Feed Catalog

All 40+ threat-intel feeds aggregated by WhisperGraph, with category and refresh cadence.

Updated May 2026

Feed Catalog Documentation

WhisperGraph aggregates 40+ threat intelligence feeds across 18 categories. Indicators (IPs, domains, hostnames, ASNs) appear in the graph as LISTED_IN virtual edges to FEED_SOURCE nodes.

For category groupings see Feed Categories. For the scoring algorithm see explain().


Live feeds

FeedCategory
AbuseCH ThreatFoxC2 Servers
AbuseCH URLhausMalware Distribution
Alienvault ReputationGeneral Blacklists
Bitcoin NodesReference Data
Blocklist.de All AttacksAttack Sources
Blocklist.de BotsAttack Sources
Blocklist.de MailSpam
BotScout Last CaughtReputation
CERT.pl DomainsMalicious Domains
CINS ScoreGeneral Blacklists
Cloudflare Radar Top 1MPopularity/Trust
DNS RD AbuseGeneral Blacklists
Dan Tor ExitTOR Network
ET Compromised IPsGeneral Blacklists
Feodo TrackerC2 Servers
FireHOL Abusers 1dGeneral Blacklists
FireHOL AnonymousProxies
FireHOL Level 1General Blacklists
FireHOL Level 2General Blacklists
FireHOL Level 3General Blacklists
FireHOL WebClientGeneral Blacklists
GreenSnow BlacklistGeneral Blacklists
Hagezi LightAd/Tracking Blocklists
Hagezi ProAd/Tracking Blocklists
IPsumGeneral Blacklists
InterServer RBLGeneral Blacklists
MalwareBazaar RecentMalware Distribution
OpenPhish FeedPhishing
SSH Client AttacksBrute Force
SSH Password AuthBrute Force
SSL IP BlacklistGeneral Blacklists
Spamhaus DROPGeneral Blacklists
Spamhaus EDROPGeneral Blacklists
StevenBlack HostsAd/Tracking Blocklists
ThreatFox IOCsC2 Servers
Tor Exit NodesTOR Network
Tranco Top 1MPopularity/Trust
URLhaus RecentMalware Distribution

Refresh cadence

Feeds are aggregated by whisper-feeds, a companion service that pulls from public and commercial sources. Refresh policy:

  • Hourly: incremental refresh — newly listed indicators flow into the graph within ~60 minutes of source publication.
  • Daily: full refresh — every feed is re-fetched and entries no longer present are removed from the graph.

This means a hot indicator (e.g. a C2 IP added to ThreatFox) is queryable through MATCH (ip:IPV4 {name: "..."})-[:LISTED_IN]->(f:FEED_SOURCE) within an hour.


Querying

-- All feeds an indicator is listed in
MATCH (ip:IPV4 {name: "185.220.101.1"})-[:LISTED_IN]->(f:FEED_SOURCE)
RETURN f.name
-- All feeds in a category
MATCH (cat:CATEGORY {name: "C2 Servers"})<-[:IN_CATEGORY]-(f:FEED_SOURCE)
RETURN f.name
-- Feed source counts (how many indicators per feed)
MATCH (f:FEED_SOURCE)<-[r:LISTED_IN]-()
RETURN f.name, count(r) AS indicators ORDER BY indicators DESC LIMIT 20

For scored threat assessment, use explain() — it factors feed count, weights, recency, and network density into a single score.