Build on Top of Polarity

Polarity makes it easy to leverage data you’ve already invested in and use it every day across all the people and tools you invested in.

Our dynamic Integration Framework was designed to make it easy to customize the community's existing open source integrations or create your own.

To create an integration you define three things: 1. Type of information you want Polarity to recognize. 2. What action to take, such as search to run or API to connect to. 3. What to overlay on users’ screens, such as interactive maps, graphs, or textual data.

Have a tool you’d like to see integrated with Polarity? Let us know at

If you would like to partner with us, please send us an email to

Here are examples of integrations built by customers, partners, and Polarity. To view the full list or to contribute, please visit -

Unix Epoch time integration

Occasionally our users come across UNIX Epoch time, the representation of time as the number of seconds elapsed since January 1st, 1970. Polarity automatically converts Epoch time to a readable time.

IBM X-Force Logo

IBM X-Force Exchange is a cloud-based threat intelligence sharing platform enabling users to rapidly research the latest security threats, aggregate actionable intelligence and collaborate with peers.

Phantom Logo

The Phantom Platform integrates your existing security technologies, providing a layer of connective tissue between them.

Threshing Logo

ThreshingFloor helps you differentiate targeted attacks from internet background noise.

Shodan Logo

Shodan is the world’s first search engine for internet connected devices. Shodan has servers located around the world that crawl the Internet 24/7 to provide the latest Internet intelligence.

Q Radar Logo Logo

IBM® QRadar® SIEM detects anomalies, uncovers advanced threats and removes false positives.

Alien Vault Logo

AlienVault’s OTX allows security researchers and threat data producers to share research and investigate new threats. Anyone interested in threat intelligence can take advantage of OTX.

Threat Connect Logo

ThreatConnect is a threat intelligence, analytics, and orchestration in one platform that will save your team time while making informed decisions for your security operations and strategy.

Crits Logo

CRITs is an open source malware and threat repository that leverages other open source software to create a unified tool for analysts and security experts engaged in threat defense.

Google Maps Logo

Google Maps is a web mapping service developed by Google that offers satellite imagery, street maps, 360° panoramic views of streets.

Looking Glass Logo

LookingGlass ScoutPrime is a threat intelligence platform designed to discover, contextualize, prioritize, and orchestrate new and emerging cyber threats.

Active Directory Logo

Microsoft Active Directory is a directory service developed for Windows domain networks.

Full Contact Logo

FullContact’s enrichment APIs let you transform partial identities into complete profiles to connect with prospects, capture audience insights, and enhance customer experiences.

ThreatQ Logo

ThreatQ is a threat intelligence platform designed to accelerate security operations through context, prioritization, and automation, providing security teams greater focus and better decision making.

ReversingLabs Logo

ReversingLabs delivers industry-leading threat detection and analysis solutions that address the latest generation of cyber attacks.

IP Info Logo

The ipinfo core API product returns geolocation, ASN, and hostname information for an IP address.


ARIN is the nonprofit corporation that manages distribution of IPv4 & IPv6 address space and ASNs and offers public access to ARIN registration data.

Service Desk Plus Logo

ServiceDesk Plus MSP is a web based, ITIL-ready help desk software designed specifically for managed service providers.

Farsight Security Logo

Farsight Security’s DNSDB™ is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure.


The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.


Anomali STAXX gives you an easy way to access any STIX/TAXII feed. The STAXX Portal equips users with tools for researching Indicators of Compromise (IOCs).

Anomali Logo

Anomali ThreatStream is a Threat Intelligence Platform that speeds detection of threats by uniting your security solutions under one platform and providing tools to operationalize threat intelligence.

Virus Total Logo

Analyze suspicious files and URLs to detect types of malware including viruses, worms, and trojans.

Elastic Search Logo

Reliably and securely take data from any source, in any format, and search, analyze, and visualize it in real time.

CVE Logo

CVE Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.

MaxMind Logo

MaxMind GeoIP2 data identifies the location and other characteristics of Internet users for a wide range of applications including fraud detection, traffic analysis, compliance, and geo-targeting.

Wiki Logo

Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.

Carbon Black Logo

Carbon Black Response is a highly scalable, real-time EDR with unparalleled visibility for top security operations centers and incident response teams

SQL Logo

Microsoft SQL Server is a relational database management system. This integration provides a template for connecting to SQL Server to return data from user-defined queries.

Reddis Logo

Redis is an open source, in-memory data structure store, used as a database, cache and message broker. This integration provides a template for connecting to Redis to return data from user-defined queries.

UPS Logo

UPS Developer APIs allow users to display the status and location of packages from UPS.

Splunk Logo

Splunk is a platform for aggregating, analyzing, searching and monitoring machine-generated data to make machine data accessible, usable, and valuable to everyone.

Pool Party Logo

PoolParty is a world-class semantic technology suite that offers sharply focused solutions to your knowledge organization and content business.

Google Safe Browsing Logo

Google Safe Browsing helps protect over three billion devices every day by showing warnings to users when they attempt to navigate to dangerous sites or download dangerous files.

Domain Tools Logo

DomainTools helps security analysts turn threat data into threat intelligence by taking network indicators, including domains and IPs, and connecting them with nearly every active domain on the Internet.

Want to learn more?

See Polarity in more detail, or check out our blog

Read blog Try it free