Feed Categories

The 18 categories WhisperGraph uses to group threat-intel feeds.

Updated May 2026

Feed Categories Documentation

Threat-intel feeds in WhisperGraph are grouped into 18 categories. Use the category to filter feeds when scoring or hunting (e.g. only C2 Servers + Malware Distribution for confirmed-bad).

For the full feed list see the Feed Catalog.


Categories

CategoryWhat it covers
Ad/Tracking BlocklistsDomains used for ads and behavioural tracking
Anonymization InfrastructureVPN exit nodes, proxies, anonymizing relays
Attack SourcesIPs observed scanning or attacking
Brute ForceSSH/RDP/credential brute-force sources
C2 ServersConfirmed command-and-control infrastructure
General BlacklistsCatch-all reputation lists from operators
Malicious DomainsDomains involved in malware or attack chains
Malicious InfrastructureHosting providers and ASNs hosting badness
Malware DistributionURLs/IPs serving malware payloads
PhishingDomains and URLs used for credential theft
Popularity/TrustTop-N domain lists used for whitelisting and reputation
ProxiesHTTP/SOCKS proxy infrastructure
Reference DataPublic infrastructure datasets (e.g. Bitcoin nodes)
ReputationGeneral reputation aggregators
SpamMail spam sources
TOR NetworkTor relays and exit nodes
Threat IntelligenceCurated threat-intel from intel providers
VPNsCommercial VPN egress IPs

Querying by category

-- All feeds in a category
MATCH (cat:CATEGORY {name: "C2 Servers"})<-[:IN_CATEGORY]-(f:FEED_SOURCE)
RETURN f.name
-- All indicators flagged by any C2 feed
MATCH (cat:CATEGORY {name: "C2 Servers"})<-[:IN_CATEGORY]-(f:FEED_SOURCE)<-[:LISTED_IN]-(ind)
RETURN labels(ind)[0] AS type, ind.name LIMIT 100
-- Categories an indicator falls under
MATCH (ip:IPV4 {name: "185.220.101.1"})-[:LISTED_IN]->(f:FEED_SOURCE)-[:IN_CATEGORY]->(cat:CATEGORY)
RETURN DISTINCT cat.name