Threat Check
We are excited to announce a major enhancement to our Threat Check feature. This release introduces expanded data source support and a new in-application experience that enables organizations to request access, configure, run, and analyze Threat Check results directly within the platform. Threat Check provides customers with unlimited access to verify whether indicators are present in supported data feeds via API or DNS-based integrations using organization-specific access keys.
With this release, Threat Check now supports multiple data sources, beginning with Traffic Origin data, and introduces a dedicated management interface within the application.
The Threat Intelligence Management section is now Defend, and the Threat Check functionality is located there.
Multi-Source Threat Check Support
Threat Check supports multiple data sources.
Initial expansion: Traffic Origin data
Users can submit an IP address and receive a list of countries where traffic from that IP has been detected.
Organizations can configure Threat Check to use one or more approved data sources.
Access to data sources is permissioned at the organizational level.
Dedicated Threat Check Page
Customers now have access to a centralized Threat Check page under Defend, where they can:
Request Threat Check access
Generate and manage access keys
Configure data sources
Manually run Threat Check lookups
View and analyze results
Download reports
This release significantly enhances the usability, configurability, and visibility of Threat Check, while laying the foundation for expanded support for data sources.
Traffic Origin in Total View
We’re excited to announce the addition of Traffic Origin to IP Total View. This enhancement provides deeper context on where observed activity originates, directly within the workflows you already use.
Traffic Origin insights are now embedded directly in:
Total View Highlights
Total View Tab
This integration brings origin intelligence front and center, enabling faster situational awareness without requiring additional pivots or workflow changes.
Gain clearer visibility into where traffic is coming from
Accelerate investigations with origin context presented inline
Make faster, more confident decisions with consolidated insights
Traffic Origin continues to strengthen your ability to quickly understand, investigate, and act on external exposure.