Privacy Policy of

This policy describes the information collected during registration for and directly through the IOCFlow Website.


IOCFlow will deem that your independent decision to access and use the Website constitutes an act of acceptance to the terms and conditions of this Privacy Policy and that you have given your permission to us to collect, use, and disclose your information in accordance herewith.

You acknowledge (a) that you have read and understood this Privacy Policy; and (b) this Privacy Policy shall have the same force and effect as a signed agreement.
We reserve the right to modify or discontinue the IOCFlow Project (or any portion of it), temporarily or permanently, with or without notice to you, and are not obligated to support or update.

You agree that IOCFlow shall not be liable to you or any third party in the event that we exercise our right to modify or discontinue the IOCFlow Project. Unless explicitly stated otherwise, any new features that augment or enhance the current IOCFlow Project shall be subject to this Privacy Policy.

This Privacy Policy was last revised on May 28, 2017. We may change or add to this Privacy Policy, so we encourage you to review it periodically. If we materially change this Privacy Policy, we’ll let you know by showing it to you again when you open the IOCFlow Web.

Full policy

Data Controller and Owner

Types of Data collected

The owner does not provide a list of Personal Data types collected.
Other Personal Data collected may be described in other sections of this privacy policy or by dedicated explanation text contextually with the Data collection.
The Personal Data may be freely provided by the User, or collected automatically when using this Application.

Any use of Cookies - or of other tracking tools - by this Application or by the owners of third party services used by this Application, unless stated otherwise, serves to identify Users and remember their preferences, for the sole purpose of providing the service required by the User. Failure to provide certain Personal Data may make it impossible for this Application to provide its services.

Users are responsible for any Personal Data of third parties obtained, published or shared through this Application and confirm that they have the third party's consent to provide the Data to the Owner.

Mode and place of processing the Data

Methods of processing

The Data Controller processes the Data of Users in a proper manner and shall take appropriate security measures to prevent unauthorized access, disclosure, modification, or unauthorized destruction of the Data.
The Data processing is carried out using computers and/or IT enabled tools, following organizational procedures and modes strictly related to the purposes indicated. In addition to the Data Controller, in some cases, the Data may be accessible to certain types of persons in charge, involved with the operation of the site (administration, sales, marketing, legal, system administration) or external parties (such as third party technical service providers, mail carriers, hosting providers, IT companies, communications agencies) appointed, if necessary, as Data Processors by the Owner. The updated list of these parties may be requested from the Data Controller at any time.


The Data is processed at the Data Controller's operating offices and in any other places where the parties involved with the processing are located. For further information, please contact the Data Controller.

Retention time

The Data is kept for the time necessary to provide the service requested by the User, or stated by the purposes outlined in this document, and the User can always request that the Data Controller suspend or remove the data.

The use of the collected Data

The Data concerning the User is collected to allow the Owner to provide its services, as well as for the following purposes: Hosting and backend infrastructure and Infrastructure monitoring.
The Personal Data used for each purpose is outlined in the specific sections of this document.

Detailed information on the processing of Personal Data

Personal Data is collected for the following purposes and using the following services:

Hosting and backend infrastructure

These services have the purpose of hosting data and files that enable this Application to run and be distributed as well as to provide a ready-made infrastructure to run specific features or parts of this Application. Some of these services work through geographically distributed servers, making it difficult to determine the actual location where the Personal Data are stored.

Infrastructure monitoring

These services allow this Application to monitor the use and behavior of its components so its performance, operation, maintenance and troubleshooting can be improved. Which Personal Data are processed depends on the characteristics and mode of implementation of these services, whose function is to filter the activities of this Application.

Additional information about Data collection and processing

Legal action

The User's Personal Data may be used for legal purposes by the Data Controller, in Court or in the stages leading to possible legal action arising from improper use of this Application or the related services. The User declares to be aware that the Data Controller may be required to reveal personal data upon request of public authorities.

Additional information about User's Personal Data

In addition to the information contained in this privacy policy, this Application may provide the User with additional and contextual information concerning particular services or the collection and processing of Personal Data upon request.

System Logs and Maintenance

For operation and maintenance purposes, this Application and any third party services may collect files that record interaction with this Application (System Logs) or use for this purpose other Personal Data (such as IP Address).

Information not contained in this policy

More details concerning the collection or processing of Personal Data may be requested from the Data Controller at any time. Please see the contact information at the beginning of this document.

The rights of Users

Users have the right, at any time, to know whether their Personal Data has been stored and can consult the Data Controller to learn about their contents and origin, to verify their accuracy or to ask for them to be supplemented, cancelled, updated or corrected, or for their transformation into anonymous format or to block any data held in violation of the law, as well as to oppose their treatment for any and all legitimate reasons. Requests should be sent to the Data Controller at the contact information set out above.
This Application does not support “Do Not Track” requests.
To determine whether any of the third party services it uses honor the “Do Not Track” requests, please read their privacy policies.

Changes to this privacy policy

The Data Controller reserves the right to make changes to this privacy policy at any time by giving notice to its Users on this page. It is strongly recommended to check this page often, referring to the date of the last modification listed at the bottom. If a User objects to any of the changes to the Policy, the User must cease using this Application and can request that the Data Controller removes the Personal Data. Unless stated otherwise, the then-current privacy policy applies to all Personal Data the Data Controller has about Users.


If you believe that IOCFlow has not complied with this Privacy Policy, or if you have any other complaint with regard to collection, use or disclosure of personal information by IOCFlow, you may send a written notice of complaint to:


Legal information

Notice to European Users: this privacy statement has been prepared in fulfillment of the obligations under Art. 10 of EC Directive n. 95/46/EC, and under the provisions of Directive 2002/58/EC, as revised by Directive 2009/136/EC.
This privacy policy relates solely to this Application.

Cost-effective Threat Intelligence

Are your IDS/IPS systems starving? IOCFlow provides extensive cyber threat intelligence to feed your security devices.

Protect Your Users

Feed your protection mechanisms with real-time data, be it malware, malicious word documents and even malicious URLs!

Highly Customizable

If you need to protect users against certain threats, you can choose which threats you wish to stop! And it's all documented!

Friendly Admin

Need to distribute your API key? No problem, you can customize who has access to your feed!

Get access to our panel

You will be able to see daily statistics and customize your API keys!

Choose your package

IOCFlow is offered in three different packages to fit your needs.


  • Malicious binaries
  • Malicious Office macros
  • Malicious URLs
  • User agents


  • Malicious Android apps IOCs
  • Malicious Android packages
  • Malicious URLs


  • Malicious binaries
  • Malicious Office macros
  • Malicious Android apps IOCs
  • Malicious Android packages
  • Malicious URLs

Get in touch

Want to see what our feed looks like? Send us an e-mail and we will provide you with examples of the information you will receive!
Send us an email to or fill the form below to contact us.
* We don't share your personal info with anyone. Check out our Privacy Policy for more information.

Contact Address

C\Trinidad Grund 12, 1A-1B
Málaga, Spain

Call Us Today!

(T) +34 952 020 494


Contact us at