All Posts
Threat Intelligence Platform
1
min read

Anomali Adds DomainTools Iris to APP Store

The DomainTools Iris App for Anomali creates tremendous value for joint customers and amplifies the complementary values of both solutions. Learn more now.
Published on
June 19, 2019
Table of Contents
<p>The DomainTools Iris App for Anomali creates tremendous value for our joint customers and amplifies the complementary values of both solutions. Customers will now benefit from the aggregation and overlay of DomainTools data with other internal and external sources in Anomali for context to determine whether or not to take action.</p><p>DomainTools Iris App currently enables the following Enrichment capabilities out-of-the-box for Iris customers:</p><ul><li>Pivot Enrichment</li><li>Context Enrichment for Domains</li><li>Context Enrichment of IPs, Emails, and SSL Certificate Hashes</li></ul><p><em><strong>Pivot Enrichment</strong></em> facilitates ad-hoc analyst-driven enrichment from within the Anomali’s context menus with the ease of a right click. This capability introduces in-line enrichment of Domain observables along with the critical DomainTools data set. Customers can now leverage Anomali’s pivot chart capability to visualize DomainTools intel within the platform.</p><p style="text-align: center;"><br/> <img alt="Pivot Enrichment" src="https://cdn.filestackcontent.com/XBGNL5RnKSeE2SKNKgwA"/></p><p><em><strong>Context Enrichment for Domains</strong></em> adds a DomainTools Iris tab within Anomali. This helps customers enrich Domain Indicators in a centralized place in the Anomali platform. Customers are able to bring in a subset of the Iris data set, including Guided Pivots and Risk Score to enable further investigations. Finally, we’ve added the ability to launch the DomainTools Iris platform directly from Anomali to facilitate a deeper investigation of the domain observables.</p><p style="text-align: center;"><img alt="Context Enrichment for Domains" src="https://cdn.filestackcontent.com/Gg1WPtRGqT8Xb8cXHlMw"/></p><p><em><strong>Context Enrichment of IPs, Emails, and SSLs Hashes</strong></em> enables users to discover connected domains associated with the Indicators, which otherwise would have remained unknown in the customer environment. We achieve this by enriching connected domain names that share the same observable value, with insights into their risk scores and age. The DomainTools analytics associated can drive further investigations within Anomali.</p><p style="text-align: center;"><img alt="Context Enrichment of IPs, Emails, and SSLs Hashes" src="https://cdn.filestackcontent.com/7DVEZ92URqeeWqhE7j6A"/></p><p>To complement these enrichments, there are now multiple <em><strong>DomainTools Analytics visualization</strong></em> that customers can readily access from within Anomali. These visualizations conveniently surface some key Domain aggregation data such as Distribution of Risks, and Age of Domains for at-a-glance consumption.</p><p style="text-align: center;"><img alt="DomainTools Analytics visualization" src="https://cdn.filestackcontent.com/OibvUaWMQMy0wj22wtdw"/></p><blockquote><p>"Our goal with the Anomali and DomainTools integration is to automate and simplify access to DomainTools threat intelligence data which can be leveraged to contextualize, prioritize and mitigate threats. The DomainTools Iris App is built with the Anomali SDK, allowing for streamlined investigations."</p><p>Sourin Paul, Senior Product Manager - Integrations</p></blockquote><p>Learn more about the Anomali and DomainTools integration: <a href="mailto:info@anomali.com">info@anomali.com</a></p>

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All