Skip to main content

Qintel QSentry

This Integration is part of the Qintel Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

QSentry queries help measure the likelihood that a user is masking their identity using publicly or privately available proxy or VPN services. The returns also flag any known fraud associations. QSentry aggregates data from Qintel’s proprietary Deep and DarkWeb research, as well as from commercially available anonymization services. This integration was integrated and tested with version 4.0 of Qintel QSentry

Configure QintelQSentry on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for QintelQSentry.

  3. Click Add instance to create and configure a new integration instance.

    ParameterRequired
    QSentry API URL (optional)False
    Qintel TokenTrue
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

ip#


Queries Qintel for IP reputation data

Base Command#

ip

Input#

Argument NameDescriptionRequired
ipList of IPs.Required

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested
DBotScore.TypeStringThe indicator type
DBotScore.VendorStringThe vendor used to calculate the score
DBotScore.ScoreNumberThe actual score
IP.AddressstringIP address
IP.ASNstringThe autonomous system name for the IP address
IP.ASOwnerstringThe autonomous system name for the IP address
IP.Malicious.VendorstringThe vendor reporting the IP address as malicious
IP.Malicious.DescriptionstringA description explaining why the IP address was reported as malicious
Qintel.IP.AddressbooleanIP address
Qintel.IP.TagsstringProxy tags
Qintel.IP.DescriptionstringIP description
Qintel.IP.LastObservedstringLast observed time

Command Example#

!ip ip=192.168.35.100

Context Example#

{
"DBotScore": {
"Indicator": "192.168.35.100",
"Score": 2,
"Type": "ip",
"Vendor": "Qintel"
},
"IP": {
"ASN": 65000,
"ASOwner": "Some Service Provider",
"Address": "192.168.35.100",
"Malicious": {
"Description": "Indicator is associated with a criminal proxy/vpn",
"Vendor": "Qintel"
},
"Tags": [
"Proxy",
"Vpn"
]
},
"Qintel": {
"IP": {
"Address": "192.168.35.100",
"Description": [
"this ip address has been associated with a vpn network that offers paid access to users. it is advertised in online underground spaces.",
"This ip address has been associated with a proxy network that offers paid access to users and is advertised within the online underground. it is commonly utilized by criminal actors to conduct compromised credential checking and the proxy network is hosted on a botnet infrastructure. ip address is likely an infected machine."
],
"LastObserved": "2021-08-31 11:00:00",
"Tags": [
"Proxy",
"Vpn"
]
}
}
}

Human Readable Output#

Qintel results for IP: 192.168.35.100#

ASNAS OwnerTagsDescriptionLast Observed
65000Some Service Provider
Proxy,
Vpn
This ip address has been associated with a vpn network that offers paid access to users. it is advertised in online underground spaces.,
This ip address has been associated with a proxy network that offers paid access to users and is advertised within the online underground. it is commonly utilized by criminal actors to conduct compromised credential checking and the proxy network is hosted on a botnet infrastructure. ip address is likely an infected machine.
2021-08-31 11:00:00