Skip to content
Discussion options

You must be logged in to vote

I took the feed URLs from the MISP Default Feeds list with "feed format: misp" and ended up with this list:

- type: misp
  url: https://www.circl.lu/doc/misp/feed-osint/manifest.json
- type: misp
  url: https://raw.githubusercontent.com/infobloxopen/threat-intelligence/refs/heads/main/indicators/misp/manifest.json
- type: misp
  url: https://bazaar.abuse.ch/downloads/misp/manifest.json
- type: misp
  url: https://www.botvrij.eu/data/feed-osint/manifest.json
- type: misp
  url: https://threatfox.abuse.ch/downloads/misp/manifest.json
- type: misp
  url: https://urlhaus.abuse.ch/downloads/misp/manifest.json

(The DigitalSide Threat-Intel OSINT Feed was also listed, but I removed it from my li…

Replies: 1 comment 1 reply

Comment options

mmguero
Aug 21, 2025
Maintainer Author

You must be logged in to vote
1 reply
@mmguero
Comment options

mmguero Aug 21, 2025
Maintainer Author

Answer selected by mmguero
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
intel Related to integration with threat intel feeds
1 participant