R2i Announces the Latest Release of its Network Intelligence Search Service Musubu.io

Share Article

Enterprises Can Now Gain Extra Visibility into Vulnerabilities from Their Public Facing Endpoints and Perform Valuable Network Security Surveys More Efficiently

News Image
"Musubu is focused on the network of origin in context as well as what threat is posed by the subnet and broader environment of origin. It’s a great complement to Shodan.io that extends their valuable info even further."

R2i, a provider of cybersecurity analysis services and products, announces the latest release of Musubu.io and its underlying API, which allows organizations to have easy access to detailed network information from their own endpoints efficiently and in bulk using simple queries to the Musubu API. With the latest version of the service, customers can easily assess the security risk posed by their publicly exposed networks, as well as survey their network environments to identify both potential threats and misleading false positive results. This allows customers to quickly filter out non-actionable [false positive] data and focus on the true threats to their organization.

"Companies need more than just aggregated network threat data," said Wayne Wheeles, CEO, R2i. "Musubu is focused on the network of origin in context as well as what threat is posed by the subnet and broader environment of origin. It’s a great complement to Shodan.io that extends their valuable info even further."

Musubu is designed to complement other network security and information services by providing an enhanced set of judgments that gives the user an actual sense of the overall security posture of the network via the Musubu scoring system.

Musubu scoring includes:

  • threat_potential_score_pct – Numeric threat score between 0-100. The Score is calculated using “blacklist class,” “blacklist neighbors,” number of recent observations and country of origin.
  • threat_classification – Classification derived from “threat potential score pct”

High – Threat score greater than 70
Medium – Threat score from greater than 40 but less than 70
Low – Any IP unlisted with a threat score less than 20
Nuisance – Threat score less than 40

  • blacklist_class – Field classifying the specific threat vector that has been identified. Contains one of the following values: apache, blacklisted, botnet, botnetcnc, brute force, compromised, ftp, http, imap, mail, malware, phishing, ransomware, shunned, sips, ssh, TOR, worm, zeus
  • blacklist_class_cnt – Field providing the number of sources which have identified the address as malicious.
  • blacklist_network_neighbors – Field providing the number of addresses present on the same subnet which have been identified as malicious.
  • blacklist_observations – Field providing the number of observations (of this IP) in the last 90 days.

Companies and organizations are already using the Musubu API and integrating its data into their own applications and network security procedures.

"The Musubu tool has been a great asset to our company and clients. It allows us to quickly filter out non-actionable [false positive] entities and focus on the true threats to the organization, hence increasing our efficiency and responsiveness to our clients," said Stan Blanton, CTO @RISK Technologies.

The latest release of Musubu is available now at https://musubu.io/. Users can try the network information service live by searching up to 50 IP addresses per day free with simple email registration.

ABOUT R2i

Founded by Wayne Wheeles, CEO, in early 2014, Release 2 Innovations (R2i) is the realization of a vision two decades in the making. R2i unifies several disciplines: cybersecurity, threat intelligence, and data science. Our team comes to the table with over five decades of experience in cybersecurity across both the federal and commercial landscapes. Our commitment to our clients will always focus on delivering results-driven solutions.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Bradford Lee
Visit website