<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=6991466&amp;fmt=gif">
Skip to main content

Data Connectors

Empowering you with the insights needed for actionable intelligence.

Available for Analysis Studio, Analysis Hub and i2 Analyst's Notebook subscription bundle.

i2 Connectors_3D_White_with icons_1080px

Accelerate your data discovery

At i2 Group, we integrate the most reliable data sources into the world’s most respected visual analysis platform.

Our vision is clear: to create an interconnected network of data sources that seamlessly integrate with both low-side and high-side systems, optimizing the analysis workflow.

But it’s not just about plugging in data, it’s about curating the right data. Each connector is designed in close collaboration with data providers to ensure it enhances real-world workflows and delivers unique value. With support for both cloud and on-premise deployments, our connected ecosystem empowers users across sectors - defense, national security, law enforcement, and financial services - to move faster, uncover deeper insights, and act with confidence.

i2 Data Connectors are purpose-built integrations that bridge the gap between investigative tools and trusted third-party data sources, delivering real-time access to the intelligence that analysts need the most.

Seamlessly integrated into the i2 suite of products, including i2 Analyst’s Notebook Subscription, Analysis Studio, and Analysis Hub, these connectors can replace manual imports and allow users to filter, structure, and query data directly within the i2 Analyst's Notebook platform. From blockchain intelligence and cyber threat indicators to credit bureau and OSINT data, i2 Data Connectors transform static workflows into dynamic, insight-driven operations.

Unlock seamless access to OSINT, Dark Web, Credit Bureau, Address, Cryto, Keyword, KYC data, PII, IP and more.

Our current Data Connectors

Logo - Janes

Janes

Delivering a complete collection of open-source defence and security intelligence to support your mission.

Logo - Moodys Analytics

Moody's Grid

Grid is a comprehensive risk database of adverse media, sanctions, watchlists, and PEPs.

Orbis 350

Moody's Orbis

Orbis is a powerful comparable data resource on private companies—and it covers listed companies too. 

Logo - LexisNexis

LexisNexis

Accurint® is a direct connection to public records to help verify identities, conduct investigations and detect fraud. US-only.

Logo - Thomson Reuters

Thomson Reuters Clear

Bring key content together to connect the facts and provide intelligent analytics through one solution with CLEAR, a public records technology tool. US-only.

Logo - Chainalysis

Chainalysis

Mission-critical intelligence to navigate crypto crime, ensure compliance, and advance investigations.

Logo - DS Compliance

DS Compliance

An AI platform that processes, transcribes and analyses audio files for the detection and identification of keywords.

Logo - Fivecast

Fivecast

Fivecast is a global provider of open-source intelligence solutions, delivering targeted data collection and AI-enabled risk analytics.

Logo - Intel471

Intel471

Intel 471 empowers security teams to be proactive with relevant and timely insights into the cyber underground

Logo - Open Sanctions

OpenSanctions

OpenSanctions helps investigators find leads, allows companies to manage risk and enables technologists to build data-driven products.

Logo - Pipl

Pipl

Pipl provides a complete picture of digital identities and connects them to real people and their offline identity records.

Logo - ShadowDragon

ShadowDragon

Go beyond profiles and explore social networks and activity to expedite your investigations and threat analysis

Logo - Shodan

Shodan

Shodan is the world's first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.

Logo - SpyCloud

SpyCloud

Dynamic insights on malware-infected devices, compromised users, and exposed applications to prevent ransomware, ATP and targeted attacks.

Logo - TRM

TRM Labs

TRM Labs provides data solutions and blockchain intelligence on crypto, digital asset fraud and financial crime.

Logo - companies house

UK Companies House

UK Companies House incorporates and dissolves limited companies. They register company information and make it available to the public.

Logo - Virus Total

VirusTotal

Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

Become a data connector partner

Interested in becoming a data connector partner?
Get in touch...
New article

Maximizing investigative insight: The strategic value of third-party data integrations

In today's world of complex threats, intelligence and investigative professionals must be more agile, far more intelligent in how they work and operate with greater context than ever before.

Natalie Cline, i2 Group’s Global Alliances Lead, explains how the visual analysis leader empowers analysts to uncover hidden connections, relationships, and patterns within its suite of products, amplifying its true power by pairing with the right third-party data...