Getting Started

Next

Welcome to Silent Push, the industry-leading platform for preemptive threat intelligence and proactive cyber defense. This guide serves as your roadmap to getting started with Silent Push, outlining essential steps to ensure a seamless deployment and implementation of our powerful security capabilities. Whether you’re using the Enterprise or Community Edition, this guide will help you harness Silent Push’s Indicators of Future Attack (IOFA™), advanced queries, and integrations to stay ahead of emerging threats.

Get to know Silent Push

Before diving into setup, familiarize yourself with Silent Push’s cutting-edge threat intelligence platform. Our mission is to empower organizations to proactively combat attacker infrastructure before it’s weaponized, using first-party data from daily scans of the entire IPv4 and IPv6 space.

Explore the sections below to understand our core capabilities:

What is Silent Push?—Silent Push is an enterprise-grade threat intelligence and hunting solution that generates actionable insights through Indicators of Future Attack (IOFA™). These predictive indicators reveal adversary infrastructure during reconnaissance and weaponization phases, enabling preemptive defense.

IOFA™ Feeds—Access curated feeds of pre-weaponized domains, IPs, and URLs, enriched with behavioral fingerprints of attacker tactics, techniques, and procedures (TTPs).

Web Scanner & Live Scanner—Query historical and real-time data to hunt for malicious websites, track infrastructure movement, and analyze redirects across 100+ parameters.

Community Edition—A free tool for security teams, researchers, and bug bounty hunters, offering basic and advanced DNS queries to interrogate Silent Push’s database.

Your Silent Push Support Team—Our dedicated team is available to assist with onboarding, demos, and tailored use cases. Contact us at integrations@silentpush.com or join a webinar for hands-on guidance.

Create a community account

It is easy to register for our Community edition.

  1. Go to Silent Push.

  2. Click Register for Community Edition on the top-right of the toolbar.

  3. Click Sign Up.

  4. Enter your particulars, and click Register.

  5. A confirmation email will be sent to your email.

  6. Go to the confirmation email and click on Set Password (the link is valid for 72 hours).

  7. Create a new password, and click Done.

To upgrade your subscription:

  1. Click on your user name in the top right of the toolbar, and choose Subscription.

  2. Click Explore Plans.

  3. Choose Professional or Enterprise.
    If you choose Enterprise, we will contact you for further details.

Configure access to Silent Push

Setting up access to Silent Push is quick and secure, ensuring your team can start leveraging the platform immediately. Follow these steps to configure access effectively:

Complete Your Organization Profile—Log in to app.silentpush.com and update your organization settings with relevant details to customize your experience.

Invite Users to Silent Push—Add team members via the Organization Settings panel. Assign roles such as administrative or standard users to control access levels.

Set Up Two-Factor Authentication (2FA)—Enable 2FA for enhanced security. Navigate to the account settings, activate 2FA, and save recovery codes or link a mobile authenticator app.

Generate API Keys—Administrative users can create API keys in the Organization Settings to enable integrations and automate workflows. Ensure proper permissions are set to avoid empty API responses.

Integrate with Silent Push

Integrate Silent Push with your existing security stack to enhance threat detection and response. Our platform supports seamless connections with SIEM, SOAR, and TIP systems, delivering enriched IOFA™ data and risk scoring.

Review Supported Integrations—Silent Push integrates with leading platforms like Splunk, ThreatConnect, and more. Explore our integrations page for a full list.

Connect to SIEM/SOAR Platforms—Use the Silent Push API to feed enriched threat data into your SIEM or SOAR for real-time correlation and automation. For example, the Splunk App correlates IOFA™ feeds with your logs to generate notable events.

Integrate with the Chrome Extension—Install the Silent Push Chrome Extension to scan, extract, and analyze DNS data (URLs, domains, IPs) directly from your browser, with instant risk scores and feed integration.

Add Third-Party Data Sources—Enhance Silent Push’s first-party data with open-source intelligence (OSINT) via 100+ API endpoints for domains, IPs, ASNs, and URLs.

Take action with Silent Push

Silent Push empowers your team to hunt and neutralize threats proactively. Use our platform’s robust query capabilities, feeds, and monitoring to stay ahead of adversaries.

Run Web Scanner Queries—Execute queries using SPQL (Silent Push Query Language) to hunt for malicious websites impersonating your brand or track attacker infrastructure across historical datasets.

Leverage IOFA™ Feeds—Ingest curated IOFA™ feeds to identify pre-weaponized infrastructure and automate detection workflows tailored to your organization’s needs.

Perform Domain and IP Enrichment—Enrich observables (domains, IPs, URLs) with over 70 attributes, including WHOIS data, DNS records, risk scores, and certificate details, to gain comprehensive threat context.

Set Up Monitoring—Save queries to monitor changes in datasets daily, with updates delivered via email. Share monitored queries across your team to streamline threat tracking.

Optimize your Silent Push experience

Maximize the value of Silent Push by engaging with advanced features and proactive workflows to enhance your threat intelligence operations.

Explore Advanced Queries—Use the Web Scanner to pivot across results and uncover hidden attack vectors, such as cousin domains or redirect chains, to map out the full threat landscape.

Review Risk and Reputation Scores—Analyze Silent Push Risk Scores for domains, IPs, and nameservers to prioritize high-risk indicators and improve blocking mechanisms.

Engage with Live Scanner—Initiate on-demand scans of live URLs to view real-time metadata, screenshots, and 90+ data categories, enhancing your ability to assess active threats.

Participate in Webinars and Workshops—Join Silent Push webinars or workshops, like “Hunting Meduza Stealer with Silent Push Web Scanner,” to learn advanced threat-hunting techniques and preview new features.

Leverage Community Edition—If you’re using the free Community Edition, explore its DNS query capabilities and upgrade to Enterprise for access to premium features like IOFA™ feeds and API integrations.