To protect the company's network from imminent threats, you need to input threat information into security devices in a digital format to block and identify malicious inbound and outbound traffic. Which type of threat intelligence will you use for this task?