FAQs

Is it illegal to use this service?

No. Our service does not download, store, or analyze data obtained and published by ransomware or APT groups. It simply notifies you when such an event occurs.

Why should I buy this service if the information is publicly available?

Information is power, but only if you can find it before it’s too late. While this data is technically accessible, tracking it requires extensive monitoring and expertise. Our service eliminates this burden by continuously following these groups and delivering the information you need—without months of manual effort.

Can I specify any domain for search?

Yes. You can monitor everything from Top-Level Domains (TLDs) to subdomains based on your needs.

How often are the source lists updated?

We continuously expand our sources. However, to ensure system stability and reliability, new data is integrated into the production environment on a scheduled basis.

Do you store the data that the system sends us?

Yes. The data is stored in a secure database to ensure that we can accommodate custom requests and historical lookups as needed. This allows us to provide more flexible and tailored threat intelligence for our clients. However, we do not share, resell, or repurpose any stored data, and strict security measures are in place to protect it.

Why don’t you offer a large, interactive web platform like other IT service providers?

As a newly established company, we prioritize functionality, accuracy, and efficiency over flashy interfaces. Our focus is on delivering reliable, high-quality intelligence feeds—not unnecessary visual complexity.