alpha mountain logo
  • Home
  • Products
    • Threat Intelligence Feeds & APIs
    • threatYeti URL Scan
    • Free Threat Intelligence Feeds
  • Partners
  • FAQ
  • Blog
  • About
    • About Us
    • News
  • Contact
Request API Key
Launch threatYeti
alpha mountain logo
  • Home
  • Products
    • Threat Intelligence Feeds & APIs
    • threatYeti URL Scan
    • Free Threat Intelligence Feeds
  • Partners
  • FAQ
  • Blog
  • About
    • About Us
    • News
  • Contact
Free IP Reputation & Domain Intelligence API Now Inside threatYeti

Free IP Reputation & Domain Intelligence API Now Inside threatYeti

by Will Andre | Jan 25, 2026 | Blog

Since we launched threatYeti in 2023, we’ve seen the security community embrace our real-time search engine for risky domains and IP addresses. With our comprehensive intelligence, threatYeti has become a go-to replacement for the web-based versions of tools like...
A Best of Breed VirusTotal Alternative: alphaMountain + Polyswarm

A Best of Breed VirusTotal Alternative: alphaMountain + Polyswarm

by Will Andre | Jan 16, 2026 | Blog

We’ve spent years working with security teams that rely on VirusTotal every day. We understand why it became foundational: it made URL, domain, IP, and file analysis accessible in a single workflow, and it gave analysts a fast way to sanity-check suspicious...
IP Reputation: How Security Teams Actually Use It in the Real World

IP Reputation: How Security Teams Actually Use It in the Real World

by Will Andre | Jan 3, 2026 | Blog

IP reputation used to be something analysts checked manually when an alert looked suspicious. Today, it’s a decision engine, quietly influencing what gets blocked, escalated, or ignored across the security stack. At its core, IP reputation answers a simple question:...
Phishing Threat Intelligence – How Contextual Data Exposes Modern Phishing Campaigns

Phishing Threat Intelligence – How Contextual Data Exposes Modern Phishing Campaigns

by Will Andre | Nov 9, 2025 | Blog

Phishing has always been about deception, but today, it’s not just about a fake email. It’s about obfuscation and infrastructure. Attackers now build entire ecosystems of redirectors, cloud storage, and short-lived domains to host credential-stealing pages. The result...
Phishing Detection in the Real World: Stopping the QuickBooks “Electronic Signature” QR Scam

Phishing Detection in the Real World: Stopping the QuickBooks “Electronic Signature” QR Scam

by Will Andre | Oct 31, 2025 | Blog

Phishing detection is a fast-moving game of cat and mouse. We recently received a message from the popular QuickBooks accounting software which turned out it was a phishing scam. Let’s take a deep technical dive into how threat actors are leveraging legitimate...
VirusTotal End of Life: What You Need to Know — and How alphaMountain Can Help

VirusTotal End of Life: What You Need to Know — and How alphaMountain Can Help

by Will Andre | Sep 12, 2025 | Blog

  Introduction For nearly two decades, security teams have relied on VirusTotal as a go-to tool for checking files, URLs, domains, and IPs against a massive crowdsourced database of threat verdicts. But as of 2025, VirusTotal is reaching its end of life as a...
« Older Entries

PRODUCTS

  • Threat Intelligence APIs and Feeds
  • threatYeti URL Scan Info | Application
  • Free Threat Intelligence Feeds

 

RESOURCES

  • API Docs
  • Category List
  • Report a False Positive
  • Privacy Policy
  • Official Information for AI

THREAT INTELLIGENCE FEEDS

  • DNS
  • SOAR
  • VPN / Secure Gateways
  • Secure Browsers

 

COMPARE

  • VirusTotal Alternative
  • Brightcloud Alternative
  • zvelo Alternative
  • WhoisXMLAPI Alternative

 

Alpha Mountain Logo
  • Follow
  • Follow
  • Follow

Alpha Mountain AI, Inc. © All rights reserved