To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.
This is a summary describing a grouping of datasets. The full list is show below. Please request the sub-datasets individually.


Cyber Threat Indicators
DHS Cybersecurity and Infrastructure Security Agency
DHS Cybersecurity and Infrastructure Security Agency
53 (lowest rank is 53)

Category & Restrictions

cyber attack


Cyber threat Indicators

In 2016 DHS began the Automated Indicator Sharing (AIS) initiative. Through AIS, DHS enables the exchange of cyber threat indicators in a machine-readable (XML) format between the Federal Government and the private sector. Threat indicators are pieces of information like malicious IP addresses or the sender address of a phishing email (although they can also be much more complicated).

Organizations sharing indicators use the Traffic Light Protocol (TLP) ( ) to mark the indicators for sensitivity and control how widely they can be shared. While AIS exchanges TLP White, Green, and Amber indicators, the indicators available on this site are just the ones marked TLP White from CY16 through CY18. If you are interested in receiving all the AIS indicators and in near-real-time as they are exchanged, more information on how to directly participate in AIS is available at .

The AIS indicators available on this site are in the Structured Threat Information Expression (STIX) version 1.1 XML format. Additional information about STIX 1.x can be found at, while specific AIS field information is documented at .

Additional Details

cybercrime, spamming, information sensitivity, cryptographic protocol, communication protocol, application layer protocols, data serialization formats, transport layer security, real time computing, dhs cybersecurity and infrastructure security agency, xml, embedded system, internet protocol, email, 1190, phishing, uniform resource identifier, github, hypertext transfer protocol, internet security, computer file formats, technical communication, cyberwarfare, secure communication, history of computing, cyberattack, traffic light protocol, cyber threat indicators, threat, exploit

Dataset Group

This is the summary for the group