Stronger Cyber Intelligence
Adds new controls informed by NetFlow and DNS telemetry to the IP Reputation risk category, which are factored into cyber ratings.


NetFlow and DNS telemetry have long been valuable data sources in the SecOps world to detect suspicious activity and support cyber investigations. But that level of visibility hasn’t historically been accessible or operationalized for third-party risk teams assessing vendor exposure.
That’s why Black Kite built ThreatTrace™: to translate internet-traffic signals into third-party cyber risk intelligence, revealing hidden risk across your ecosystem.
By analyzing 1T+ internet traffic flows, ThreatTrace™ surfaces indicators of compromise (IOCs), suspicious behavior, and anomalies, enabling earlier detection of third-party risk, stronger cyber ratings, and more targeted vendor outreach.
Identifies IP addresses blacklisted by multiple threat intelligence sources as malicious or compromised, potentially associated with botnet activity including spam campaigns, DDoS attacks, or C2 operations.
Correlates DNS queries to high-risk domains, such as Tor sites, hacker forums, or known C2 servers, with outbound network traffic from company IPs.
Detects known malicious IPs actively interacting with an organization’s digital assets, signaling live reconnaissance or attack activity.
Flags abnormal traffic patterns including unusual data volume spikes, connections to previously unseen high-risk IPs, or abnormal port usage – common indicators of data exfiltration.
Identifies unauthorized services and suspicious data flows to high-risk or sanctioned regions, helping uncover compliance violations and potential data leakage.
Give us 25 minutes and we’ll show you Product Analysis in action.