time. If the value is greater than 200, it will be considered as 200. The maximum is 200.False
First fetch timestampThe date or relative timestamp from which to begin fetching incidents. Note: This parameter is only applicable for DNS Security Events.

Supported formats: 2 minutes, 2 hours, 2 days, 2 weeks, 2 months, 2 years, yyyy-mm-dd, yyyy-mm-ddTHH:MM:SSZ.

For example: 01 May 2025, 01 May 2025 04:45:33, 2025-05-17T14:05:44Z.
False
Incidents Fetch IntervalFalse
Trust any certificate (not secure)False
Use system proxy settingsFalse

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

bloxone-td-dossier-lookup-get#


The Dossier Lookup API returns detailed information on the specified indicator from the requested sources.

Base Command#

bloxone-td-dossier-lookup-get

Input#

Argument NameDescriptionRequired
indicator_typeThe type of indcator to search by. Possible values are: host, ip, url, hash, email.Required
valueThe indicator to search on.Required
sourcesThe sources to query. Multiple sources can be specified. If no source is specified, the call will search on all available sources. (You can see the list of the available sources by running bloxone-td-dossier-source-list).Optional
interval_in_secondsThe interval in seconds between each poll. Default is 10.Optional
timeoutThe timeout in seconds until polling ends. Default is 600.Optional
job_idused for polling.Optional

Context Output#

PathTypeDescription
BloxOneTD.DossierLookup.sourceStringThe Dossier source.
BloxOneTD.DossierLookup.targetStringThe targeted indicator.
BloxOneTD.DossierLookup.task_idStringThe Dossier task ID.
BloxOneTD.DossierLookup.typeStringThe indicator type.

Command example#

!bloxone-td-dossier-lookup-get indicator_type="ip" value="11.22.33.44" sources="activity,threatfox,ccb"

Context Example#

{
"BloxOneTD": {
"DossierLookup": [
{
"params": {
"source": "ccb",
"target": "11.22.33.44",
"type": "ip"
},
"status": "success",
"task_id": "97bdeca2-b66d-47b1-b1ef-9e4833654df2",
"time": 6401,
"v": "3.0.0"
},
{
"data": {
"impacted_devices": [],
"requests_by_day": []
},
"params": {
"source": "activity",
"target": "11.22.33.44",
"type": "ip"
},
"status": "success",
"task_id": "4074cb34-2bec-485d-8d6d-9e9cc88d5229",
"time": 1708,
"v": "3.0.0"
},
{
"data": {
"matches": []
},
"params": {
"source": "threatfox",
"target": "11.22.33.44",
"type": "ip"
},
"status": "success",
"task_id": "73892ea3-1e22-433f-bc74-f59133b914d0",
"time": 8,
"v": "3.0.0"
}
]
}
}

Human Readable Output#

Lookalike Domain List#

Task IdTypeTargetSource
d418b8d6-831c-4f6f-a31a-6d48995d2267ip11.22.33.44threatfox
91945be3-0cef-4d03-afd7-e4f25864553dip11.22.33.44ccb
7145a1ca-40a9-43df-b0a3-c4281e5abd7eip11.22.33.44activity

bloxone-td-dossier-source-list#


Get available Dossier sources.

Base Command#

bloxone-td-dossier-source-list

Input#

There are no input arguments for this command.

Context Output#

PathTypeDescription
BloxOneTD.DossierSourceStringAvailable Dossier sources.

Command example#

!bloxone-td-dossier-source-list

Context Example#

{
"BloxOneTD": {
"DossierSource": [
"ccb",
"activity",
"geo",
"threatfox"
]
}
}

Human Readable Output#

Results#

DossierSource
activity
ccb
geo
threatfox

bloxone-td-lookalike-domain-list#


Get lookalike domain lists.

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.

Base Command#

bloxone-td-lookalike-domain-list

Input#

Argument NameDescriptionRequired
filterThe free query filter argument.Optional
target_domainFilter by target domain.Optional
detected_atFilter by values that are greater than or equal to the given value. You can use ISO format (e.g. '2023-02-14T00:11:22Z') or use a relative time (e.g. "3 days").Optional
limitMaximum number of results to return from the query. Default is 50.Optional
offsetReturn results starting at this offset. Should be an integer. Default is 0.Optional

Context Output#

PathTypeDescription
BloxOneTD.LookalikeDomain.detected_atDateThe date of the lookalike detection.
BloxOneTD.LookalikeDomain.lookalike_domainStringThe lookalike domain.
BloxOneTD.LookalikeDomain.lookalike_hostStringThe lookalike host.
BloxOneTD.LookalikeDomain.reasonStringThe reason for the detection.
BloxOneTD.LookalikeDomain.target_domainStringThe domain that was targeted by the lookalike domain.

Command example#

!bloxone-td-lookalike-domain-list detected_at="1y"

Context Example#

{
"BloxOneTD": {
"LookalikeDomain": [
{
"detected_at": "2023-01-27T18:43:01Z",
"lookalike_domain": "test.a.com",
"lookalike_host": "test.a.com",
"reason": "Domain is a lookalike to test.com. The creation date is 2023-01-22.",
"target_domain": "test.com"
},
{
"detected_at": "2023-01-28T18:36:27Z",
"lookalike_domain": "test.b.com",
"lookalike_host": "test.b.com",
"reason": "Domain is a lookalike to test.com and has suspicious registration, behavior, or associations with known threats. The creation date is 2022-11-30.",
"suspicious": true,
"target_domain": "test.com"
},
{
"detected_at": "2023-01-28T18:37:03Z",
"lookalike_domain": "test.c.com",
"lookalike_host": "test.c.com",
"reason": "Domain is a lookalike to test.com. The creation date is 2022-09-18.",
"target_domain": "test.com"
}
]
}
}

Human Readable Output#

Results#

Detected AtLookalike DomainLookalike HostReasonTarget Domain
2023-01-27T18:43:01Ztest.a.comtest.a.comDomain is a lookalike to test.com. The creation date is 2023-01-22.test.com
2023-01-28T18:36:27Ztest.b.comtest.b.comDomain is a lookalike to test.com and has suspicious registration, behavior, or associations with known threats. The creation date is 2022-11-30.test.com
2023-01-28T18:37:03Ztest.c.comtest.c.comDomain is a lookalike to test.com. The creation date is 2022-09-18.test.com

infobloxcloud-block-ip#


The given IP addresses will be added to the provided block list.

Base Command#

infobloxcloud-block-ip

Input#

Argument NameDescriptionRequired
ipSpecify the IP addresses to block. Supports comma-separated values.Required
custom_list_nameSpecify the name of the custom list to add the given IP addresses to. Default is Default Block.Optional
custom_list_typeSpecify the type of the custom list to add the given IP addresses to. Possible values are: default_block, custom_list, threat_insight, dga, dnsm, zero_day_dns, threat_insight_nde. Default is default_block.Optional

Context Output#

PathTypeDescription
InfobloxCloud.CustomList.idStringThe ID of the custom list.
InfobloxCloud.CustomList.nameStringThe name of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.itemsStringThe items in the custom list.
InfobloxCloud.CustomList.items_describedArrayThe items described in the custom list.
InfobloxCloud.CustomList.item_countNumberThe number of items in the custom list.
InfobloxCloud.CustomList.confidence_levelStringThe confidence level of the custom list.
InfobloxCloud.CustomList.created_timeStringThe time the custom list was created.
InfobloxCloud.CustomList.last_updated_timeStringThe time the custom list was last updated.
InfobloxCloud.CustomList.descriptionStringThe description of the custom list.
InfobloxCloud.CustomList.policiesStringThe policies of the custom list.
InfobloxCloud.CustomList.tagsStringThe tags of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.threat_levelStringThe threat level of the custom list.

Command example#

!infobloxcloud-block-ip ip=0.0.0.0

Context Example#

{
"InfobloxCloud": {
"CustomList": {
"confidence_level": "HIGH",
"created_time": "2024-04-01T18:24:37Z",
"description": "Auto-generated",
"id": 456789,
"item_count": 2,
"items": [
"0.0.0.0/32",
"0.0.0.1/32"
],
"items_described": [
{
"description": "",
"item": "0.0.0.0/32",
"status": "ACTIVE",
"status_details": ""
},
{
"description": "",
"item": "0.0.0.1/32",
"status": "ACTIVE",
"status_details": ""
}
],
"name": "Test Block",
"policies": [
"Test Policy"
],
"tags": {
"test_key": "test_value"
},
"threat_level": "MEDIUM",
"type": "test_block",
"updated_time": "2025-07-29T08:47:54Z"
}
}
}

Human Readable Output#

'0.0.0.0' indicators added to the 'Test Block' list#

IDNameTypeDescriptionItemsConfidence LevelThreat LevelTagsCreated TimeUpdated Time
792594Test Blocktest_blockAuto-generated0.0.0.0/32,
0.0.0.1/32
HIGHMEDIUMtest_key: test_value2024-04-01T18:24:37Z2025-07-29T08:47:54Z

infobloxcloud-unblock-ip#


The given IP addresses will be added to the provided allow list.

Base Command#

infobloxcloud-unblock-ip

Input#

Argument NameDescriptionRequired
ipSpecify the IP addresses to unblock. Supports comma-separated values.Required
custom_list_nameSpecify the name of the custom list to add the given IP addresses to. Default is Default Allow.Optional
custom_list_typeSpecify the type of the custom list to add the given IP addresses to. Possible values are: default_allow, custom_list, threat_insight, threat_insight_nde. Default is default_allow.Optional

Context Output#

PathTypeDescription
InfobloxCloud.CustomList.idStringThe ID of the custom list.
InfobloxCloud.CustomList.nameStringThe name of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.itemsStringThe items in the custom list.
InfobloxCloud.CustomList.items_describedArrayThe items described in the custom list.
InfobloxCloud.CustomList.item_countNumberThe number of items in the custom list.
InfobloxCloud.CustomList.confidence_levelStringThe confidence level of the custom list.
InfobloxCloud.CustomList.created_timeStringThe time the custom list was created.
InfobloxCloud.CustomList.last_updated_timeStringThe time the custom list was last updated.
InfobloxCloud.CustomList.descriptionStringThe description of the custom list.
InfobloxCloud.CustomList.policiesStringThe policies of the custom list.
InfobloxCloud.CustomList.tagsStringThe tags of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.threat_levelStringThe threat level of the custom list.

Command example#

!infobloxcloud-unblock-ip ip=0.0.0.0

Context Example#

{
"InfobloxCloud": {
"CustomList": {
"confidence_level": "HIGH",
"created_time": "2024-04-01T18:24:37Z",
"description": "Auto-generated",
"id": 123456,
"item_count": 2,
"items": [
"0.0.0.0/32",
"0.0.0.1/32"
],
"items_described": [
{
"description": "",
"item": "0.0.0.0/32",
"status": "ACTIVE",
"status_details": ""
},
{
"description": "",
"item": "0.0.0.1/32",
"status": "ACTIVE",
"status_details": ""
}
],
"name": "Test Allow",
"policies": [
"Test Policy"
],
"tags": {
"test_key": "test_value"
},
"threat_level": "MEDIUM",
"type": "test_allow",
"updated_time": "2025-07-29T08:48:02Z"
}
}
}

Human Readable Output#

'0.0.0.0' indicators added to the 'Test Allow' list#

IDNameTypeDescriptionItemsConfidence LevelThreat LevelTagsCreated TimeUpdated Time
123456Test Allowtest_allowAuto-generated0.0.0.0/32,
0.0.0.1/32
HIGHMEDIUMtest_key: test_value2024-04-01T18:24:37Z2025-07-29T08:48:02Z

infobloxcloud-block-domain#


The given domains will be added to the provided block list.

Base Command#

infobloxcloud-block-domain

Input#

Argument NameDescriptionRequired
domainSpecify the Domains to block. Supports comma-separated values.Required
custom_list_nameSpecify the name of the custom list to add the given domains to. Default is Default Block.Optional
custom_list_typeSpecify the type of the custom list to add the given domains to. Possible values are: default_block, custom_list, threat_insight, dga, dnsm, zero_day_dns, threat_insight_nde. Default is default_block.Optional

Context Output#

PathTypeDescription
InfobloxCloud.CustomList.idStringThe ID of the custom list.
InfobloxCloud.CustomList.nameStringThe name of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.itemsStringThe items in the custom list.
InfobloxCloud.CustomList.items_describedArrayThe items described in the custom list.
InfobloxCloud.CustomList.item_countNumberThe number of items in the custom list.
InfobloxCloud.CustomList.confidence_levelStringThe confidence level of the custom list.
InfobloxCloud.CustomList.created_timeStringThe time the custom list was created.
InfobloxCloud.CustomList.last_updated_timeStringThe time the custom list was last updated.
InfobloxCloud.CustomList.descriptionStringThe description of the custom list.
InfobloxCloud.CustomList.policiesStringThe policies of the custom list.
InfobloxCloud.CustomList.tagsStringThe tags of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.threat_levelStringThe threat level of the custom list.

Command example#

!infobloxcloud-block-domain domain="test.com"

Context Example#

{
"InfobloxCloud": {
"CustomList": {
"confidence_level": "HIGH",
"created_time": "2024-04-01T18:24:37Z",
"description": "Auto-generated",
"id": 456789,
"item_count": 2,
"items": [
"test.com",
"test.org"
],
"items_described": [
{
"description": "",
"item": "test.com",
"status": "ACTIVE",
"status_details": ""
},
{
"description": "",
"item": "test.org",
"status": "ACTIVE",
"status_details": ""
}
],
"name": "Test Block",
"policies": [
"Test Policy"
],
"tags": null,
"threat_level": "MEDIUM",
"type": "test_block",
"updated_time": "2025-07-29T10:27:49Z"
}
}
}

Human Readable Output#

'test.com' indicator added to the 'Test Block' list#

IDNameTypeDescriptionItemsConfidence LevelThreat LevelCreated TimeUpdated Time
456789Test Blocktest_blockAuto-generatedtest.com,
test.org
HIGHMEDIUM2024-04-01T18:24:37Z2025-07-29T10:27:49Z

infobloxcloud-unblock-domain#


The given domains will be added to the provided allow list.

Base Command#

infobloxcloud-unblock-domain

Input#

Argument NameDescriptionRequired
domainSpecify the Domains to unblock. Supports comma-separated values.Required
custom_list_nameSpecify the name of the custom list to add the given domains to. Default is Default Allow.Optional
custom_list_typeSpecify the type of the custom list to add the given domains to. Possible values are: default_allow, custom_list, threat_insight, threat_insight_nde. Default is default_allow.Optional

Context Output#

PathTypeDescription
InfobloxCloud.CustomList.idStringThe ID of the custom list.
InfobloxCloud.CustomList.nameStringThe name of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.itemsStringThe items in the custom list.
InfobloxCloud.CustomList.items_describedArrayThe items described in the custom list.
InfobloxCloud.CustomList.item_countNumberThe number of items in the custom list.
InfobloxCloud.CustomList.confidence_levelStringThe confidence level of the custom list.
InfobloxCloud.CustomList.created_timeStringThe time the custom list was created.
InfobloxCloud.CustomList.last_updated_timeStringThe time the custom list was last updated.
InfobloxCloud.CustomList.descriptionStringThe description of the custom list.
InfobloxCloud.CustomList.policiesStringThe policies of the custom list.
InfobloxCloud.CustomList.tagsStringThe tags of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.threat_levelStringThe threat level of the custom list.

Command example#

!infobloxcloud-unblock-domain domain="test.com"

Context Example#

{
"InfobloxCloud": {
"CustomList": {
"confidence_level": "HIGH",
"created_time": "2024-04-01T18:24:37Z",
"description": "Auto-generated",
"id": 123456,
"item_count": 2,
"items": [
"test.com",
"test.org"
],
"items_described": [
{
"description": "",
"item": "test.com",
"status": "ACTIVE",
"status_details": ""
},
{
"description": "",
"item": "test.org",
"status": "ACTIVE",
"status_details": ""
}
],
"name": "Test Allow",
"policies": [
"Test Policy"
],
"tags": {
"test_key": "test_value"
},
"threat_level": "MEDIUM",
"type": "test_allow",
"updated_time": "2025-07-29T10:27:56Z"
}
}
}

Human Readable Output#

'test.com' indicator added to the 'Test Allow' list#

IDNameTypeDescriptionItemsConfidence LevelThreat LevelTagsCreated TimeUpdated Time
123456Test Allowtest_allowAuto-generatedtest.com,
test.org
HIGHMEDIUMtest_key: test_value2024-04-01T18:24:37Z2025-07-29T10:27:56Z

infobloxcloud-customlist-indicator-remove#


The given indicators will be removed from the provided custom list.

Base Command#

infobloxcloud-customlist-indicator-remove

Input#

Argument NameDescriptionRequired
indicatorsSpecify the indicators to remove from the custom list. Format accepted is: "0.0.0.0, example.com".Required
custom_list_nameSpecify the name of the custom list to remove the given indicators from.Required
custom_list_typeSpecify the type of the custom list to remove the given indicators from. Possible values are: default_allow, default_block, custom_list, threat_insight, dga, dnsm, zero_day_dns, threat_insight_nde.Required

Context Output#

PathTypeDescription
InfobloxCloud.CustomList.idStringThe ID of the custom list.
InfobloxCloud.CustomList.nameStringThe name of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.itemsStringThe items in the custom list.
InfobloxCloud.CustomList.items_describedArrayThe items described in the custom list.
InfobloxCloud.CustomList.item_countNumberThe number of items in the custom list.
InfobloxCloud.CustomList.confidence_levelStringThe confidence level of the custom list.
InfobloxCloud.CustomList.created_timeStringThe time the custom list was created.
InfobloxCloud.CustomList.last_updated_timeStringThe time the custom list was last updated.
InfobloxCloud.CustomList.descriptionStringThe description of the custom list.
InfobloxCloud.CustomList.policiesStringThe policies of the custom list.
InfobloxCloud.CustomList.tagsStringThe tags of the custom list.
InfobloxCloud.CustomList.typeStringThe type of the custom list.
InfobloxCloud.CustomList.threat_levelStringThe threat level of the custom list.

Command example#

!infobloxcloud-customlist-indicator-remove indicators="0.0.0.0" custom_list_name="Test Allow" custom_list_type="test_allow"

Context Example#

{
"InfobloxCloud": {
"CustomList": {
"confidence_level": "HIGH",
"created_time": "2024-04-01T18:24:37Z",
"description": "Auto-generated",
"id": 123456,
"item_count": 1,
"items": [
"example.com"
],
"items_described": [
{
"description": "",
"item": "example.com",
"status": "ACTIVE",
"status_details": ""
}
],
"name": "Test Allow",
"policies": [
"Test Policy",
],
"tags": {
"test_key": "test_value"
},
"threat_level": "MEDIUM",
"type": "test_allow",
"updated_time": "2025-07-31T11:07:41Z"
}
}
}

Human Readable Output#

'0.0.0.0' indicators removed from the 'Test Allow' list#

IDNameTypeDescriptionItemsConfidence LevelThreat LevelTagsCreated TimeUpdated Time
123456Test Allowtest_allowAuto-generatedexample.comHIGHMEDIUMtest_key: test_value2024-04-01T18:24:37Z2025-07-31T11:07:41Z

ip#


Gets the comprehensive IP reputation and threat intelligence from Infoblox Threat Defense, including threat indicators, IPAM address information, and standard IP reputation data.

Base Command#

ip

Input#

Argument NameDescriptionRequired
ipIP(s) for which to retrieve reputation and threat intelligence. Supports comma-separated values.Required

Context Output#

PathTypeDescription
InfobloxCloud.IP.ipStringThe requested IP address.
IP.AddressStringIP address.
IP.Relationships.EntityAStringThe source of the relationship.
IP.Relationships.EntityBStringThe destination of the relationship.
IP.Relationships.RelationshipStringThe name of the relationship.
IP.Relationships.EntityATypeStringThe type of the source of the relationship.
IP.Relationships.EntityBTypeStringThe type of the destination of the relationship.
IP.ASNStringThe autonomous system name for the IP address, for example: "AS8948".
IP.HostnameStringThe hostname that is mapped to this IP address.
IP.Geo.LocationStringThe geolocation where the IP address is located, in the format: latitude:longitude.
IP.Geo.CountryStringThe country in which the IP address is located.
IP.Geo.DescriptionStringAdditional information about the location.
IP.DetectionEnginesNumberThe total number of engines that checked the indicator.
IP.PositiveDetectionsNumberThe number of engines that positively detected the indicator as malicious.
IP.Malicious.VendorStringThe vendor reporting the IP address as malicious.
IP.Malicious.DescriptionStringA description explaining why the IP address was reported as malicious.
IP.TagsUnknown(List) Tags of the IP address.
IP.FeedRelatedIndicators.valueStringIndicators that are associated with the IP address.
IP.FeedRelatedIndicators.typeStringThe type of the indicators that are associated with the IP address.
IP.FeedRelatedIndicators.descriptionStringThe description of the indicators that are associated with the IP address.
IP.MalwareFamilyStringThe malware family associated with the IP address.
IP.Organization.NameStringThe organization of the IP address.
IP.Organization.TypeStringThe organization type of the IP address.
IP.ASOwnerStringThe autonomous system owner of the IP address.
IP.RegionStringThe region in which the IP address is located.
IP.PortStringPorts that are associated with the IP address.
IP.InternalBooleanWhether the IP address is internal or external.
IP.UpdatedDateDateThe date that the IP address was last updated.
IP.Registrar.Abuse.NameStringThe name of the contact for reporting abuse.
IP.Registrar.Abuse.AddressStringThe address of the contact for reporting abuse.
IP.Registrar.Abuse.CountryStringThe country of the contact for reporting abuse.
IP.Registrar.Abuse.NetworkStringThe network of the contact for reporting abuse.
IP.Registrar.Abuse.PhoneStringThe phone number of the contact for reporting abuse.
IP.Registrar.Abuse.EmailStringThe email address of the contact for reporting abuse.
IP.CampaignStringThe campaign associated with the IP address.
IP.TrafficLightProtocolStringThe Traffic Light Protocol (TLP) color that is suitable for the IP address.
IP.CommunityNotes.noteStringNotes on the IP address that were given by the community.
IP.CommunityNotes.timestampDateThe time in which the note was published.
IP.Publications.sourceStringThe source in which the article was published.
IP.Publications.titleStringThe name of the article.
IP.Publications.linkStringA link to the original article.
IP.Publications.timestampDateThe time in which the article was published.
IP.ThreatTypes.threatcategoryStringThe threat category associated to this indicator by the source vendor. For example, Phishing, Control, TOR, etc.
IP.ThreatTypes.threatcategoryconfidenceStringThe confidence level provided by the vendor for the threat type category For example, a confidence of 90 for the threat type category 'malware' means that the vendor rates that this is 90% confidence of being a malware.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.
DBotScore.ReliabilityStringReliability of the source providing the intelligence data.
InfobloxCloud.IP.Threat.idStringThe unique identifier for the threat indicator.
InfobloxCloud.IP.Threat.typeStringThe type of threat indicator.
InfobloxCloud.IP.Threat.ipStringThe IP address identified as a threat indicator.
InfobloxCloud.IP.Threat.profileStringThe threat profile or classification source.
InfobloxCloud.IP.Threat.propertyStringThe specific property or category of the threat.
InfobloxCloud.IP.Threat.classStringThe classification of the threat.
InfobloxCloud.IP.Threat.threat_levelNumberThe numeric threat level score.
InfobloxCloud.IP.Threat.threat_labelStringThe textual threat level label.
InfobloxCloud.IP.Threat.expirationDateThe timestamp when the threat indicator will expire.
InfobloxCloud.IP.Threat.detectedDateThe timestamp when the threat activity was first detected.
InfobloxCloud.IP.Threat.receivedDateThe timestamp when the threat indicator was received by the system.
InfobloxCloud.IP.Threat.importedDateThe timestamp when the threat indicator was imported into the system.
InfobloxCloud.IP.Threat.upStringThe boolean status flag indicating whether the threat indicator is currently active.
InfobloxCloud.IP.Threat.batch_idStringThe batch ID of the threat indicator.
InfobloxCloud.IP.Threat.confidenceNumberThe numeric confidence score representing the reliability of the threat indicator.
InfobloxCloud.IP.Threat.extended.notesStringThe additional notes or information about the threat indicator.
InfobloxCloud.IP.Threat.threat_scoreNumberThe numeric score representing the calculated threat severity.
InfobloxCloud.IP.Threat.threat_score_ratingStringThe textual rating of the threat score.
InfobloxCloud.IP.Threat.threat_score_vectorStringThe vector string representing threat scoring details.
InfobloxCloud.IP.Threat.risk_scoreNumberThe numeric risk score assigned to the threat indicator.
InfobloxCloud.IP.Threat.risk_score_ratingStringThe textual rating of the risk score.
InfobloxCloud.IP.Threat.risk_score_vectorStringThe vector string representing risk scoring details.
InfobloxCloud.IP.Threat.confidence_scoreNumberThe numeric confidence score for the threat assessment.
InfobloxCloud.IP.Threat.confidence_score_ratingStringThe textual rating of the confidence score.
InfobloxCloud.IP.Threat.confidence_score_vectorStringThe vector string representing confidence scoring details.
InfobloxCloud.IP.Threat.extended.cyberint_guidStringThe unique identifier for the threat indicator.
InfobloxCloud.IP.Threat.extended.attack_chainStringThe attack chain associated with the threat indicator.
InfobloxCloud.IP.Threat.extended.extendedStringThe additional information or metadata associated with the threat indicator.
InfobloxCloud.IP.Threat.extended.protocolStringThe protocol associated with the threat indicator.
InfobloxCloud.IP.Threat.extended.referencesStringThe references associated with the threat indicator.
InfobloxCloud.IP.Threat.extended.threat_actorStringThe threat actor associated with the threat indicator.
InfobloxCloud.IP.Threat.extended.threat_actor_vectorStringThe vector string representing threat actor details.
InfobloxCloud.IP.Threat.extended.risk_scoreStringThe numeric risk score assigned to the threat indicator.
InfobloxCloud.IP.Threat.extended.threat_scoreStringThe numeric threat score assigned to the threat indicator.
InfobloxCloud.IP.Threat.extended.sample_sha256StringThe SHA-256 hash of the sample associated with the threat.
InfobloxCloud.IP.Threat.extended.original_profileStringThe original profile or classification source of the threat.
InfobloxCloud.IP.Address.addressStringThe IP address assigned to the resource.
InfobloxCloud.IP.Address.commentStringA user-provided comment or annotation for the address record.
InfobloxCloud.IP.Address.compartment_idStringThe compartment ID of the IP address.
InfobloxCloud.IP.Address.created_atDateThe timestamp when the IP address was created.
InfobloxCloud.IP.Address.dhcp_infoUnknownThe DHCP information associated with the IP address.
InfobloxCloud.IP.Address.disable_dhcpBooleanA boolean flag indicating whether DHCP is disabled for the IP address.
InfobloxCloud.IP.Address.discovery_attrsUnknownThe discovery attributes associated with the IP address.
InfobloxCloud.IP.Address.discovery_metadataUnknownThe discovery metadata associated with the IP address.
InfobloxCloud.IP.Address.external_keysUnknownExternal keys associated with the IP address.
InfobloxCloud.IP.Address.hostUnknownThe host name of the IP address.
InfobloxCloud.IP.Address.hwaddrStringThe hardware address of the IP address.
InfobloxCloud.IP.Address.idStringThe unique identifier of the IP address.
InfobloxCloud.IP.Address.interfaceStringThe interface of the IP address.
InfobloxCloud.IP.Address.namesUnknownThe names associated with the IP address.
InfobloxCloud.IP.Address.parentStringThe parent of the IP address.
InfobloxCloud.IP.Address.protocolStringThe protocol of the IP address.
InfobloxCloud.IP.Address.rangeStringThe range of the IP address.
InfobloxCloud.IP.Address.spaceStringThe space of the IP address.
InfobloxCloud.IP.Address.stateStringThe state of the IP address.
InfobloxCloud.IP.Address.tagsUnknownThe tags associated with the IP address.
InfobloxCloud.IP.Address.updated_atDateThe timestamp when the IP address was last updated.
InfobloxCloud.IP.Address.usageStringThe usage of the IP address.
InfobloxCloud.IP.Address.names.nameStringThe name of the IP address.
InfobloxCloud.IP.Address.names.typeUnknownThe type of the IP address.

Command example#

!ip ip="0.0.0.1"

Context Example#

{
"DBotScore": {
"Indicator": "0.0.0.1",
"Reliability": "A - Completely reliable",
"Score": 3,
"Type": "ip",
"Vendor": "InfobloxThreatDefensewithDDI"
},
"IP": {
"Address": "0.0.0.1",
"Description": "Malware Download associated with the APT group",
"ThreatTypes": [
{
"threatcategory": "IP",
"threatcategoryconfidence": "100"
}
],
"Hostname": "name",
"DetectionEngines": 1,
"Tags": [
"cyberint_guid: simple_cyberint_guid",
"notes: Malware Download associated with the APT group",
"Protocol: ip4",
"State: used",
"temp: true"
],
"MalwareFamily": "APT",
"Malicious": {
"Vendor": "InfobloxThreatDefensewithDDI",
"Description": "Malware Download associated with the APT group"
}
},
"InfobloxCloud": {
"IP": {
"ip": "0.0.0.1",
"Threat": {
"id": "00000000-0000-0000-0000-000000000000",
"type": "IP",
"ip": "0.0.0.1",
"profile": "IID",
"property": "APT_Malware",
"class": "APT",
"threat_level": 100,
"expiration": "2042-11-01T09:29:18.721Z",
"detected": "2025-07-29T09:29:18.721Z",
"received": "2025-07-29T09:31:39.329Z",
"imported": "2025-07-29T09:31:39.329Z",
"up": "true",
"confidence": 100,
"batch_id": "00000000-0000-0000-0000-000000000000",
"threat_score": 10,
"threat_score_rating": "Critical",
"threat_score_vector": "simple_threat_vector",
"risk_score": 9.9,
"risk_score_rating": "Critical",
"risk_score_vector": "simple_risk_vector",
"confidence_score": 0.1,
"confidence_score_rating": "Unconfirmed",
"confidence_score_vector": "simple_confidence_vector",
"extended": {
"cyberint_guid": "simple_cyberint_guid",
"notes": "Malware Download associated with the APT group"
}
},
"Address": {
"address": "0.0.0.1",
"comment": "comment",
"compartment_id": "00000000-0000-0000-0000-000000000000",
"created_at": "2025-06-27T13:07:21.476126Z",
"disable_dhcp": false,
"external_keys": {
"e3": "3e3"
},
"host": "ipam/host/00000000-0000-0000-0000-000000000000",
"hwaddr": "00:00:00:00:00:00",
"id": "ipam/address/00000000-0000-0000-0000-000000000000",
"interface": "interface",
"names": [
{
"name": "name",
"type": "user"
}
],
"parent": "ipam/subnet/00000000-0000-0000-0000-000000000000",
"protocol": "ip4",
"range": "ipam/range/00000000-0000-0000-0000-000000000000",
"space": "ipam/ip_space/00000000-0000-0000-0000-000000000000",
"state": "used",
"tags": {
"temp": "true"
},
"updated_at": "2025-06-27T13:07:21.429056Z",
"usage": [
"IPAM RESERVED"
]
}
}
}
}

Human Readable Output#

Information for the given Bad IP: 0.0.0.1#

Threat Intelligence Summary#

Batch IdClassConfidenceConfidence ScoreConfidence Score RatingConfidence Score VectorDetectedExpirationExtendedIdImportedIPProfilePropertyReceivedRisk ScoreRisk Score RatingRisk Score VectorThreat LevelThreat ScoreThreat Score RatingThreat Score VectorTypeUp
00000000-0000-0000-0000-000000000000APT1000.1Unconfirmedsimple_confidence_vector2025-07-29T09:29:18.721Z2042-11-01T09:29:18.721Zcyberint_guid: simple_cyberint_guid
notes: Malware Download associated with the APT group
00000000-0000-0000-0000-0000000000002025-07-29T09:31:39.329Z0.0.0.1IIDAPT_Malware2025-07-29T09:31:39.329Z9.9Criticalsimple_risk_vector10010Criticalsimple_threat_vectorIPtrue

Address Information#

AddressCommentCompartment IdCreated AtDisable DhcpExternal KeysHostHwaddrIdInterfaceNamesParentProtocolRangeSpaceStateTagsUpdated AtUsage
0.0.0.1comment00000000-0000-0000-0000-0000000000002025-06-27T13:07:21.476126ZFalsee3: 3e3ipam/host/00000000-0000-0000-0000-00000000000000:00:00:00:00:00ipam/address/00000000-0000-0000-0000-000000000000interface- name: name
type: user
ipam/subnet/00000000-0000-0000-0000-000000000000ip4ipam/range/00000000-0000-0000-0000-000000000000ipam/ip_space/00000000-0000-0000-0000-000000000000usedtemp: true2025-06-27T13:07:21.429056Zvalues: IPAM RESERVED

domain#


Gets the comprehensive domain/host reputation and threat intelligence from Infoblox Threat Defense, including threat indicators, IPAM address information and standard domain reputation data.

Base Command#

domain

Input#

Argument NameDescriptionRequired
domainDomain(s) or Hosts(s) for which to retrieve reputation and threat intelligence. Supports comma-separated values.Required

Context Output#

PathTypeDescription
InfobloxCloud.Domain.domainStringThe requested domain.
Domain.NameStringThe domain name, for example: "google.com".
Domain.Relationships.EntityAstringThe source of the relationship.
Domain.Relationships.EntityBstringThe destination of the relationship.
Domain.Relationships.RelationshipstringThe name of the relationship.
Domain.Relationships.EntityATypestringThe type of the source of the relationship.
Domain.Relationships.EntityBTypestringThe type of the destination of the relationship.
Domain.DNSStringA list of IP objects resolved by DNS.
Domain.DetectionEnginesNumberThe total number of engines that checked the indicator.
Domain.PositiveDetectionsNumberThe number of engines that positively detected the indicator as malicious.
Domain.CreationDateDateThe date that the domain was created.
Domain.UpdatedDateStringThe date that the domain was last updated.
Domain.ExpirationDateDateThe expiration date of the domain.
Domain.DomainStatusDatteThe status of the domain.
Domain.NameServersUnknown(List<String>) Name servers of the domain.
Domain.OrganizationStringThe organization of the domain.
Domain.SubdomainsUnknown(List<String>) Subdomains of the domain.
Domain.Admin.CountryStringThe country of the domain administrator.
Domain.Admin.EmailStringThe email address of the domain administrator.
Domain.Admin.NameStringThe name of the domain administrator.
Domain.Admin.PhoneStringThe phone number of the domain administrator.
Domain.Registrant.CountryStringThe country of the registrant.
Domain.Registrant.EmailStringThe email address of the registrant.
Domain.Registrant.NameStringThe name of the registrant.
Domain.Registrant.PhoneStringThe phone number for receiving abuse reports.
Domain.TagsUnknown(List) Tags of the domain.
Domain.FeedRelatedIndicators.valueStringIndicators that are associated with the domain.
Domain.FeedRelatedIndicators.typeStringThe type of the indicators that are associated with the domain.
Domain.FeedRelatedIndicators.descriptionStringThe description of the indicators that are associated with the domain.
Domain.MalwareFamilyStringThe malware family associated with the domain.
Domain.WHOIS.DomainStatusStringThe status of the domain.
Domain.WHOIS.NameServersString(List<String>) Name servers of the domain.
Domain.WHOIS.CreationDateDateThe date that the domain was created.
Domain.WHOIS.UpdatedDateDateThe date that the domain was last updated.
Domain.WHOIS.ExpirationDateDateThe expiration date of the domain.
Domain.WHOIS.Registrant.NameStringThe name of the registrant.
Domain.WHOIS.Registrant.EmailStringThe email address of the registrant.
Domain.WHOIS.Registrant.PhoneStringThe phone number of the registrant.
Domain.WHOIS.Registrar.NameStringThe name of the registrar.
Domain.WHOIS.Registrar.AbuseEmailStringThe email address of the contact for reporting abuse.
Domain.WHOIS.Registrar.AbusePhoneStringThe phone number of contact for reporting abuse.
Domain.WHOIS.Admin.NameStringThe name of the domain administrator.
Domain.WHOIS.Admin.EmailStringThe email address of the domain administrator.
Domain.WHOIS.Admin.PhoneStringThe phone number of the domain administrator.
Domain.WHOIS/HistoryStringList of Whois objects.
Domain.Malicious.VendorStringThe vendor reporting the domain as malicious.
Domain.Malicious.DescriptionStringA description explaining why the domain was reported as malicious.
Domain.DomainIDNNameStringThe internationalized domain name (IDN) of the domain.
Domain.PortStringPorts that are associated with the domain.
Domain.InternalBoolWhether or not the domain is internal or external.
Domain.CategoryStringThe category associated with the indicator.
Domain.CampaignStringThe campaign associated with the domain.
Domain.TrafficLightProtocolStringThe Traffic Light Protocol (TLP) color that is suitable for the domain.
Domain.ThreatTypes.threatcategoryStringThe threat category associated to this indicator by the source vendor. For example, Phishing, Control, TOR, etc.
Domain.ThreatTypes.threatcategoryconfidenceStringThreat Category Confidence is the confidence level provided by the vendor for the threat type category For example a confidence of 90 for threat type category 'malware' means that the vendor rates that this is 90% confidence of being a malware.
Domain.Geo.LocationStringThe geolocation where the domain address is located, in the format: latitude:longitude.
Domain.Geo.CountryStringThe country in which the domain address is located.
Domain.Geo.DescriptionStringAdditional information about the location.
Domain.Tech.CountryStringThe country of the domain technical contact.
Domain.Tech.NameStringThe name of the domain technical contact.
Domain.Tech.OrganizationStringThe organization of the domain technical contact.
Domain.Tech.EmailStringThe email address of the domain technical contact.
Domain.CommunityNotes.noteStringNotes on the domain that were given by the community.
Domain.CommunityNotes.timestampDateThe time in which the note was published.
Domain.Publications.sourceStringThe source in which the article was published.
Domain.Publications.titleStringThe name of the article.
Domain.Publications.linkStringA link to the original article.
Domain.Publications.timestampDateThe time in which the article was published.
Domain.BillingStringThe billing address of the domain.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.
DBotScore.ReliabilityStringReliability of the source providing the intelligence data.
InfobloxCloud.Domain.Threat.idStringThe unique identifier for the threat indicator.
InfobloxCloud.Domain.Threat.typeStringThe type of threat indicator.
InfobloxCloud.Domain.Threat.domainStringThe domain identified as a threat indicator.
InfobloxCloud.Domain.Threat.profileStringThe threat profile or classification source.
InfobloxCloud.Domain.Threat.propertyStringThe specific property or category of the threat.
InfobloxCloud.Domain.Threat.classStringThe classification of the threat.
InfobloxCloud.Domain.Threat.threat_levelNumberThe numeric threat level score.
InfobloxCloud.Domain.Threat.threat_labelStringThe textual threat level label.
InfobloxCloud.Domain.Threat.expirationDateThe timestamp when the threat indicator will expire.
InfobloxCloud.Domain.Threat.detectedDateThe timestamp when the threat activity was first detected.
InfobloxCloud.Domain.Threat.receivedDateThe timestamp when the threat indicator was received by the system.
InfobloxCloud.Domain.Threat.importedDateThe timestamp when the threat indicator was imported into the system.
InfobloxCloud.Domain.Threat.upStringThe boolean status flag indicating whether the threat indicator is currently active.
InfobloxCloud.Domain.Threat.batch_idStringThe batch ID of the threat indicator.
InfobloxCloud.Domain.Threat.confidenceNumberThe numeric confidence score representing the reliability of the threat indicator.
InfobloxCloud.Domain.Threat.extended.notesStringThe additional notes or information about the threat indicator.
InfobloxCloud.Domain.Threat.threat_scoreNumberThe numeric score representing the calculated threat severity.
InfobloxCloud.Domain.Threat.threat_score_ratingStringThe textual rating of the threat score.
InfobloxCloud.Domain.Threat.threat_score_vectorStringThe vector string representing threat scoring details.
InfobloxCloud.Domain.Threat.risk_scoreNumberThe numeric risk score assigned to the threat indicator.
InfobloxCloud.Domain.Threat.risk_score_ratingStringThe textual rating of the risk score.
InfobloxCloud.Domain.Threat.risk_score_vectorStringThe vector string representing risk scoring details.
InfobloxCloud.Domain.Threat.confidence_scoreNumberThe numeric confidence score for the threat assessment.
InfobloxCloud.Domain.Threat.confidence_score_ratingStringThe textual rating of the confidence score.
InfobloxCloud.Domain.Threat.confidence_score_vectorStringThe vector string representing confidence scoring details.
InfobloxCloud.Domain.Threat.extended.cyberint_guidStringThe unique identifier for the threat indicator.
InfobloxCloud.Domain.Threat.extended.attack_chainStringThe attack chain associated with the threat indicator.
InfobloxCloud.Domain.Threat.extended.extendedStringThe additional information or metadata associated with the threat indicator.
InfobloxCloud.Domain.Threat.extended.protocolStringThe protocol associated with the threat indicator.
InfobloxCloud.Domain.Threat.extended.referencesStringThe references associated with the threat indicator.
InfobloxCloud.Domain.Threat.extended.threat_actorStringThe threat actor associated with the threat indicator.
InfobloxCloud.Domain.Threat.extended.threat_actor_vectorStringThe vector string representing threat actor details.
InfobloxCloud.Domain.Threat.extended.risk_scoreStringThe numeric risk score assigned to the threat indicator.
InfobloxCloud.Domain.Threat.extended.threat_scoreStringThe numeric threat score assigned to the threat indicator.
InfobloxCloud.Domain.Threat.extended.sample_sha256StringThe SHA-256 hash of the sample associated with the threat.
InfobloxCloud.Domain.Threat.extended.original_profileStringThe original profile or classification source of the threat.
InfobloxCloud.Domain.Threat.dgaStringThe domain name generated by a DGA (Domain Generation Algorithm).
InfobloxCloud.Domain.Threat.hostStringThe host name of the domain.
InfobloxCloud.Domain.Threat.tldStringThe top-level domain (TLD) of the threat.
InfobloxCloud.Domain.Address.addresses.addressStringThe address of the IP address.
InfobloxCloud.Domain.Address.addresses.refStringThe reference of the IP address.
InfobloxCloud.Domain.Address.addresses.spaceStringThe space of the IP address.
InfobloxCloud.Domain.Address.auto_generate_recordsBooleanA boolean flag indicating whether auto generate records is enabled for the IP address.
InfobloxCloud.Domain.Address.commentStringThe description for the IPAM host.
InfobloxCloud.Domain.Address.created_atDateTime when the object has been created.
InfobloxCloud.Domain.Address.host_namesUnknownThe name records to be generated for the host.
InfobloxCloud.Domain.Address.idStringThe resource identifier.
InfobloxCloud.Domain.Address.nameStringThe name of the IPAM host.
InfobloxCloud.Domain.Address.host_names.aliasBooleanA boolean flag indicating whether the name record is an alias.
InfobloxCloud.Domain.Address.host_names.nameStringThe name of the host.
InfobloxCloud.Domain.Address.host_names.primary_nameBooleanA boolean flag indicating whether the name record is the primary name.
InfobloxCloud.Domain.Address.host_names.zoneStringThe zone of the host.
InfobloxCloud.Domain.Address.tagsUnknownThe tags associated with the IP address.
InfobloxCloud.Domain.Address.addressesUnknownThe IP address assigned to the resource.

Command example#

!domain domain=test.com

Context Example#

{
"DBotScore": {
"Indicator": "test.com",
"Reliability": "A - Completely reliable",
"Score": 3,
"Type": "domain",
"Vendor": "InfobloxBloxOneThreatDefense"
},
"Domain": {
"Description": "cyber actors, possibly associated with the APT group Agent Serpens, created a fake website mimicking a modeling agency to collect detailed visitor.",
"DetectionEngines": 1,
"Malicious": {
"Description": "cyber actors, possibly associated with the APT group Agent Serpens, created a fake website mimicking a modeling agency to collect detailed visitor.",
"Vendor": "InfobloxThreatDefensewithDDI"
},
"MalwareFamily": "Phishing",
"Name": "test.com",
"Relationships": [
{
"EntityA": "test.com",
"EntityAType": "Domain",
"EntityB": "0.0.0.1",
"EntityBType": "IP",
"Relationship": "resolves-to"
}
],
"Tags": [
"cyberint_guid: simple_cyberint_guid",
"notes: cyber actors, possibly associated with the APT group Agent Serpens, created a fake website mimicking a modeling agency to collect detailed visitor."
],
"ThreatTypes": [
{
"threatcategory": "HOST",
"threatcategoryconfidence": "100"
}
]
},
"InfobloxCloud": {
"Domain": {
"Address": {
"addresses": [
{
"address": "0.0.0.1",
"ref": "ipam/address/00000000-0000-0000-0000-000000000000",
"space": "ipam/ip_space/00000000-0000-0000-0000-000000000000"
}
],
"auto_generate_records": true,
"comment": "comment",
"created_at": "2025-07-22T05:26:46.834693Z",
"host_names": [
{
"alias": false,
"name": "test.com",
"primary_name": true,
"zone": "dns/auth_zone/8ce66502-8d4b-439e-8690-0c59d3122b9f"
}
],
"id": "ipam/host/00000000-0000-0000-0000-000000000000",
"name": "test.com",
"updated_at": "2025-07-22T05:26:57.219235Z"
},
"domain": "test.com",
"Threat": {
"batch_id": "00000000-0000-0000-0000-000000000001",
"class": "Phishing",
"confidence": 100,
"detected": "2025-05-08T16:39:38.959Z",
"dga": "false",
"domain": "test.com",
"expiration": "2025-09-05T16:39:38.959Z",
"extended": {
"cyberint_guid": "simple_cyberint_guid",
"notes": "cyber actors, possibly associated with the APT group Agent Serpens, created a fake website mimicking a modeling agency to collect detailed visitor."
},
"host": "test.com",
"id": "00000000-0000-0000-0000-000000000001",
"imported": "2025-05-08T16:41:37.894Z",
"profile": "IID",
"property": "Phishing_Lookalike",
"received": "2025-05-08T16:41:37.894Z",
"threat_level": 100,
"tld": "com",
"type": "HOST",
"up": "true"
}
}
}
}

Human Readable Output#

Information for the given Bad Domain: test.com#

Threat Intelligence Summary#

Batch IdClassConfidenceDetectedDgaDomainExpirationExtendedHostIdImportedProfilePropertyReceivedThreat LevelTldTypeUp
00000000-0000-0000-0000-000000000001Phishing1002025-05-08T16:39:38.959Zfalsetest.com2025-09-05T16:39:38.959Zcyberint_guid: simple_cyberint_guid
notes: cyber actors, possibly associated with the APT group Agent Serpens, created a fake website mimicking a modeling agency to collect detailed visitor.
test.com00000000-0000-0000-0000-0000000000012025-05-08T16:41:37.894ZIIDPhishing_Lookalike2025-05-08T16:41:37.894Z100comHOSTtrue

Address Information#

AddressesAuto Generate RecordsCommentCreated AtHost NamesIdNameUpdated At
- address: 0.0.0.1
ref: ipam/address/00000000-0000-0000-0000-000000000000
space: ipam/ip_space/00000000-0000-0000-0000-000000000000
Truecomment2025-07-22T05:26:46.834693Z- alias: False
name: test.com
primary_name: True
zone: dns/auth_zone/8ce66502-8d4b-439e-8690-0c59d3122b9f
ipam/host/00000000-0000-0000-0000-000000000000test.com2025-07-22T05:26:57.219235Z

url#


Gets the comprehensive URL reputation and threat intelligence from Infoblox Threat Defense, including threat indicators, and standard URL reputation data.

Base Command#

url

Input#

Argument NameDescriptionRequired
urlURL(s) for which to retrieve reputation and threat intelligence. Supports comma-separated values.Required

Context Output#

PathTypeDescription
InfobloxCloud.URL.urlStringThe requested URL.
URL.DataStringThe URL.
URL.Relationships.EntityAstringThe source of the relationship.
URL.Relationships.EntityBstringThe destination of the relationship.
URL.Relationships.RelationshipstringThe name of the relationship.
URL.Relationships.EntityATypestringThe type of the source of the relationship.
URL.Relationships.EntityBTypestringThe type of the destination of the relationship.
URL.DetectionEnginesStringThe total number of engines that checked the indicator.
URL.PositiveDetectionsStringThe number of engines that positively detected the indicator as malicious.
URL.CategoryStringThe category associated with the indicator.
URL.Malicious.VendorStringThe vendor reporting the URL as malicious.
URL.Malicious.DescriptionStringA description of the malicious URL.
URL.TagsUnknown(List) Tags of the URL.
URL.FeedRelatedIndicators.valueStringIndicators that are associated with the URL.
URL.FeedRelatedIndicators.typeStringThe type of the indicators that are associated with the URL.
URL.FeedRelatedIndicators.descriptionStringThe description of the indicators that are associated with the URL.
URL.MalwareFamilyStringThe malware family associated with the URL.
URL.PortStringPorts that are associated with the URL.
URL.InternalBoolWhether or not the URL is internal or external.
URL.CampaignStringThe campaign associated with the URL.
URL.TrafficLightProtocolStringThe Traffic Light Protocol (TLP) color that is suitable for the URL.
URL.ThreatTypes.threatcategoryStringThe threat category associated to this indicator by the source vendor. For example, Phishing, Control, TOR, etc.
URL.ThreatTypes.threatcategoryconfidenceStringThreat Category Confidence is the confidence level provided by the vendor for the threat type category For example a confidence of 90 for threat type category 'malware' means that the vendor rates that this is 90% confidence of being a malware.
URL.ASNStringThe autonomous system name for the URL, for example: 'AS8948'.
URL.ASOwnerStringThe autonomous system owner of the URL.
URL.GeoCountryStringThe country in which the URL is located.
URL.OrganizationStringThe organization of the URL.
URL.CommunityNotes.noteStringNotes on the URL that were given by the community.
URL.CommunityNotes.timestampDateThe time in which the note was published.
URL.Publications.sourceStringThe source in which the article was published.
URL.Publications.titleStringThe name of the article.
URL.Publications.linkStringA link to the original article.
URL.Publications.timestampDateThe time in which the article was published.
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.
DBotScore.ReliabilityStringReliability of the source providing the intelligence data.
InfobloxCloud.URL.Threat.idStringThe unique identifier for the threat indicator.
InfobloxCloud.URL.Threat.typeStringThe type of threat indicator.
InfobloxCloud.URL.Threat.urlStringThe URL identified as a threat indicator.
InfobloxCloud.URL.Threat.profileStringThe threat profile or classification source.
InfobloxCloud.URL.Threat.propertyStringThe specific property or category of the threat.
InfobloxCloud.URL.Threat.classStringThe classification of the threat.
InfobloxCloud.URL.Threat.threat_levelNumberThe numeric threat level score.
InfobloxCloud.URL.Threat.threat_labelStringThe textual threat level label.
InfobloxCloud.URL.Threat.expirationDateThe timestamp when the threat indicator will expire.
InfobloxCloud.URL.Threat.detectedDateThe timestamp when the threat activity was first detected.
InfobloxCloud.URL.Threat.receivedDateThe timestamp when the threat indicator was received by the system.
InfobloxCloud.URL.Threat.importedDateThe timestamp when the threat indicator was imported into the system.
InfobloxCloud.URL.Threat.upStringThe boolean status flag indicating whether the threat indicator is currently active.
InfobloxCloud.URL.Threat.batch_idStringThe batch ID of the threat indicator.
InfobloxCloud.URL.Threat.confidenceNumberThe numeric confidence score representing the reliability of the threat indicator.
InfobloxCloud.URL.Threat.extended.notesStringThe additional notes or information about the threat indicator.
InfobloxCloud.URL.Threat.threat_scoreNumberThe numeric score representing the calculated threat severity.
InfobloxCloud.URL.Threat.threat_score_ratingStringThe textual rating of the threat score.
InfobloxCloud.URL.Threat.threat_score_vectorStringThe vector string representing threat scoring details.
InfobloxCloud.URL.Threat.risk_scoreNumberThe numeric risk score assigned to the threat indicator.
InfobloxCloud.URL.Threat.risk_score_ratingStringThe textual rating of the risk score.
InfobloxCloud.URL.Threat.risk_score_vectorStringThe vector string representing risk scoring details.
InfobloxCloud.URL.Threat.confidence_scoreNumberThe numeric confidence score for the threat assessment.
InfobloxCloud.URL.Threat.confidence_score_ratingStringThe textual rating of the confidence score.
InfobloxCloud.URL.Threat.confidence_score_vectorStringThe vector string representing confidence scoring details.
InfobloxCloud.URL.Threat.extended.cyberint_guidStringThe unique identifier for the threat indicator.
InfobloxCloud.URL.Threat.extended.attack_chainStringThe attack chain associated with the threat indicator.
InfobloxCloud.URL.Threat.extended.extendedStringThe additional information or metadata associated with the threat indicator.
InfobloxCloud.URL.Threat.extended.protocolStringThe protocol associated with the threat indicator.
InfobloxCloud.URL.Threat.extended.referencesStringThe references associated with the threat indicator.
InfobloxCloud.URL.Threat.extended.threat_actorStringThe threat actor associated with the threat indicator.
InfobloxCloud.URL.Threat.extended.threat_actor_vectorStringThe vector string representing threat actor details.
InfobloxCloud.URL.Threat.extended.risk_scoreStringThe numeric risk score assigned to the threat indicator.
InfobloxCloud.URL.Threat.extended.threat_scoreStringThe numeric threat score assigned to the threat indicator.
InfobloxCloud.URL.Threat.extended.sample_sha256StringThe SHA-256 hash of the sample associated with the threat.
InfobloxCloud.URL.Threat.extended.original_profileStringThe original profile or classification source of the threat.

Command example#

!url url=https://test.com

Context Example#

{
"DBotScore": {
"Indicator": "https://test.com",
"Reliability": "A - Completely reliable",
"Score": 3,
"Type": "url",
"Vendor": "InfobloxBloxOneThreatDefense"
},
"InfobloxCloud": {
"URL": {
"Threat": {
"id": "00000000-0000-0000-0000-000000000001",
"type": "URL",
"host": "test.com",
"url": "https://test.com",
"domain": "test.com",
"tld": "com",
"profile": "IID",
"property": "Scam_Generic",
"class": "Scam",
"threat_level": 100,
"expiration": "2025-10-05T12:12:00.22Z",
"detected": "2025-06-07T12:12:00.22Z",
"received": "2025-06-07T12:16:32.337Z",
"imported": "2025-06-07T12:16:32.337Z",
"up": "true",
"confidence": 100,
"batch_id": "00000000-0000-0000-0000-000000000000",
"extended": {
"cyberint_guid": "simple_cyberint_guid",
"notes": "Scam advertised. Lures victims to put their money into fake investments.",
"protocol": "https",
"references": "https://test.com"
}
},
"url": "https://test.com"
}
},
"URL": {
"Data": "https://test.com",
"Description": "Scam advertised. Lures victims to put their money into fake investments.",
"DetectionEngines": 1,
"Malicious": {
"Description": "Scam advertised. Lures victims to put their money into fake investments.",
"Vendor": "InfobloxThreatDefensewithDDI"
},
"MalwareFamily": "Scam",
"Tags": [
"cyberint_guid: simple_cyberint_guid",
"notes: Scam advertised. Lures victims to put their money into fake investments.",
"protocol: https",
"references: https://test.com"
],
"ThreatTypes": [
{
"threatcategory": "URL",
"threatcategoryconfidence": "100"
}
]
}
}

Human Readable Output#

Information for the given Bad URL: https://test.com#

Threat Intelligence Summary#

Batch IdClassConfidenceDetectedDomainExpirationExtendedHostIdImportedProfilePropertyReceivedThreat LevelTldTypeUpURL
00000000-0000-0000-0000-000000000000Scam1002025-06-07T12:12:00.22Ztest.com2025-10-05T12:12:00.22Zcyberint_guid: simple_cyberint_guid
notes: Scam advertised. Lures victims to put their money into fake investments.
protocol: https
references: https://test.com
test.com00000000-0000-0000-0000-0000000000012025-06-07T12:16:32.337ZIIDScam_Generic2025-06-07T12:16:32.337Z100comURLtruehttps://test.com

infobloxcloud-mac-enrich#


Enrich a MAC address with DHCP lease information.

Base Command#

infobloxcloud-mac-enrich

Input#

Argument NameDescriptionRequired
macSpecify the MAC Address to enrich.Required

Context Output#

PathTypeDescription
InfobloxCloud.DHCPLease.addressStringThe IP address assigned in the DHCP lease.
InfobloxCloud.DHCPLease.client_idStringThe identifier of the DHCP client.
InfobloxCloud.DHCPLease.endsStringThe timestamp indicating when the DHCP lease ends.
InfobloxCloud.DHCPLease.fingerprintStringThe DHCP client fingerprint, indicating device type or OS.
InfobloxCloud.DHCPLease.fingerprint_processedStringThe processed fingerprint result, if available.
InfobloxCloud.DHCPLease.ha_groupUnknownThe high-availability group associated with the lease, if any.
InfobloxCloud.DHCPLease.hardwareStringThe hardware (MAC) address of the DHCP client.
InfobloxCloud.DHCPLease.hostStringThe reference or identifier for the host associated with this lease.
InfobloxCloud.DHCPLease.hostnameStringThe hostname provided by the DHCP client.
InfobloxCloud.DHCPLease.iaidNumberThe Identity Association Identifier (IAID) for the DHCP lease.
InfobloxCloud.DHCPLease.last_updatedStringThe timestamp when the lease was last updated.
InfobloxCloud.DHCPLease.optionsStringThe encoded DHCP options provided with the lease.
InfobloxCloud.DHCPLease.preferred_lifetimeStringThe preferred lifetime of the lease.
InfobloxCloud.DHCPLease.protocolStringThe protocol used for the lease.
InfobloxCloud.DHCPLease.spaceStringThe identifier for the IP space to which this lease belongs.
InfobloxCloud.DHCPLease.startsStringThe timestamp indicating when the DHCP lease started.
InfobloxCloud.DHCPLease.stateStringThe current state of the lease.
InfobloxCloud.DHCPLease.typeStringThe type of DHCP lease.

Command example#

!infobloxcloud-mac-enrich mac="00:00:00:00:00:01"

Context Example#

{
"InfobloxCloud": {
"DHCPLease": {
"address": "0.0.0.1",
"client_id": "01:00:00:00:00:00:01",
"ends": "2025-07-01T19:25:24Z",
"fingerprint": "VMware:Virtual Machine:Windows:",
"fingerprint_processed": "processed",
"hardware": "00:00:00:00:00:01",
"host": "dhcp/host/123456",
"hostname": "test-host01",
"iaid": 0,
"last_updated": "2025-07-01T18:25:24.792Z",
"options": "{\"Options\":[{\"Code\":\"57\",\"Value\":\"test\"},{\"Code\":\"61\",\"Value\":\"sample\"},{\"Code\":\"53\",\"Value\":\"world\"},{\"Code\":\"55\",\"Value\":\"bar\"}]}",
"preferred_lifetime": "2025-07-01T18:25:24Z",
"protocol": "",
"space": "ipam/ip_space/12345678-1234-1234-1234-123456789012",
"starts": "2025-07-01T18:25:24Z",
"state": "used",
"type": "DHCPv4"
}
}
}

Human Readable Output#

DHCP Lease Information for MAC: 00:00:00:00:00:01#

AddressClient IdEndsFingerprintFingerprint ProcessedHardwareHostHostnameIaidLast UpdatedOptionsPreferred LifetimeSpaceStartsStateType
0.0.0.101:00:00:00:00:00:012025-07-01T19:25:24ZVMware:Virtual Machine:Windows:processed00:00:00:00:00:01dhcp/host/123456test-host0102025-07-01T18:25:24.792Z- Code: 57
Value: test
- Code: 61
Value: sample
- Code: 53
Value: world
- Code: 55
Value: bar
2025-07-01T18:25:24Zipam/ip_space/12345678-1234-1234-1234-1234567890122025-07-01T18:25:24ZusedDHCPv4

infobloxcloud-soc-insight-list#


List SOC Insights from Infoblox Cloud.

Base Command#

infobloxcloud-soc-insight-list

Input#

Argument NameDescriptionRequired
statusSpecify the status of SOC Insights to fetch. Possible values are: Active, Closed.Optional
threat_typeSpecify the threat type of SOC Insights to fetch. Possible values are: DGA, Undefined, Malicious, Open Resolver, Phishing, DNS Tunneling, MalwareDownload, Sinkhole, Zero Day DNS, Notional Data Exfiltration, MalwareC2DGA, MalwareC2, Restricted Country Communications, Suspicious, CompromisedHost, CompromisedDomain, Lookalike Threat, Sanctioned Feed Disabled, DNSTunnel.Optional
prioritySpecify the priority level of SOC Insights to fetch. Possible values are: INFO, MEDIUM, HIGH, CRITICAL.Optional

Context Output#

PathTypeDescription
InfobloxCloud.SOCInsight.insightIdStringThe ID of the SOC Insight.
InfobloxCloud.SOCInsight.priorityTextStringThe priority level of the SOC Insight.
InfobloxCloud.SOCInsight.tClassStringThe threat class of the SOC Insight.
InfobloxCloud.SOCInsight.tFamilyStringThe threat family of the SOC Insight.
InfobloxCloud.SOCInsight.startedAtStringThe start time of the SOC Insight.
InfobloxCloud.SOCInsight.statusStringThe status of the SOC Insight.
InfobloxCloud.SOCInsight.persistentDateStringTimestamp when the threat was first observed as persistent.
InfobloxCloud.SOCInsight.spreadingDateStringTimestamp when the threat was first observed as spreading.
InfobloxCloud.SOCInsight.dateChangedStringTimestamp when the SOC Insight was last updated.
InfobloxCloud.SOCInsight.changerStringThe user or process that last changed the SOC Insight status or data.
InfobloxCloud.SOCInsight.feedSourceStringThe source feed or provider of the SOC Insight.
InfobloxCloud.SOCInsight.threatTypeStringThe threat type of the SOC Insight.
InfobloxCloud.SOCInsight.numEventsStringThe number of events associated with the SOC Insight.
InfobloxCloud.SOCInsight.eventsNotBlockedCountStringThe number of events not blocked by the SOC Insight.
InfobloxCloud.SOCInsight.mostRecentAtStringThe most recent time the SOC Insight was updated.

Command example#

!infobloxcloud-soc-insight-list

Context Example#

{
"InfobloxCloud": {
"SOCInsight": [
{
"changer": "abc@xyz.com",
"dateChanged": "2025-05-21T00:54:49.407214Z",
"eventsBlockedCount": "3",
"feedSource": "Insight Detection Framework",
"insightId": "00000000-0000-0000-0000-000000000000",
"mostRecentAt": "2025-07-19T19:25:11.723397Z",
"numEvents": "3",
"persistentDate": "2025-04-14T07:00:00Z",
"priorityText": "HIGH",
"spreadingDate": "2025-05-10T19:00:00Z",
"startedAt": "2025-04-14T07:00:00Z",
"status": "Active",
"tClass": "Suspicious",
"tFamily": "EmergentDomain",
"threatType": "Suspicious"
},
{
"tClass": "TI-RESTRICTED",
"tFamily": "OFAC",
"insightId": "00000000-0000-0000-0000-000000000001",
"feedSource": "Insight Detection Framework",
"startedAt": "2025-04-12T18:00:00Z",
"threatType": "Sanctioned Feed Disabled",
"status": "Active",
"persistentDate": "2025-04-12T15:00:00Z",
"numEvents": "246",
"mostRecentAt": "2025-08-07T23:59:19Z",
"eventsNotBlockedCount": "246",
"changer": "abc@xyz.com",
"dateChanged": "2025-08-06T13:58:01.050800Z",
"priorityText": "INFO"
}
]
}
}

Human Readable Output#

SOC Insights#

IDPriorityClassThreat TypeStatusThreat FamilyFeed SourceMost Recent At
00000000-0000-0000-0000-000000000000HIGHSuspiciousSuspiciousActiveEmergentDomainInsight Detection Framework2025-07-19T19:25:11.723397Z
00000000-0000-0000-0000-000000000001INFOTI-RESTRICTEDSanctioned Feed DisabledActiveOFACInsight Detection Framework2025-08-07T23:59:19Z

infobloxcloud-soc-insight-event-list#


List events for a specific SOC Insight.

Base Command#

infobloxcloud-soc-insight-event-list

Input#

Argument NameDescriptionRequired
soc_insight_idSpecify the SOC Insight ID to fetch events for.Required
limitSpecify the maximum number of events to fetch. Default is 50.Optional
start_timeSpecify the start time for the events.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
end_timeSpecify the end time for the events.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
threat_levelSpecify the threat level of the events. Possible values are: High, Medium, Low, Info.Optional
confidence_levelSpecify the confidence level of the events. Possible values are: High, Medium, Low, Info.Optional
querySpecify the query to search for events.Optional
query_typeSpecify the query type to search for events. Possible values are: A, AAAA, ANY, TXT, RRSIG, CNAME, MX, NS, PTR, SOA, SRV.Optional
sourceSpecify the source of the events.Optional
device_ipSpecify the device IP of the events.Optional
indicatorSpecify the indicator of the events.Optional

Context Output#

PathTypeDescription
InfobloxCloud.Event.confidenceLevelStringThe confidence level of the threat detection.
InfobloxCloud.Event.deviceCountryStringThe country where the device is located.
InfobloxCloud.Event.deviceNameStringThe name or identifier of the device.
InfobloxCloud.Event.deviceRegionStringThe region where the device is located.
InfobloxCloud.Event.dnsViewStringThe DNS view used for the query.
InfobloxCloud.Event.feedStringThe feed that identified the threat.
InfobloxCloud.Event.sourceStringThe source of the threat detection.
InfobloxCloud.Event.actionStringThe action taken on the detected threat.
InfobloxCloud.Event.policyStringThe policy applied to the detection.
InfobloxCloud.Event.deviceIpStringThe IP address of the device.
InfobloxCloud.Event.queryStringThe DNS query that triggered the detection.
InfobloxCloud.Event.queryTypeStringThe type of DNS query.
InfobloxCloud.Event.responseStringThe DNS response for the query.
InfobloxCloud.Event.classStringThe classification of the threat.
InfobloxCloud.Event.threatFamilyStringThe family of the threat.
InfobloxCloud.Event.threatIndicatorStringThe indicator of the threat.
InfobloxCloud.Event.detectedStringThe timestamp when the event was detected.
InfobloxCloud.Event.propertyStringThe property of the event.
InfobloxCloud.Event.userStringThe user associated with the detection.
InfobloxCloud.Event.threatLevelStringThe severity level of the event.

Command example#

!infobloxcloud-soc-insight-event-list soc_insight_id="00000000-0000-0000-0000-000000000000"

Context Example#

{
"InfobloxCloud": {
"Event": [
{
"action": "Allow - No Log",
"class": "TI-CONFIGURATIONISSUE",
"confidenceLevel": "High",
"detected": "2025-08-11 23:42:04 +0000 UTC",
"deviceIp": "0.0.0.0",
"deviceName": "0.0.0.0",
"policy": "DoH",
"property": "example.com",
"query": "example.com",
"queryType": "A",
"source": "unknown",
"threatFamily": "OPENRESOLVER",
"threatLevel": "Low",
"user": "unknown"
},
{
"action": "Block",
"class": "Suspicious",
"confidenceLevel": "High",
"detected": "2025-07-16 07:37:29 +0000 UTC",
"deviceIp": "0.0.0.1",
"deviceName": "0.0.0.1",
"policy": "Default Policy",
"property": "EmergentDomain",
"query": "example.org",
"queryType": "RRSIG",
"source": "Endpoint",
"threatFamily": "EmergentDomain",
"threatLevel": "High",
"user": "unknown"
}
]
}
}

Human Readable Output#

Events for the given SOC Insight: 00000000-0000-0000-0000-000000000000#

Confidence LevelThreat LevelThreat FamilyActionClassDetected
HighLowOPENRESOLVERAllow - No LogTI-CONFIGURATIONISSUE2025-08-11 23:42:04 +0000 UTC
HighHighEmergentDomainBlockSuspicious2025-07-16 07:37:29 +0000 UTC

infobloxcloud-soc-insight-indicator-list#


List indicators for a specific SOC Insight.

Base Command#

infobloxcloud-soc-insight-indicator-list

Input#

Argument NameDescriptionRequired
soc_insight_idSpecify the SOC Insight ID to fetch indicators for.Required
limitSpecify the maximum number of indicators to fetch. Default is 50.Optional
start_timeSpecify the start time for the indicators.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
end_timeSpecify the end time for the indicators.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
confidenceSpecify the confidence of the indicators. Possible values are: 1, 2, 3.Optional
indicatorSpecify the indicator of the indicators.Optional
actionSpecify the action of the indicators. Possible values are: Blocked, Not Blocked.Optional
actorSpecify the actor of the indicators.Optional

Context Output#

PathTypeDescription
InfobloxCloud.Indicator.actionStringThe action taken for the indicator.
InfobloxCloud.Indicator.confidenceStringThe confidence level of the indicator.
InfobloxCloud.Indicator.countNumberThe number of occurrences of the indicator.
InfobloxCloud.Indicator.feedNameStringThe feed name that identified the indicator.
InfobloxCloud.Indicator.threatLevelMaxStringThe maximum threat level associated with the indicator.
InfobloxCloud.Indicator.indicatorStringThe value of the indicator.
InfobloxCloud.Indicator.timeMaxDateThe latest time the indicator was observed.
InfobloxCloud.Indicator.timeMinDateThe earliest time the indicator was observed.

Command example#

!infobloxcloud-soc-insight-indicator-list soc_insight_id="00000000-0000-0000-0000-000000000000"

Context Example#

{
"InfobloxCloud": {
"Indicator": [
{
"action": "Not Blocked",
"confidence": "3",
"count": 189,
"indicator": "example.org",
"threatLevelMax": "1",
"timeMax": "2025-08-11T23:00:00.000",
"timeMin": "2025-07-13T15:00:00.000"
},
{
"action": "Blocked",
"confidence": "1",
"count": 5,
"indicator": "example.com",
"threatLevelMax": "3",
"timeMax": "2025-08-11T12:00:00.000",
"timeMin": "2025-07-14T10:00:00.000"
}
]
}
}

Human Readable Output#

Indicators for the given SOC Insight: 00000000-0000-0000-0000-000000000000#

ActionConfidenceMax Threat LevelIndicatorCountMax TimeMin Time
Not Blocked31example.org1892025-08-11T23:00:00.0002025-07-13T15:00:00.000
Blocked13example.com52025-08-11T12:00:00.0002025-07-14T10:00:00.000

infobloxcloud-soc-insight-asset-list#


List assets for a specific SOC Insight.

Base Command#

infobloxcloud-soc-insight-asset-list

Input#

Argument NameDescriptionRequired
soc_insight_idSpecify the SOC Insight ID to fetch assets for.Required
limitSpecify the maximum number of assets to fetch. Default is 50.Optional
start_timeSpecify the start time for the assets.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
end_timeSpecify the end time for the assets.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
qipSpecify the IP address of the assets.Optional
cmacSpecify the MAC address of the assets.Optional
os_versionSpecify the OS version of the assets.Optional
userSpecify the user of the assets.Optional

Context Output#

PathTypeDescription
InfobloxCloud.Asset.countNumberThe number of occurrences associated with the asset.
InfobloxCloud.Asset.qipStringThe IP address of the asset.
InfobloxCloud.Asset.locationStringThe geographical location of the asset.
InfobloxCloud.Asset.threatLevelMaxStringThe maximum threat level associated with the asset.
InfobloxCloud.Asset.threatIndicatorDistinctCountStringThe number of distinct threat indicators associated with the asset.
InfobloxCloud.Asset.timeMaxDateThe latest time the asset was observed.
InfobloxCloud.Asset.timeMinDateThe earliest time the asset was observed.
InfobloxCloud.Asset.mostRecentActionStringThe most recent action taken for the asset.

Command example#

!infobloxcloud-soc-insight-asset-list soc_insight_id="00000000-0000-0000-0000-000000000000"

Context Example#

{
"InfobloxCloud": {
"Asset": [
{
"count": 5,
"location": "Leidschendam,Netherlands",
"mostRecentAction": "Not Blocked",
"qip": "0.0.0.0",
"threatIndicatorDistinctCount": "1",
"threatLevelMax": "1",
"timeMax": "2025-08-11T12:00:00.000",
"timeMin": "2025-07-14T10:00:00.000"
},
{
"count": 1,
"location": "Minneapolis,United States",
"mostRecentAction": "Not Blocked",
"qip": "0.0.0.1",
"threatIndicatorDistinctCount": "1",
"threatLevelMax": "1",
"timeMax": "2025-08-07T12:00:00.000",
"timeMin": "2025-08-07T12:00:00.000"
}
]
}
}

Human Readable Output#

Assets for the given SOC Insight: 00000000-0000-0000-0000-000000000000#

CountQIPMax Threat LevelLocationThreat Indicator Distinct CountTime MaxTime MinMost Recent Action
50.0.0.01Leidschendam,Netherlands12025-08-11T12:00:00.0002025-07-14T10:00:00.000Not Blocked
10.0.0.11Minneapolis,United States12025-08-07T12:00:00.0002025-08-07T12:00:00.000Not Blocked

infobloxcloud-soc-insight-comment-list#


List comments for a specific SOC Insight.

Base Command#

infobloxcloud-soc-insight-comment-list

Input#

Argument NameDescriptionRequired
soc_insight_idSpecify the SOC Insight ID to fetch comments for.Required
start_timeSpecify the start time for the comments.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
end_timeSpecify the end time for the comments.

Format: YYYY-MM-DDTHH:MM:SSZ, YYYY-MM-DD, N days, N hours.

Example: 2025-04-25T00:00:00Z, 2025-04-25, 2 days, 5 hours, 01 Mar 2025, 01 Feb 2025 04:45:33, 15 Jun.
Optional
limitSpecify the maximum number of comments to fetch. Default is 50.Optional

Context Output#

PathTypeDescription
InfobloxCloud.Comment.commentsChangerStringThe user who created or changed the comment.
InfobloxCloud.Comment.dateChangedDateThe timestamp when the comment was created or modified.
InfobloxCloud.Comment.statusStringThe status associated with the comment.
InfobloxCloud.Comment.newCommentStringThe comment text.

Command example#

!infobloxcloud-soc-insight-comment-list soc_insight_id="00000000-0000-0000-0000-000000000000"

Context Example#

{
"InfobloxCloud": {
"Comment": [
{
"commentsChanger": "abc.zyx.com",
"dateChanged": "2025-08-02T08:39:43.675",
"newComment": "\nAsset IP: 0.0.0.0\nScan ID: None\nReference ID: None\nQualys Scan Report URL: https://example.com/fo/report/report_view.php?&id=None\n",
"status": "Active"
},
{
"commentsChanger": "abc.zyx.com",
"dateChanged": "2025-07-15T05:24:29.803",
"newComment": "\nAsset IP: 0.0.0.0\nScan ID: None\nReference ID: None\nQualys Scan Report URL: https://example.com/fo/report/report_view.php?&id=None\n",
"status": "Active"
}
]
}
}

Human Readable Output#

Comments for the given SOC Insight: 00000000-0000-0000-0000-000000000000#

Comment ChangerDate ChangedStatusComment
abc.zyx.com2025-08-02T08:39:43.675Active
Asset IP: 0.0.0.0
Scan ID: None
Reference ID: None
Qualys Scan Report URL: https://example.com/fo/report/report_view.php?&id=None
abc.zyx.com2025-07-15T05:24:29.803Active
Asset IP: 0.0.0.0
Scan ID: None
Reference ID: None
Qualys Scan Report URL: https://example.com/fo/report/report_view.php?&id=None