Download Arctic Wolf IoC lists
Arctic Wolf® maintains comprehensive Indicators of Compromise (IoCs) lists based on ongoing threat intelligence research. You can use this information to augment or enhance your cybersecurity infrastructure, such as adding suspicious IP addresses to a firewall denylist or annotations for IoCs in a cybersecurity system.
These lists are available as downloadable TXT files:
- Suspicious IP addresses
- Suspicious domains
- Suspicious URLs
- Suspicious MD5 file hashes
These resources are required:
-
A Threat Intelligence Plus subscription
- Sign in to the Arctic Wolf Unified Portal.
- In the navigation menu, click .
- In the Threat Intelligence Downloads section, in the Download Link column, click the link for one or more TXT files.