You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/IntelOwl/usage.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -259,6 +259,9 @@ The following is the list of the available analyzers you can run out-of-the-box.
259
259
-`UltraDNS_Malicious_Detector`: Scan if a DNS is marked malicious by [UltraDNS](https://vercara.com/ultra-dns-public).
260
260
-`IPQuery`: [IPQuery](https://ipquery.io/) aims to provide a straightforward and simplistic API for working with IP addresses.
261
261
-`Mullvad_DNS`: [Mullvad_DNS](https://github.com/mullvad/dns-blocklists) is an analyzer that queries Mullvad's DNS-over-HTTPS service (using the "base" endpoint) to check a domain's DNS records. It supports two modes: `query`: returns raw DNS answer data. `malicious`: interprets an NXDOMAIN (rcode==3) as the domain being blocked (i.e., malicious).
262
+
263
+
_Available from version > 6.3.1_
264
+
-`BBOT`: [BBOT](https://github.com/blacklanternsecurity/bbot) (Bighuge BLS Open Threat) domain/URL scanner that leverages BBOT's Python library to perform scans with configurable modules and presets.
0 commit comments