Help Center← Back to Dashboard
Getting Started
What is Aithroyz?Quickstart: First EnvironmentCloud CredentialsPlans & Approvals
Environments
OverviewLifecycle PhasesTTL Auto-DestroyExtending TTLDestroying an Environment
Tools Reference
OverviewElastic Stack (SIEM)Wazuh (XDR)MITRE CalderaTheHive & DFIR-IRISVelociraptorOpenCTIGrafana + PrometheusShuffle SOARn8nUptime KumaLLM GatewayOpen WebUIFlowiseOpenClawOllamaQdrantLangfusePortainerGiteaSonarQubeCode ServerMattermostMinIOMetabaseHashiCorp VaultKeycloak SSONetBoxLocalStack
Access & Security
Google SSOTenant IsolationPasskeys & MFATeam Members
API & Integrations
API KeysMCP Tools (Clevername)Terraform ExportWebhooks & Callbacks
Stack Presets
SOC PlatformIR / DFIR LabThreat HuntingQuick Sandbox
Settings
Cloud KeysAPI KeysBillingAudit Log
Troubleshooting
Common IssuesDeployment FailuresDNS & ConnectivityTool Health Checks
Aithroyz Help
Help CenterTools ReferenceOpenCTI

OpenCTI

OpenCTI is a cyber threat intelligence platform for managing IOCs, threat actors, campaigns, and STIX/TAXII feeds. Use it to contextualize alerts with threat intelligence.

Aithroyz deploys OpenCTI v6 with Elasticsearch, RabbitMQ, and MinIO as backing services. The admin token is a valid UUID generated at provisioning time. Demo threat indicators are seeded on first boot.

Access

URL: https://opencti.<env-name>.ops.aithroyz.com
Admin email: admin@aithroyz.local — password shown in Environments detail
⚠
OpenCTI v6 takes 5–10 minutes to fully initialize on first boot. The health check may show amber during this time. Do not restart the container — wait for initialization to complete.

Connecting a TAXII feed

Go to Data → Ingestion → TAXII Feeds. Add the URL of a TAXII 2.1 server (e.g. CIRCL, MITRE ATT&CK). OpenCTI will automatically pull and parse STIX 2.1 bundles, creating indicators, threat actors, and campaigns in the knowledge graph.

Related Articles
Elastic Stack (SIEM)Read article →Wazuh (XDR)Read article →IR / DFIR Lab PresetRead article →