DomainTools Partners With Malformity Labs To Offer Domain Name Visualizing Data

DomainTools announced a partnership with Malformity Labs that already incorporates DomainTools’ extensive database into the Maltego transform server and can immediately accelerate your investigations.

The availability of a Maltego transform server makes it incredibly easy to visualize the relationships among domains, registrants, IP addresses and all DomainTools data.

The technology behind that capability was custom-built for DomainTools by Malformity Labs, a US-based company that specializes in building Maltego transforms for cybersecurity analysts and cybercrime investigators.

Here is the DomainTools announcement:

Today, we’re announcing the availability of a Maltego transform server that makes it incredibly easy to visualize the relationships among domains, registrants, IP addresses and all DomainTools data. This service, provided by a partnership with Malformity Labs, already incorporates DomainTools’ extensive database into the Maltego transform server, and can immediately accelerate your investigations.

Using the transform server will accelerate your investigations by allowing you to visually explore and uncover connections in DomainTools data.

The technology behind that capability was custom-built for DomainTools by Malformity Labs, a US-based company that specializes in building Maltego transforms for cybersecurity analysts and cybercrime investigators. We extended that project into a long-term partnership with Malformity that lets us support our enterprise customers with Maltego’s rich visualizations.

Available Now

Our enterprise customers can now access these capabilities without the cost or complexity of building their own transforms. The DomainTools Maltego transform server is available today for our Enterprise API customers. New customers can accelerate their investigations by taking advantage of this packaged offering. Contact us at sales@domaintools.com to setup a trial and see what it can do for your team.

See it in action:

Recent reports from Mandiant/FireEye and Crowdstrike on an Iranian hacker group gave us a great opportunity to explore the connections DomainTools’ data can uncover among aspects of an attacker’s infrastructure. To help illustrate those connections, and show how we uncovered a domain absent from either report, have a look at our video case study.

Sold.Domains

About Konstantinos Zournas

I studied Computer Engineering and Computer Science in London, UK and I am now living in Athens, Greece. I went online in 1995, started coding in 1996 and began buying domain names and creating websites in 2000. I started the OnlineDomain.com blog in 2012.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.