How to Enhance Threat Prioritization with Securonix ThreatQ and AI SPERA Criminal IP Integration

<h2>Introduction</h2> <p>In today's cybersecurity landscape, security teams are overwhelmed with alerts, many of which lack sufficient context to prioritize effectively. The recent partnership between <strong>Securonix</strong> and <strong>AI SPERA</strong> addresses this challenge by integrating <em>Criminal IP</em> threat intelligence directly into the <strong>Securonix ThreatQ Platform</strong>. This guide provides a step-by-step approach to setting up and leveraging this integration to enrich your threat intelligence with real-time IP context, enabling faster, more accurate incident response. By the end, you'll be able to transform raw IP data into actionable insights that reduce false positives and focus your team on the most critical threats.</p><figure style="margin:20px 0"><img src="https://d15shllkswkct0.cloudfront.net/wp-content/blogs.dir/1/files/2026/04/securonixaispera.png" alt="How to Enhance Threat Prioritization with Securonix ThreatQ and AI SPERA Criminal IP Integration" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: siliconangle.com</figcaption></figure> <h2 id="prerequisites">What You Need</h2> <p>Before you begin, ensure you have the following materials and prerequisites:</p> <ul> <li><strong>Active Securonix ThreatQ Platform Subscription</strong> – The platform must be configured and accessible with administrative privileges.</li> <li><strong>AI SPERA Criminal IP API Access</strong> – A valid subscription to <em>Criminal IP</em> with an API key. Register at the AI SPERA website if not already done.</li> <li><strong>Network Connectivity</strong> – Your ThreatQ instance must be able to reach AI SPERA's API endpoints (outbound HTTPS).</li> <li><strong>User Permissions</strong> – You need roles that allow configuring data sources, integration settings, and playbooks in ThreatQ.</li> <li><strong>Basic Understanding of Threat Intelligence Enrichment</strong> – Familiarity with IP reputation, threat scoring, and orchestration concepts is helpful.</li> </ul> <h2>Step-by-Step Integration Guide</h2> <h3 id="step1">Step 1: Access ThreatQ Integration Settings</h3> <p>Log in to your Securonix ThreatQ console as an administrator. Navigate to the <strong>Administration</strong> menu and select <strong>Integration Settings</strong> (or <strong>Data Sources</strong>, depending on your version). This is where you'll manage all third-party connectors. Look for the option to add a new integration – typically labeled “Add Integration” or “+ New Data Source.”</p> <h3 id="step2">Step 2: Configure the Criminal IP Data Source</h3> <p>In the integration catalog, locate <strong>AI SPERA Criminal IP</strong>. If it does not appear, verify your ThreatQ version supports custom integrations, or contact Securonix support. Click on it and provide the following details:</p> <ul> <li><strong>Name</strong> – Give it a descriptive label, e.g., “Criminal IP – Real-Time IP Intel.”</li> <li><strong>API Key</strong> – Enter the API key provided by AI SPERA. <em>Ensure it is stored securely</em>.</li> <li><strong>Base URL</strong> – Use the standard endpoint: <code>https://api.criminalip.io</code> (or as specified in your subscription).</li> <li><strong>Polling Interval</strong> – Define how often ThreatQ should fetch new intelligence. For real-time enrichment, set a short interval (e.g., every 5 minutes).</li> </ul> <p>Click <strong>Test Connection</strong> to validate the credentials. A success message confirms the integration is ready.</p> <h3 id="step3">Step 3: Map Fields and Enable Enrichment</h3> <p>After saving the data source, you need to map fields so ThreatQ can automatically enrich incoming IP indicators. Go to <strong>Enrichment Rules</strong> under the integration settings. Create a new rule:</p> <ol> <li><strong>Trigger Condition</strong> – Choose “When an IP indicator is added or updated.”</li> <li><strong>Action</strong> – Select “Query Criminal IP” and specify the enrichment type (e.g., reputation, abuse score, geolocation).</li> <li><strong>Field Mapping</strong> – Map ThreatQ's <em>IP Address</em> field to the Criminal IP API's <code>ip</code> parameter. Then map returned fields like <code>abuse_confidence_score</code>, <code>country</code>, <code>isp</code> into corresponding ThreatQ fields.</li> <li><strong>Priority</strong> – Set a priority for enriched data (e.g., “High”) to ensure it appears prominently in alerts.</li> </ol> <p>Save the rule. Now every new or updated IP in ThreatQ will automatically trigger a lookup against Criminal IP.</p> <h3 id="step4">Step 4: Build Playbooks for Automated Response</h3> <p>To maximize value, use ThreatQ's orchestration capabilities to create playbooks that act on enriched intelligence. Go to <strong>Playbooks</strong> and choose <strong>Create New Playbook</strong>. Example workflow:</p> <ul> <li><strong>Trigger</strong> – When an IP with a Criminal IP abuse score above 80 is detected.</li> <li><strong>Actions</strong> – Block the IP at the firewall (via SIEM integration), send a high-priority alert to the SOC, and automatically create a ticket in your ITSM system.</li> <li><strong>Conditional Logic</strong> – If the IP is from a known bad ISP, escalate to a senior analyst.</li> </ul> <p>Save and activate the playbook. This automation reduces manual investigation time.</p><figure style="margin:20px 0"><img src="https://s3.us-west-2.amazonaws.com/cube365-prod/related-content/e810e50d-1091-4ce3-9cc2-0232848a8d60.png" alt="How to Enhance Threat Prioritization with Securonix ThreatQ and AI SPERA Criminal IP Integration" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: siliconangle.com</figcaption></figure> <h3 id="step5">Step 5: Analyze and Prioritize Indicators</h3> <p>With integration running, open the <strong>Indicators</strong> tab. You'll see IP addresses now display enriched data from Criminal IP, such as:</p> <ul> <li><strong>Abuse Confidence Score</strong> – A percentage indicating likelihood of malicious activity.</li> <li><strong>Historical Context</strong> – First seen, last seen, and related incidents.</li> <li><strong>Geolocation &amp; ISP</strong> – Helps distinguish between legitimate cloud providers and anonymous proxies.</li> </ul> <p>Use the <strong>Prioritization View</strong> to sort IPs by score. This allows you to focus on the most dangerous threats first. For example, an IP with a score of 95 and recent activity should be investigated immediately, while a score of 10 with no history can be deprioritized.</p> <h3 id="step6">Step 6: Monitor and Refine Integration Performance</h3> <p>Regularly review the integration's health under <strong>Logs &amp; Monitoring</strong>. Look for errors such as API timeouts or quota limits (Criminal IP may impose daily request caps). Adjust the polling interval if needed. Also, periodically refine your enrichment rules – for instance, add extra fields like <em>threat type</em> or <em>associated malware</em> as new API features become available. Share feedback with your team to fine-tune playbooks for evolving threats.</p> <h2 id="tips">Tips for Success</h2> <ul> <li><strong>Start Small</strong> – Initially enable enrichment for a subset of indicators (e.g., external IPs only) to avoid overwhelming the system.</li> <li><strong>Combine with Local Intel</strong> – Don't rely solely on Criminal IP; integrate with other threat feeds (e.g., VirusTotal, AlienVault) for multi-source validation.</li> <li><strong>Monitor API Usage</strong> – Keep track of your monthly query volume to avoid overage charges. Set up alerts when you reach 80% of your quota.</li> <li><strong>Use Tags for Context</strong> – Automatically tag IPs with Criminal IP's “botnet,” “scanner,” or “proxy” labels to simplify filtering in dashboards.</li> <li><strong>Test Thoroughly</strong> – Before rolling out to production, test the integration in a sandbox environment. Verify that field mappings produce accurate values.</li> <li><strong>Document Your Workflow</strong> – Maintain internal documentation of the integration steps, playbook logic, and enrichment rules for future reference and training.</li> </ul> <p>By following this guide, your security operations center will gain deeper context for IP indicators, reduce false positives, and accelerate incident response. The Securonix–AI SPERA partnership transforms raw data into a powerful decision-making tool. Start implementing today and experience the impact of enriched threat intelligence.</p>
Tags: