+ A dedicated platform for tracking vulnerabilities actively exploited in the wild, powered by live CrowdSec network data. Accessible with the same CTI API key.
+
+
+ {[
+ ["⚡", "CrowdSec Score", "SOC-oriented priority signal based on observed attack patterns"],
+ ["🎯", "Opportunity Score", "How targeted vs. opportunistic the exploitation is (0 = mass scan, 5 = precise campaign)"],
+ ["📈", "Momentum Score", "Whether exploitation volume is growing, stable, or declining"],
+ ["🏷️", "Exploitation Status", "From early exploitation to background noise"],
+ ["🕐", "Timeline", "First/last seen, CVE publication, CISA KEV addition, key events"],
+ ["🌐", "Malicious IPs", "IPs actively exploiting a CVE — with full CTI context for hunting or blocklisting"],
+ ].map(([icon, title, desc]) => (
+
+
{icon} {title}
+
{desc}
+
+ ))}
+
+
+
-Beyond listing CVEs, it adds exploitation context that helps you **prioritize and act**:
+---
-- **CrowdSec Score** — a SOC-oriented priority signal based on observed attack patterns
-- **Opportunity Score** — how targeted vs. opportunistic the exploitation is (0 = mass automated scan, 5 = precisely targeted campaign)
-- **Momentum Score** — whether exploitation volume is growing, stable, or declining
-- **Exploitation Status** — from *early exploitation* to *background noise*
-- **Timeline** — first/last seen, CVE publication, CISA KEV addition, and key events
-- **Malicious IPs** — IPs actively exploiting a given CVE, with full CTI context, for threat hunting or direct blocklist integration
+## API Access
-[Explore the Live Exploit Tracker ↗️](https://tracker.crowdsec.net/)
+Query the same data programmatically with a CTI API key and the [CTI REST API](/u/cti_api/intro).
----
+
-## API Access
+
+
Free
+
40 queries / month
+
POC, low-traffic scripts
+
+
+
+
Premium
+
120 queries / month
+
Regular enrichment, small integrations
+
-You can query the same data programmatically using a CTI API key and the [CTI REST API](/u/cti_api/intro).
+
-Manage your keys in the Console under **Settings → CTI API Keys**, or go straight to [app.crowdsec.net/settings/cti-api-keys](https://app.crowdsec.net/settings/cti-api-keys).
+Manage your keys under **Settings → CTI API Keys** in the Console, or go directly to [app.crowdsec.net/settings/cti-api-keys](https://app.crowdsec.net/settings/cti-api-keys).
-[Get your first API key →](/u/console/ip_reputation/api_keys)
-[Premium quotas →](/u/console/ip_reputation/api_keys_premium)
+
+ Get your first API key →
+ Premium quotas →
+
---
-:::tip Want the full technical reference?
+:::tip Full technical reference
For API endpoints, request/response schemas, integrations (SIEM, SOAR, TIP platforms), and data taxonomy, see the [CTI API documentation](/u/cti_api/intro).
:::
diff --git a/crowdsec-docs/unversioned/cti_api/api_integration/integration_intro.md b/crowdsec-docs/unversioned/cti_api/api_integration/integration_intro.md
deleted file mode 100644
index 7b0e0991b..000000000
--- a/crowdsec-docs/unversioned/cti_api/api_integration/integration_intro.md
+++ /dev/null
@@ -1,30 +0,0 @@
----
-id: integration_intro
-title: Integrations
----
-
-CrowdSec has developed native integrations for the most common security platforms so you can enrich your workflows with IP reputation data without writing any code. If your platform isn't listed, the API is a standard REST interface — you can query it directly with cURL, write your own scripts, or build custom playbooks in any SIEM, SOAR, or TIP that supports HTTP enrichment:
-
-```shell
-curl -H "x-api-key: $API_KEY" https://cti.api.crowdsec.net/v2/smoke/1.2.3.4 | jq .
-```
-
-For the full API reference, see the [Swagger documentation](https://crowdsecurity.github.io/cti-api/).
-
----
-
-| Integration | Description |
-|---------------------------|----------------------------------------|
-| [Chrome](/cti_api/api_integration/integration_browser_chrome.md) | A Chrome extension which allows you to quickly search an IP on a web page |
-| [Gigasheet](/cti_api/api_integration/integration_gigasheet.md) | Gigasheet's No-Code API-data-enrichment feature |
-| [IntelOwl](/cti_api/api_integration/integration_intelowl.md) | IntelOwl is an open-source framework and platform for analyzing and processing threat intelligence data |
-| [Maltego](/cti_api/api_integration/integration_maltego.md) | Maltego is a powerful and versatile data visualization and link analysis tool used primarily in the field of digital forensics, cybersecurity, and intelligence gathering |
-| [MISP](/cti_api/api_integration/integration_misp.md) | MISP, short for Malware Information Sharing Platform & Threat Sharing, is an open-source threat intelligence platform designed to facilitate the sharing and collaboration |
-| [MSTICpy](/cti_api/api_integration/integration_msticpy.md) | MSTICpy, short for Microsoft Threat Intelligence Python Security Tools and Common Practices, is an open-source Python library developed by Microsoft |
-| [OpenCTI](/cti_api/api_integration/integration_opencti.md) | OpenCTI is an open-source threat intelligence platform that focuses on facilitating the collection, management, and analysis of cyber threat intelligence data |
-| [PaloAlto XSOAR](/cti_api/api_integration/integration_paloalto_xsoar.md) | Palo Alto Networks Cortex XSOAR is a Security Orchestration, Automation, and Response (SOAR) platform |
-| [QRadar](/cti_api/api_integration/integration_qradar.md) | QRadar is a widely-used Security Information and Event Management (SIEM) solution designed to provide comprehensive visibility into an organization's cybersecurity landscape |
-| [Sekoia XDR](/cti_api/api_integration/integration_sekoia_xdr.md) | Sekoia XDR (Extended Detection and Response) is a cybersecurity platform that combines threat detection, incident response, and proactive threat hunting capabilities into a unified solution |
-| [Splunk SIEM](/cti_api/api_integration/integration_splunk_siem.md) | Splunk Enterprise Security is a Security Information and Event Management (SIEM) solution that helps organizations centralize, analyze, and manage security-related data from various sources |
-| [Splunk SOAR](/cti_api/api_integration/integration_splunk_soar.md) | Splunk SOAR (Security Orchestration, Automation, and Response) is a security platform designed to streamline and automate the incident response and security operations processes |
-| [TheHive](/cti_api/api_integration/integration_thehive.md) | TheHive is an open-source, collaborative, and customizable Security Incident Response Platform (SIRP) designed to assist cybersecurity teams in managing and mitigating security incidents effectively |
diff --git a/crowdsec-docs/unversioned/cti_api/api_integration/integration_intro.mdx b/crowdsec-docs/unversioned/cti_api/api_integration/integration_intro.mdx
new file mode 100644
index 000000000..f04f9c4da
--- /dev/null
+++ b/crowdsec-docs/unversioned/cti_api/api_integration/integration_intro.mdx
@@ -0,0 +1,24 @@
+---
+id: integration_intro
+title: Integrations
+---
+
+import CtiIntegrationTile, { ctiIntegrations } from '@site/src/components/cti-integration-tile';
+
+CrowdSec has native integrations for the most common security platforms — enrich your workflows with IP reputation data without writing any code.
+
+If your platform isn't listed, the API is a standard REST interface you can query directly:
+
+```shell
+curl -H "x-api-key: $API_KEY" https://cti.api.crowdsec.net/v2/smoke/1.2.3.4 | jq .
+```
+
+For the full reference, see the [Swagger documentation](https://crowdsecurity.github.io/cti-api/).
+
+---
+
+
CrowdSec tracks malicious IPs across hundreds of thousands of real deployments worldwide.
+ Every lookup gives you behavioral context — what the IP was doing, where, and when.
+
+
+{/* Quick access strip — same pattern as "Already running CrowdSec?" on the homepage */}
+
+ Quick access
+
+ 🔍 Look up an IP
+ 🔑 Get an API key
+ 🎯 Hunt for threats
+
+
+
+{/* ── What makes CrowdSec CTI different ───────────────────────────────── */}
+
+
+
Why CrowdSec CTI
+
What makes it different
+
+ Most IP reputation services tell you an IP is "bad." CrowdSec tells you what it was doing — data from real deployments detecting real attacks, not honeypots.
+
+
+ {[
+ { icon: "🌍", title: "Crowdsourced from live attacks", desc: "Signals from active CrowdSec installs globally. When an IP appears here, hundreds of machines saw it in action." },
+ { icon: "🧠", title: "Behavioral, not just reputation", desc: "What was the IP doing? Brute-force, CVE exploitation, scan, credential stuffing — mapped to MITRE ATT&CK." },
+ { icon: "⚡", title: "Real-time, not cached lists", desc: "Continuously updated. Time-windowed scores show if a threat is rising, stable, or decaying." },
+ { icon: "🔬", title: "CVE-level exploit tracking", desc: "The Live Exploit Tracker shows which CVEs are actively exploited, with momentum and opportunity scores." },
+ ].map(({ icon, title, desc }) => (
+
+ {icon}
+
+
{title}
+
{desc}
+
+
+ ))}
+
+
+
+{/* ── How do you want to use it? ──────────────────────────────────────── */}
+
+
+
Entry points
+
How do you want to use it?
+
+ {[
+ {
+ badge: "🔍 No setup needed", icon: "🖥️", accent: BLUE,
+ title: "Investigate in the Console",
+ desc: "Search any IP instantly. Explore threat history and the top aggressive IPs in the last 24h — no API key needed.",
+ links: [{ label: "Web UI guide →", href: "/u/console/ip_reputation/intro" }, { label: "IP Report →", href: "/u/console/ip_reputation/ip_report" }],
+ },
+ {
+ badge: "⚙️ Developer / SecOps", icon: "🔌", accent: ORANGE,
+ title: "Integrate via API",
+ desc: "Enrich SIEM alerts, build enrichment pipelines, or plug into Splunk, Sentinel, QRadar, TheHive, and more.",
+ links: [{ label: "API quickstart →", href: "/u/cti_api/api_introduction" }, { label: "All integrations →", href: "/u/cti_api/api_integration/integration_intro" }],
+ },
+ {
+ badge: "🎯 Threat hunter", icon: "🚨", accent: PURPLE,
+ title: "Hunt for threat patterns",
+ desc: "Advanced Search with live faceted filters — behavior, country, AS, CVE — to find campaigns or build blocklists.",
+ links: [{ label: "Advanced search →", href: "/u/console/ip_reputation/search_ui_advanced" }, { label: "Live Exploit Tracker →", href: "/u/tracker_api/intro" }],
+ },
+ ].map(({ badge, icon, accent, title, desc, links }) => (
+
+
+{/* ── Need help ───────────────────────────────────────────────────────── */}
+
+
+
+
Need help?
+
Get answers in Discord or check the FAQ.
+
+
+ 💬 Join Discord
+ ❓ View FAQ
+ 📚 API Reference
+
+
diff --git a/crowdsec-docs/unversioned/integrations/intro.mdx b/crowdsec-docs/unversioned/integrations/intro.mdx
index 25e8900e5..ab41909e5 100644
--- a/crowdsec-docs/unversioned/integrations/intro.mdx
+++ b/crowdsec-docs/unversioned/integrations/intro.mdx
@@ -11,6 +11,7 @@ import Tabs from '@theme/Tabs';
import TabItem from '@theme/TabItem';
import CodeBlock from '@theme/CodeBlock';
import UnderlineTooltip from '@site/src/components/underline-tooltip';
+import IntegrationTile, { firewallIntegrations } from '@site/src/components/integration-tile';
CrowdSec Blocklist Integrations — also known as **Blocklist as a Service** — give you a secure, hosted HTTPS endpoint serving live blocklists that you configure your firewall or security tool to pull from.
@@ -41,27 +42,37 @@ Pulling more frequently than the allowed interval for your plan will result in H
## Available integrations
+
### Firewall integrations
Each vendor page explains how to create the integration in the CrowdSec Console and includes a link to the vendor's own documentation on how to configure ingestion on the firewall side.
-| Firewall | Vendor feature name |
-|---|---|
-| [Checkpoint](integrations/checkpoint.mdx) | Custom Intelligence (IoC) Feeds |
-| [Cisco](integrations/cisco.mdx) | Security Intelligence feeds |
-| [F5](integrations/f5.mdx) | External IP blocklist / Feed lists |
-| [Fortinet](integrations/fortinet.mdx) | IP address Threat Feeds |
-| [Juniper](integrations/juniper.mdx) | Security Dynamic Address feeds |
-| [Mikrotik](integrations/mikrotik.mdx) | — |
-| [OPNsense](integrations/opnsense.mdx) | URL Table (IPs) aliases |
-| [Palo Alto](integrations/paloalto.mdx) | External Dynamic Lists (EDL) |
-| [pfSense](integrations/pfsense.mdx) | URL Table (IPs) aliases |
-| [Sophos](integrations/sophos.mdx) | Third-Party Threat Feeds |
+
### Other integrations
-- [Raw IP List](integrations/rawiplist.mdx) — generic format, works with any HTTP-capable device
-- [Remediation Component](integrations/remediationcomponent.mdx) — for platforms without native IP list ingestion (Cloudflare, AWS WAF, etc.)
+
+
+ One IP per line — compatible with virtually any firewall, router, or HTTP-capable device
+
+
+ Extends blocklist handling to platforms without native ingestion (Cloudflare, AWS WAF, …) via CrowdSec Remediation Components
+
+