Login Subscribe



API Documentation
API Docs
Conditional Access Service Documentation
Hosted Conditional Access
Self Hosted Conditional Access Service Documentation
Self Hosted Conditional Access
Subscribe
Subscribe
Change your subscription
Change Your Subscription
Report AiTM Infrastructure
Report AiTM Infrastructure


We go out and actively hunt down Adversary in The Middle (AiTM) infrastructure and make it available via our feed so that you can easily ingest and use it in your defensive operations.

Our AiTM feed is unique, it's not a bunch of infrastructure that we have seen performing attacks - we detect infrastructure as it is being stood up ready to perform attacks. It's the stuff you want to block, not the stuff you wish you known to block.

Query our API, pull from our dataset, or seamlessly integrate it into your Microsoft conditional access policies with just a few clicks. Transparent pricing, high fidelity detections, simple integrations. Subscribe now