Optimize threat intelligence data processing with the "Pangea - IP Address Enrichment with Cache" workflow template. Upon receiving an IP address input, it first consults a local cache for any cached reputations from the last 24 hours. If present, it instantly delivers the stored data back to the initiating workflow, speeding up response times. If the data is uncached, it queries Pangea for a detailed reputation analysis, then saves the information for future requests, substantially reducing redundant external lookups and conserving API usage. This efficient mechanism ensures swift threat intelligence enrichment for IP reputation management in cybersecurity applications.
Optional Triggers
"This workflows is intended to be used as a function."
Use Cases
Function, Threat Intelligence Enrichment
Workflow Breakdown
Receives an IP Address as input.
Lookup global variables for cached responses in the past 24 hours.
If reputation is found on local cache, the saved data is returned to the parent workflow.
When no reputation is found in cache, a summary of the analysis data is created and saved with the original api data.
Vendors
Utils, Torq, Pangea
Workflow Output
Returns full analysis data and a summary of the information.
Tips
Set \"Provide Raw Data Analysis\" to true or false to add or remove original vendor information to the output