The Sundarban
Torrance, United States / California, February ninth, 2026, CyberNewswire
Prison IP (criminalip.io), the AI-powered risk intelligence and attack surface intelligence platform, is now integrated with IBM QRadar SIEM and QRadar SOAR.
The integration brings external, IP-primarily based risk intelligence straight into IBM QRadar’s detection, investigation, and response workflows, enabling security groups to identify malicious project faster and prioritize response actions extra effectively at some stage in SOC operations.
IBM QRadar is widely adopted by enterprises and public-sector organizations as a central platform for security monitoring, automation, and incident response. By embedding Prison IP intelligence into QRadar SIEM and extending it into SOAR workflows, organizations can practice external risk context at some stage within the incident lifecycle without leaving the QRadar atmosphere.
Real-Time Threat Visibility from Firewall Online page visitors Logs
With the Prison IP QRadar SIEM integration, security groups can analyze firewall visitors logs and automatically assess the risk associated with communicating IP addresses. Online page visitors files forwarded into IBM QRadar SIEM is analyzed during the Prison IP API and reflected straight inner the SIEM interface.
Seen IP addresses are automatically classified into High, Medium, or Low risk ranges from a risk intelligence viewpoint. This allows SOC groups to speedy identify high-risk IPs, monitor inbound and outbound visitors, and prioritize response actions akin to get correct of entry to blocking off or escalation within the familiar QRadar SIEM workflow.
Interactive Investigation Without Leaving QRadar

Previous high-level visibility, the integration helps mercurial, in-context investigation. Analysts can stunning-click on IP addresses displayed in QRadar Log Process to beginning a detailed Prison IP yarn.
These reviews present extra context, together with risk indicators, historical conduct, and external publicity signals, enabling analysts to validate risk and intent without switching tools. This streamlined workflow helps faster resolution-making within the heart of time-sensitive investigations.
Extending Intelligence into QRadar SOAR Workflows
Prison IP is additionally integrated with IBM QRadar SOAR to toughen automated risk enrichment within the heart of incident response. Using pre-built playbooks, Prison IP intelligence can even be utilized to IP addresses and URL artifacts, with enrichment results returned straight into SOAR cases as artifact hits or incident notes.
This integration contains two playbooks:
- Prison IP: IP Threat Carrier – Enriches IP address artifacts with Prison IP risk context.
- Prison IP: URL Threat Carrier – Performs lite or paunchy URL scans and returns results as artifact hits or incident notes.
By embedding Prison IP risk intelligence straight into SOAR workflows, analysts can cut handbook lookups and acknowledge to incidents extra efficiently.
Advancing Intelligence-Driven Detection and Response
By integrating Prison IP with IBM QRadar SIEM and SOAR, organizations can mix QRadar’s correlation, investigation, and response capabilities with context-prosperous external risk intelligence derived from real-world web publicity. This means improves detection accuracy, shortens investigation cycles, and enhances response prioritization at some stage in SOC operations.
As alert volumes proceed to develop, Prison IP helps QRadar users assign faster, extra suggested choices by bringing external risk context straight into SIEM and SOAR workflows without together with operational complexity.
AI SPERA CEO Byungtak Kang commented that the integration highlights the rising significance of real-time, publicity-primarily based intelligence in contemporary SOC environments and underscores Prison IP’s deal with bettering detection confidence and operational effectivity through shining, intelligence-pushed integrations.
About Prison IP
Prison IP is the flagship cyber risk intelligence platform developed by AI SPERA and is venerable in bigger than 150 countries worldwide. It equips security groups with the actionable Threat Intelligence wanted to proactively identify, analyze, and acknowledge to rising threats.
Powered by AI and OSINT, it delivers risk scoring, recognition files, and real-time detection of a vital resolution of malicious indicators, starting from C2 servers and IOCs to masking providers and products fancy VPNs, proxies, and nameless VPNs, at some stage in IPs, domains, and URLs. Its API-first structure ensures seamless integration into security workflows to boost visibility, automation, and response.
Contact
Michael Sena
AI SPERA
[email protected]


