All Products
Search
Document Center

Security Center:AliyunThreatIntelligence component

Last Updated:Mar 31, 2026

The AliyunThreatIntelligence component queries Alibaba Cloud threat intelligence to determine whether an IP address, domain, or file is malicious. Use it in Security Operations Center (SOC) playbooks to automate threat classification and triage decisions.

Actions

ActionDescriptionUse case
describeInformationQueries Alibaba Cloud threat intelligence.Check whether an IP address, file hash, or domain is malicious.

Input parameters

ParameterTypeRequiredDescription
entityTypeStringYesThe entity type to query. Valid values: ip, file, domain.
entityValueStringYesThe value to query. Format depends on entityType.

`entityValue` format by entity type:

entityTypeFormatExample
ipIP address192.0.XX.XX
fileFile MD5 hashb4208cc50cb*0f82a47d*fde4312a
domainDomain name. Wildcard domains are supported.example.com

Decision guide

Use ThreatLevel and Confidence together to decide whether to block or allow traffic.

ThreatLevelMeaningConfidence >= 90Confidence 60–89Confidence < 60
3High riskBlockInvestigateLow confidence
2Medium riskInvestigateInvestigateLow confidence
1Low risk / suspiciousInvestigateSupplementary dataLow confidence
0Normal (allowlist)AllowAllowAllow
-1Unknown

Confidence ranges:

  • 90–100: Highly reliable. Block on ThreatLevel=3; allow on ThreatLevel=0.

  • 60–89: Somewhat reliable. Use as supplementary data for analysis, not as the sole basis for blocking.

  • Below 60: Low confidence. Treat with caution.

Output reference

IP type

Output parameters

ParameterTypeDescription
ThreatLevelNumberThreat level: 3 = high risk, 2 = medium risk, 1 = low risk/suspicious, 0 = normal (allowlist), -1 = unknown.
ConfidenceNumberConfidence in the result. Range: 0–100. Higher values indicate greater certainty.
ThreatTypesJSON stringRisk tags from threat intelligence and security event analysis. See fields below.
IntelligencesJSON arrayThreat intelligence event details. See fields below.
AttackPreferenceTop5JSON arrayTop five industries targeted by this IP. See fields below.
AttackCntByThreatTypeJSON arrayAttack count grouped by MITRE ATT&CK stage. See fields below.
IpJSON objectBasic IP geolocation and network information. See fields below.
WhoisStringWhois registration information for the IP address.
ScenarioStringAttack scenario classification. See values below.
RequestIdStringUnique request ID generated by Alibaba Cloud.

`ThreatTypes` fields:

FieldDescription
threat_typeThreat type. Common values: IDC (IDC server), Tor (dark web), Proxy, NAT (public exit), Miner Pool, C&C Server (command-and-control), Brute Force, Malicious Login, WEB Attack, Malicious Source, Network Service Scanning, Exploit, Network Share Discovery, Scheduled Task (Windows), BITS Jobs, Command-Line Interface, Mshta execution, Regsvr32, Signed Binary Proxy Execution, Local Job Scheduling (Linux), Rundll32, Web Shell, SQL Injection, XSS Attack
threat_type_descTag description.
risk_typeThreat level: 3 = high risk, 2 = medium risk, 1 = suspicious, 0 = normal, -1 = unknown.
scenarioSecurity scenario: attack indicator or compromise indicator.
first_find_timeTime the tag was first applied.
last_find_timeTime the tag was last applied.
attck_stageRelated MITRE ATT&CK stage.

`Intelligences` fields:

FieldDescription
sourceSource of the threat intelligence event.
first_find_timeTime the event was first discovered.
last_find_timeLast active time.
threat_type_l2Detailed threat tags, such as family/group tags (for example, Mykings) or attack methods (for example, SQL injection).

`AttackPreferenceTop5` fields:

FieldDescription
event_cntNumber of attacks.
industry_nameIndustry category of the attack target.
gmt_last_attackTime of the most recent attack.

`AttackCntByThreatType` fields:

FieldDescription
event_cntNumber of attacks.
threat_typeRelated MITRE ATT&CK stage.

`Ip` fields:

FieldDescription
ipIP address.
idc_nameIDC server name.
ispInternet service provider (ISP).
countryCountry.
provinceProvince.
cityCity.
asnAutonomous System Number (ASN).
asn_labelASN name.

`Scenario` values:

ValueDescription
Attack indicatorThis IP actively initiates attack traffic. Match it on security devices such as firewalls or WAFs as an external-to-internal source and block based on its tags.
Compromise indicatorAttackers use scripts or malware that communicate with this IP for command and data transfer. Detecting this IP in traffic or logs means the host is already compromised.
Information dataIncludes allowlisted entries. This field contains informational data only and poses no risk.

Example output

{
    "Context": "",
    "Group": "",
    "Whois": "",
    "AttackCntByThreatType": [
        {
            "event_cnt": 1,
            "threat_type": "Application layer intrusion"
        }
    ],
    "ThreatLevel": -1,
    "Confidence": "",
    "Ip": {
        "country": "",
        "province": "",
        "city": "",
        "ip": "127.0.0.1",
        "isp": "",
        "asn": "",
        "asn_label": ""
    },
    "ThreatTypes": "",
    "Intelligences": [],
    "AttackPreferenceTop5": [
        {
            "event_cnt": 2407,
            "industry_name": "IoT",
            "gmt_last_attack": "2021-12-15 23:59:15"
        },
        {
            "event_cnt": 4813,
            "industry_name": "Manufacturing",
            "gmt_last_attack": "2021-12-15 23:59:49"
        },
        {
            "event_cnt": 2240,
            "industry_name": "Finance",
            "gmt_last_attack": "2021-12-15 23:59:41"
        },
        {
            "event_cnt": 16954,
            "industry_name": "Retail",
            "gmt_last_attack": "2021-12-15 23:59:31"
        },
        {
            "event_cnt": 28764,
            "industry_name": "Internet",
            "gmt_last_attack": "2021-12-15 23:59:48"
        }
    ],
    "Scenario": ""
}

File type

Output parameters

ParameterTypeDescription
ThreatLevelNumberThreat level: 3 = high risk, 2 = medium risk, 1 = suspicious, 0 = normal, -1 = unknown.
IntelligencesJSON arrayThreat intelligence events for this file. Array elements include DDoS Trojans, mining programs, network-layer intrusions, network service scans, network share discoveries, miner pools, exploits, dark web activity, malicious logins, malicious download sources, C&C servers, Web Shells, and web attacks.
ThreatTypesJSON arrayRisk and server tags from threat intelligence and security event analysis. See fields below.
BasicJSON objectBasic file information. See fields below.
FileHashStringFile hash value (MD5).
SandboxStringDynamic sandbox analysis result.
RequestIdStringUnique request ID generated by Alibaba Cloud.

`ThreatTypes` fields:

FieldDescription
threat_type_descMalware category. Values include: Rootkit, backdoor program, suspicious program, mining program, DDoS Trojan, malware, worm, suspicious hacking tool, Trojan program, contaminated base software, infectious virus, exploit program, ransomware, self-mutating Trojan, high-risk program, hacking tool.
threat_typeThreat type. Values include: network-layer intrusions, network service scans, network share discoveries, Miner Pool, exploits, dark web activity, malicious logins, malicious download sources, C&C servers, web shells, web attacks.
risk_typeIndicates whether the tag is malicious: 1 = malicious, 0 = non-malicious, -1 = unknown.
last_find_timeMost recent discovery time.

`Basic` fields:

FieldDescription
md5File MD5 hash.
sha1File SHA-1 hash.
sha256File SHA-256 hash.
sha512File SHA-512 hash.
virus_resultStatic scan result: 1 = malicious, 0 = normal, -1 = unknown.
sandbox_resultDynamic sandbox result: 1 = malicious, 0 = normal, -1 = unknown.
sourceFile source. The only valid value is aegis, indicating detection by Security Center.

Example output

{
    "Intelligences": [
        "DDoS Trojan"
    ],
    "RequestId": "3F2BBCA2-4EE5-456F-****-DE0B69CAFD71",
    "FileHash": "02e6b7cf0d34c6eac05*****751208b",
    "ThreatTypes": [
        {
            "threat_type_desc": "DDoS Trojan",
            "risk_type": 1,
            "threat_type": "DDoS"
        }
    ],
    "Basic": {
        "sha1": "",
        "virus_result": "1",
        "sandbox_result": "-1",
        "sha256": "",
        "sha512": "",
        "virus_name": "Self-mutating Trojan",
        "source": "aegis"
    },
    "ThreatLevel": "2",
    "Sandbox": ""
}

Domain type

Output parameters

ParameterTypeDescription
ThreatLevelNumberThreat level: 3 = high risk, 2 = medium risk, 1 = low risk, 0 = normal (allowlist), -1 = unknown.
ConfidenceNumberConfidence in the result. Range: 60–100.
ThreatTypesJSON arrayDetailed threat intelligence data for this domain. See fields below.
IntelligencesJSON arrayThreat intelligence event details. See fields below.
AttackPreferenceTop5JSON arrayTop five industries of websites attacked through this domain. Fields: event_cnt, industry_name, gmt_last_attack.
AttackCntByThreatTypeJSON objectAttack count grouped by MITRE ATT&CK stage. Fields: event_cnt, threat_type.
ScenarioStringAttack scenario classification for this domain. See values below.
DomainStringDomain name.
BasicJSON objectBasic domain registration information. See fields below.
SslCertJSON objectSSL certificate information bound to the domain.
WhoisJSON objectWhois registration information for the domain.
RequestIdStringUnique request ID generated by Alibaba Cloud.

`ThreatTypes` fields:

FieldDescription
threat_typeThreat type. Common values: Botnet, Trojan, Worm, Malware, Ransomware, APT (advanced persistent threat), RAT (remote access trojan), C&C Server (command-and-control), Miner Pool, Malicious Source, Scheduled Task (Windows), BITS Jobs, Command-Line Interface, Mshta execution, Regsvr32, Signed Binary Proxy Execution, Local Job Scheduling (Linux), Rundll32
threat_type_descTag description.
first_find_timeTime the tag was first applied.
last_find_timeTime the tag was last applied.
risk_typeThreat severity: 3 = high risk, 2 = medium risk, 1 = low risk, 0 = non-malicious, -1 = unknown.
scenarioScenario classification: compromise indicator or attack indicator.
attck_stageRelated MITRE ATT&CK stage.

`Intelligences` fields:

FieldDescription
sourceSource of the threat intelligence data.
first_find_timeTime the event was first discovered.
last_find_timeLast active time.
threat_type_l2Detailed threat tags, such as family/group tags (for example, Mykings, APT32) or attack methods (for example, BITS Jobs).
threat_typePrimary threat category corresponding to the detailed tag.
referRelated references.

`Basic` fields:

FieldDescription
domainDomain name.
sld_domainSecond-level domain (SLD).
reg_dateDomain registration date.
expire_dateDomain expiration date.
child_domain_cntNumber of subdomains.
malicious_child_domain_cntNumber of malicious subdomains.
ip_cntNumber of IP addresses this domain resolved to in the past year.
malicious_ip_cntNumber of malicious IP addresses this domain resolved to in the past year.

`Scenario` values:

ValueDescription
Attack indicatorDomains are typically not attack indicators.
Compromise indicatorAttackers use scripts or malware that communicate with this domain for command and data transfer. Detecting this domain in traffic or logs means the host is already compromised. This represents post-compromise C2 communication.
Information dataIncludes allowlisted entries. This field contains informational data only and poses no risk.

Example output

{
    "Intelligences": [
        {
            "last_find_time": "2020-06-17 03:54:23",
            "threat_type_l2": "Malicious download source",
            "first_find_time": "2020-01-01 00:59:52",
            "source": "aliyun"
        },
        {
            "last_find_time": "2020-11-10 14:45:12",
            "threat_type_l2": "rexxx.exe executing malicious file",
            "first_find_time": "2017-09-22 11:15:00",
            "source": "aliyun"
        }
    ],
    "Domain": "example.com",
    "SslCert": {
        "serial_number": "183954751680****4",
        "validity_end": "2029-12-02 06:00:31",
        "issuer": "example.ca"
    },
    "AttackPreferenceTop5": "[{\"event_cnt\":586,\"industry_name\":\"Gaming\",\"gmt_last_attack\":\"2020-06-14 21:54:04\"}]",
    "ThreatTypes": [
        {
            "threat_type_desc": "Malicious download source",
            "last_find_time": "2020-06-17 03:54:23",
            "risk_type": 3,
            "scenario": "Compromise indicator",
            "threat_type": "Malicious Source",
            "first_find_time": "2020-01-01 00:59:52",
            "attck_stage": "delivery"
        },
        {
            "threat_type_desc": "Regsvr32 execution",
            "last_find_time": "2020-11-10 14:45:12",
            "risk_type": 3,
            "scenario": "Compromise indicator",
            "threat_type": "Regsvr32",
            "first_find_time": "2017-09-22 11:15:00",
            "attck_stage": "defense evasion"
        }
    ],
    "Confidence": "95",
    "ThreatLevel": "2",
    "AttackCntByThreatType": {
        "event_cnt": 27,
        "threat_type": "Network Layer intrusion"
    },
    "Context": "",
    "Whois": {
        "registrant_phone": "",
        "registrar": "XX Technology Co., Ltd.",
        "registrar_url": "",
        "whois_server": "whois.cnnic.cn",
        "admin_phone": "",
        "registrar_phone": "",
        "registrant_email": "",
        "admin_email": "",
        "admin_organization": "",
        "tech_name": "",
        "registrant_city": "",
        "tech_street": "",
        "tech_phone": "",
        "dnssec": "unsigned",
        "admin_province": "",
        "tech_organization": "",
        "registrant_country": "",
        "admin_city": "",
        "registrant_province": "",
        "admin_street": "",
        "tech_email": "",
        "nameservers": "ns4.myhostadmin.net,ns1.myhostadmin.net,ns2.myhostadmin.net,ns3.myhostadmin.net,ns5.myhostadmin.net,ns6.myhostadmin.net",
        "registrar_email": "",
        "domain_status": "ok",
        "domain": "example.com",
        "tech_city": "",
        "registrant_name": "",
        "registrant_organization": "",
        "tech_country": "",
        "registrant_street": "",
        "admin_name": "",
        "tech_province": "",
        "admin_country": ""
    },
    "RequestId": "718747A4-9A75-4130-88F9-C9B47350B7F5",
    "Scenario": "Compromise indicator",
    "Basic": {
        "ip_cnt": "36",
        "domain": "example.com",
        "child_domain_cnt": "18",
        "sld_domain": "example.com",
        "malicious_ip_cnt": "28",
        "malicious_child_domain_cnt": "4"
    },
    "Group": ""
}

Configuration example

Import the following JSON as a test playbook and use the visual flow editor to test the action parameters.

Save the example data as a JSON file before importing. For import instructions, see Playbook import.

The example configures a single describeInformation node with the following parameters:

{
  "componentName": "ThreatIntelligence",
  "actionName": "describeInformation",
  "parameters": [
    {
      "name": "entityType",
      "dataType": "String",
      "required": true,
      "description": "The type of intelligence. Valid values: ip, file, domain."
    },
    {
      "name": "entityValue",
      "dataType": "String",
      "required": true,
      "description": "The value to query. See the input parameters section for format details."
    }
  ],
  "valueData": {
    "entityType": "ip",
    "entityValue": "127.0.0.1"
  }
}

Full playbook JSON (click to expand)

{
    "cells": [
        {
            "position": {
                "x": -440,
                "y": -170
            },
            "size": {
                "width": 36,
                "height": 36
            },
            "attrs": {
                "body": {
                    "fill": "white",
                    "strokeOpacity": 0.95,
                    "stroke": "#63ba4d",
                    "strokeWidth": 2
                },
                "label": {
                    "text": "start",
                    "fontSize": 12,
                    "refX": 0.5,
                    "refY": "100%",
                    "refY2": 4,
                    "textAnchor": "middle",
                    "textVerticalAnchor": "top"
                },
                "path": {
                    "stroke": "#63ba4d"
                }
            },
            "visible": true,
            "shape": "circle",
            "id": "58d87b7d-28d9-4f0e-b135-4adc4f1a70e4",
            "zIndex": 1,
            "data": {
                "nodeType": "startEvent",
                "appType": "basic",
                "nodeName": "start",
                "icon": "icon-circle",
                "description": "The playbook start node. Each playbook must have exactly one start node. Configure input data for the playbook."
            },
            "markup": [
                {
                    "tagName": "circle",
                    "selector": "body"
                },
                {
                    "tagName": "text",
                    "selector": "label"
                }
            ],
            "isNode": true
        },
        {
            "shape": "custom-edge",
            "attrs": {
                "line": {
                    "stroke": "#63ba4d",
                    "targetMarker": {
                        "stroke": "#63ba4d"
                    }
                }
            },
            "zIndex": 1,
            "id": "5293c3f9-e1c9-4a49-b0eb-635067dc67e8",
            "data": {
                "nodeType": "sequenceFlow",
                "appType": "basic",
                "isRequired": true,
                "icon": "icon-upper-right-arrow"
            },
            "isNode": false,
            "source": {
                "cell": "58d87b7d-28d9-4f0e-b135-4adc4f1a70e4"
            },
            "target": {
                "cell": "a0ba5cc1-7308-47c6-8c20-ea97ff4ba982"
            },
            "visible": true,
            "router": {
                "name": "manhattan",
                "args": {
                    "padding": 5,
                    "excludeHiddenNodes": true,
                    "excludeNodes": [
                        "clone_node_id"
                    ]
                }
            },
            "vertices": [ ]
        },
        {
            "position": {
                "x": -70,
                "y": -170
            },
            "size": {
                "width": 36,
                "height": 36
            },
            "attrs": {
                "body": {
                    "fill": "white",
                    "strokeOpacity": 0.95,
                    "stroke": "#63ba4d",
                    "strokeWidth": 2
                },
                "path": {
                    "r": 12,
                    "refX": "50%",
                    "refY": "50%",
                    "fill": "#63ba4d",
                    "strokeOpacity": 0.95,
                    "stroke": "#63ba4d",
                    "strokeWidth": 4
                },
                "label": {
                    "text": "end",
                    "fontSize": 12,
                    "refX": 0.5,
                    "refY": "100%",
                    "refY2": 4,
                    "textAnchor": "middle",
                    "textVerticalAnchor": "top"
                }
            },
            "visible": true,
            "shape": "circle",
            "id": "317dd1be-2d20-460e-977e-1fc936ffb583",
            "zIndex": 1,
            "data": {
                "nodeType": "endEvent",
                "appType": "basic",
                "nodeName": "end",
                "icon": "icon-radio-off-full",
                "description": "end"
            },
            "markup": [
                {
                    "tagName": "circle",
                    "selector": "body"
                },
                {
                    "tagName": "circle",
                    "selector": "path"
                },
                {
                    "tagName": "text",
                    "selector": "label"
                }
            ],
            "isNode": true
        },
        {
            "position": {
                "x": -325,
                "y": -185
            },
            "size": {
                "width": 137,
                "height": 66
            },
            "view": "react-shape-view",
            "attrs": {
                "label": {
                    "text": "ThreatIntelligence_1"
                }
            },
            "shape": "activity",
            "id": "a0ba5cc1-7308-47c6-8c20-ea97ff4ba982",
            "data": {
                "componentName": "ThreatIntelligence",
                "appType": "component",
                "nodeType": "action",
                "ownType": "sys",
                "zIndex": 1,
                "tenantId": "baba",
                "customInput": false,
                "description": "Threat intelligence query.",
                "id": 0,
                "name": "describeInformation",
                "operateType": "general",
                "parameters": [
                    {
                        "dataType": "String",
                        "defaultValue": "",
                        "description": "The type of intelligence. Valid values: ip, file, domain.",
                        "enDescription": "",
                        "formConfig": "{\"component\":\"Select\",\"options\":{\"selectMode\":\"mixSelect\",\"remote\":false,\"optionList\":[{\"label\":\"Domain\",\"value\":\"domain\"},{\"label\":\"IP\",\"value\":\"ip\"},{\"label\":\"File HASH\",\"value\":\"file\"}],\"mode\":\"single\",\"labelKey\":\"label\",\"valueKey\":\"value\"}}",
                        "name": "entityType",
                        "needCascader": false,
                        "required": true,
                        "tags": ""
                    },
                    {
                        "dataType": "String",
                        "defaultValue": "",
                        "description": "When entityType is ip, enter the IP address to query. Example: 192.0.XX.XX. When entityType is file, enter the file hash (MD5 value). Example: b4208cc50cb***0f82a47d***fde4312a. When entityType is domain, enter the domain name to query. Wildcard domains are supported. Example: example.com.",
                        "enDescription": "",
                        "name": "entityValue",
                        "needCascader": false,
                        "required": true,
                        "tags": ""
                    }
                ],
                "riskLevel": 2,
                "nodeName": "ThreatIntelligence_1",
                "actionName": "describeInformation",
                "actionDisplayName": "describeInformation",
                "cascaderValue": [ ],
                "valueData": {
                    "entityType": "ip",
                    "entityValue": "127.0.0.1"
                },
                "status": "success"
            },
            "zIndex": 1
        },
        {
            "shape": "custom-edge",
            "attrs": {
                "line": {
                    "stroke": "#63ba4d",
                    "targetMarker": {
                        "stroke": "#63ba4d"
                    }
                }
            },
            "zIndex": 1,
            "id": "cdf4a475-3dd1-4883-a56b-d90444e11c64",
            "data": {
                "nodeType": "sequenceFlow",
                "appType": "basic",
                "isRequired": true,
                "icon": "icon-upper-right-arrow"
            },
            "isNode": false,
            "visible": true,
            "router": {
                "name": "manhattan",
                "args": {
                    "padding": 5,
                    "excludeHiddenNodes": true,
                    "excludeNodes": [
                        "clone_node_id"
                    ]
                }
            },
            "source": {
                "cell": "a0ba5cc1-7308-47c6-8c20-ea97ff4ba982"
            },
            "target": {
                "cell": "317dd1be-2d20-460e-977e-1fc936ffb583"
            },
            "vertices": [ ]
        }
    ]
}