<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//threatconnect.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://threatconnect.com/marketplace/</loc>
		<lastmod>2026-03-26T15:56:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/mcafee/</loc>
		<lastmod>2024-12-11T18:43:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/McAfee-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/bayse/</loc>
		<lastmod>2024-12-11T18:43:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/wordmark_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/inquest/</loc>
		<lastmod>2024-12-11T18:44:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/12/Inquest-logo-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/sigma/</loc>
		<lastmod>2024-12-11T18:44:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/sigma-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/urlcrazy/</loc>
		<lastmod>2024-12-11T18:50:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/urlcrazy-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/group-ib/</loc>
		<lastmod>2024-12-11T19:04:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/GIB-Small-Black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/screenshot-machine/</loc>
		<lastmod>2024-12-11T19:06:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/screenshotmachine.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/robtex/</loc>
		<lastmod>2024-12-11T19:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/robtex-logo-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/plyara/</loc>
		<lastmod>2024-12-11T19:07:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/plyara.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/ipqualityscore/</loc>
		<lastmod>2024-12-11T19:07:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/IPQS-logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/bolster/</loc>
		<lastmod>2024-12-11T19:07:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Bolster_logo.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/zoom/</loc>
		<lastmod>2024-12-11T19:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/zoom-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/twilio/</loc>
		<lastmod>2024-12-11T19:07:32+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/twilio-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/blackberry/</loc>
		<lastmod>2024-12-11T19:07:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/BlackBerry-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/centripetal-networks/</loc>
		<lastmod>2024-12-11T19:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/10/centripetal-networks-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/securityscorecard/</loc>
		<lastmod>2024-12-11T19:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-Security-Scorecard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/secneurx/</loc>
		<lastmod>2024-12-11T19:09:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-SecneurX.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/qintel/</loc>
		<lastmod>2024-12-11T19:09:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-Qintel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/malware-patrol/</loc>
		<lastmod>2024-12-11T19:09:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-Malware-Patrol.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/flare/</loc>
		<lastmod>2024-12-11T19:09:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/03/flare-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/bambenek-consulting/</loc>
		<lastmod>2024-12-11T19:10:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-Bambenek-Consulting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/threatfabric/</loc>
		<lastmod>2024-12-11T19:10:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatFabric-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/threatstop/</loc>
		<lastmod>2024-12-11T19:10:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/threatstop2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/any-run/</loc>
		<lastmod>2024-12-11T19:10:45+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Partners-ANY.RUN_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/mimecast/</loc>
		<lastmod>2024-12-11T19:10:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Partners-Mimecast.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/logrhythm/</loc>
		<lastmod>2024-12-11T19:11:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/logrhythm-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/intelfinder/</loc>
		<lastmod>2024-12-11T19:11:13+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-IntelFinder-logo-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/infosys/</loc>
		<lastmod>2024-12-11T19:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Partners-MSSP-Infosys-Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/polyswarm-2/</loc>
		<lastmod>2024-12-11T19:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/PolySwarm-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cybersixgill-2/</loc>
		<lastmod>2024-12-11T19:12:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Partners-Cybersixgill-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/bitdefender/</loc>
		<lastmod>2024-12-11T19:12:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Bitdefender-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/infoblox/</loc>
		<lastmod>2024-12-11T19:12:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Infoblox-Logo-Website-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/fortinet/</loc>
		<lastmod>2024-12-11T19:12:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Fortinet-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/joe-security/</loc>
		<lastmod>2024-12-11T19:12:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Joe-Security-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/bandura-cyber-2/</loc>
		<lastmod>2024-12-11T19:13:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Bandura-Cyber-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/secureworks/</loc>
		<lastmod>2024-12-11T19:13:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Secureworks-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/lastline/</loc>
		<lastmod>2024-12-11T19:13:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Lastline-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/energysec-community/</loc>
		<lastmod>2024-12-11T19:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/EnergySec-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/micro-focus/</loc>
		<lastmod>2024-12-11T19:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/MicroFocus-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/malformity-labs/</loc>
		<lastmod>2024-12-11T19:13:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Malformity-Labs-Logo-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/kaspersky-2/</loc>
		<lastmod>2024-12-11T19:14:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Kaspersky-Logo-Website-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/df-labs-2/</loc>
		<lastmod>2024-12-11T19:14:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/DF-Labs-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/attivo-networks/</loc>
		<lastmod>2024-12-11T19:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Attivo-Networks-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/fidelis/</loc>
		<lastmod>2024-12-11T19:14:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/fidelis-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/openc2/</loc>
		<lastmod>2024-12-11T19:14:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Open-C2-Website-Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/oasis/</loc>
		<lastmod>2024-12-11T19:14:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Oasis-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/guidepoint/</loc>
		<lastmod>2024-12-11T19:14:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Guidepoint-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/liquid-pc/</loc>
		<lastmod>2024-12-11T19:14:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Liquid-PC-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/carahsoft/</loc>
		<lastmod>2024-12-11T19:15:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/carahsoft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/optiv/</loc>
		<lastmod>2024-12-11T19:15:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/optiv.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/rsa-netwitness-2/</loc>
		<lastmod>2024-12-11T19:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/RSA-Website-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/tanium/</loc>
		<lastmod>2024-12-11T19:16:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Tanium-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/palo-alto/</loc>
		<lastmod>2024-12-11T19:16:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Web-logo_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/r-cisc/</loc>
		<lastmod>2024-12-11T19:16:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/partner-rcisc-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/forward-networks/</loc>
		<lastmod>2024-12-19T16:18:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Forward-networks_logo_RGB.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/qualys/</loc>
		<lastmod>2024-12-20T19:06:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Qualys-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/threatquotient/</loc>
		<lastmod>2024-12-20T20:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/tq_main-logo-color.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/sumo-logic/</loc>
		<lastmod>2024-12-26T16:39:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Technology-Partner-sumo-logic-full-color-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/sophos/</loc>
		<lastmod>2024-12-26T18:30:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/12/sophos_logo_150px_rgb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/hyas/</loc>
		<lastmod>2024-12-27T19:31:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/HYAS-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/imperva/</loc>
		<lastmod>2024-12-30T18:46:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Imperva_logo_color.svg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/securonix/</loc>
		<lastmod>2024-12-30T20:30:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/649948855748746.8KcfQVEdkyzvkaTM3sd9_height640.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/orca-security/</loc>
		<lastmod>2024-12-31T18:11:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/Orca-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/scamalytics/</loc>
		<lastmod>2025-01-08T20:11:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Scamalytics_Logo_horizontal_no_background_no_strapline-1024x226-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/hybrid-analysis/</loc>
		<lastmod>2025-01-10T18:54:29+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Hybrid-Analysis.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/binaryedge/</loc>
		<lastmod>2025-01-14T16:59:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/BinaryEdge-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/servicenow/</loc>
		<lastmod>2025-01-17T21:07:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ServiceNow-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/analyst1/</loc>
		<lastmod>2025-01-28T19:08:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/analyst1.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/alphamountain/</loc>
		<lastmod>2025-01-28T19:08:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/alphaMounatin-logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/ecrimex/</loc>
		<lastmod>2025-01-28T19:13:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/EcrimeX-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/apivoid/</loc>
		<lastmod>2025-01-28T19:16:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Technology-Partners-apivoid-Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/archer/</loc>
		<lastmod>2025-01-28T20:30:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/10/archer-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/arin/</loc>
		<lastmod>2025-01-28T20:37:59+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/ARIN_logo.svg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/site/</loc>
		<lastmod>2025-01-29T18:20:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/site_logo_Dark_Green_CMYK-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/axonius/</loc>
		<lastmod>2025-02-05T20:23:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Axonius_Logo_-_Horizontal.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/bitsight/</loc>
		<lastmod>2025-02-05T20:39:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/05/Bitsight.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/chatgpt/</loc>
		<lastmod>2025-02-05T21:01:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/ChatGpt-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/confluence/</loc>
		<lastmod>2025-02-05T21:15:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Atlassian_Confluence_2017_logo.svg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/dragos/</loc>
		<lastmod>2025-02-05T21:29:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Dragos-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/dynatrace/</loc>
		<lastmod>2025-02-05T21:45:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/dynatrace_web.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/fortress/</loc>
		<lastmod>2025-02-06T18:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Fortress-logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/efficientip/</loc>
		<lastmod>2025-02-09T20:59:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/efficientip-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/armis/</loc>
		<lastmod>2025-02-09T21:12:12+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Armis-Logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/salesforce/</loc>
		<lastmod>2025-02-09T21:26:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Salesforce.com_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/zoominfo/</loc>
		<lastmod>2025-02-09T21:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/ZoomInfo_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/youtube/</loc>
		<lastmod>2025-02-09T21:43:11+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/YouTube_Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/linkedin/</loc>
		<lastmod>2025-02-09T23:37:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/LinkedIn_logo.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/zendesk/</loc>
		<lastmod>2025-02-09T23:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/zendesk-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/wikipedia/</loc>
		<lastmod>2025-02-09T23:53:47+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2018/05/Wikipedia-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/x/</loc>
		<lastmod>2025-02-10T00:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/x-logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/zscaler/</loc>
		<lastmod>2025-02-10T00:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/02/zscaler.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/yara-finder/</loc>
		<lastmod>2025-02-10T00:42:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Untitled-design-3-e1739148135631.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/sentinelone/</loc>
		<lastmod>2025-02-11T17:08:42+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/03/sentinelone-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/slack/</loc>
		<lastmod>2025-02-11T17:09:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/slack-logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/maxmind/</loc>
		<lastmod>2025-02-11T17:26:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/maxmind.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/elastic/</loc>
		<lastmod>2025-02-11T18:41:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/elastic-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/flashpoint/</loc>
		<lastmod>2025-02-11T18:53:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/partner-flashpoint-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/vuldb/</loc>
		<lastmod>2025-02-11T19:23:55+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/vuldb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/recorded-future-2/</loc>
		<lastmod>2025-02-11T20:27:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/Recorded-Future-Blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/github/</loc>
		<lastmod>2025-02-12T17:39:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/01/GitHub-Logo-ee398b662d42.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/jupiterone/</loc>
		<lastmod>2025-02-12T18:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/jupiterone.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/mongodb/</loc>
		<lastmod>2025-02-12T18:50:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/MongoDB_SlateBlue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/splunk/</loc>
		<lastmod>2025-02-15T19:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Splunk_Logo_Website-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/abuse-ipdb/</loc>
		<lastmod>2025-02-15T20:09:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/abuseipdb-logo.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/shodan/</loc>
		<lastmod>2025-02-15T23:17:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/shodan-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/ibm/</loc>
		<lastmod>2025-02-15T23:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/02/IBM_logo%C2%AE_pos_RGB.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/proofpoint/</loc>
		<lastmod>2025-02-16T00:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Proofpoint-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/tenable-2/</loc>
		<lastmod>2025-02-16T00:52:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/ThreatConnect-Technology-Partners-tenable-Full-Color-Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/misp/</loc>
		<lastmod>2025-02-16T22:46:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2017/09/MSIP-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/wiz/</loc>
		<lastmod>2025-02-16T23:01:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Wiz.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/aws/</loc>
		<lastmod>2025-02-18T19:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/AWS-Logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/intezer/</loc>
		<lastmod>2025-02-23T19:55:49+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/intezer-analyze-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/phishstats/</loc>
		<lastmod>2025-02-23T20:06:25+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/phishstats-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/crowdstrike/</loc>
		<lastmod>2025-02-23T22:05:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Crowdstrike-Logo_Website-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/osint-pivots/</loc>
		<lastmod>2025-02-24T05:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/int-osint.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/postgresql/</loc>
		<lastmod>2025-02-24T06:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/PostgreSQL_logo.3colors.540x557.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/ripe/</loc>
		<lastmod>2025-02-24T06:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/01/RIPE_NCC_Logo2015.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/zerofox/</loc>
		<lastmod>2025-02-24T18:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-ZF-Mark.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/sans-isc/</loc>
		<lastmod>2025-02-24T19:08:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/370x200_Red_STI-e1740424119876.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/local-calling-guide/</loc>
		<lastmod>2025-02-24T20:31:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/int-sym-localcall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/redis/</loc>
		<lastmod>2025-02-24T20:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Redis_Logo_Red_RGB.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/redmine/</loc>
		<lastmod>2025-02-24T20:58:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Redmine-Logo.wine_-e1740355510212.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/time-zone-converter/</loc>
		<lastmod>2025-02-24T22:42:16+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/World_Time_Zones_Map.svg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/alienvault-otx/</loc>
		<lastmod>2025-02-27T19:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/02/Host.io-logo-1-e1740682080969.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/phishme/</loc>
		<lastmod>2025-02-27T20:22:15+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cofense-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cortex-xsoar/</loc>
		<lastmod>2025-02-27T21:03:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/05/cortex-primary.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/carbon-black/</loc>
		<lastmod>2025-02-27T21:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2015/07/VMware-Carbon-Black-logo-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/dns-query/</loc>
		<lastmod>2025-02-27T21:53:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Host.io-logo-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/opencti/</loc>
		<lastmod>2025-02-28T19:31:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/07/Host.io-logo-3-e1740771065692.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cortex-xdr/</loc>
		<lastmod>2025-02-28T21:07:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/05/cortex-primary.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/whoisxmlapi/</loc>
		<lastmod>2025-02-28T21:30:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Whois-XML-API-LOGO.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/malwarebazaar/</loc>
		<lastmod>2025-03-04T16:23:20+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/03/Host.io-logo-5-e1741105375805.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/anomali/</loc>
		<lastmod>2025-03-04T19:08:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Anomali_Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/hackerone/</loc>
		<lastmod>2025-03-04T20:01:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/06/hackerone_logo_black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/h-isac-taxii-feed/</loc>
		<lastmod>2025-03-05T07:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Host.io-logo-7-e1741157848632.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/trapx/</loc>
		<lastmod>2025-03-05T07:11:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/commonvault-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/circl/</loc>
		<lastmod>2025-03-06T20:39:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/circl-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cisco/</loc>
		<lastmod>2025-03-06T21:10:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Cisco-Logo-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/microsoft-sentinel/</loc>
		<lastmod>2025-03-07T06:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Microsoft_Sentinel_logo1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/vmray/</loc>
		<lastmod>2025-03-07T06:56:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2015/08/Logo-Main-Dark.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/u-s-area-codes/</loc>
		<lastmod>2025-03-07T07:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/Host.io-logo-9-e1741331721302.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/accenture/</loc>
		<lastmod>2025-03-07T17:12:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Accenture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/subnet-calculator/</loc>
		<lastmod>2025-03-07T17:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/10/image-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/criminal-ip/</loc>
		<lastmod>2025-03-10T15:14:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/criminal-ip.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/crits/</loc>
		<lastmod>2025-03-10T15:16:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2017/04/CRITs-Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/fast-incident-response/</loc>
		<lastmod>2025-03-10T15:35:31+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/03/Logo-societe-generale-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/lolbas/</loc>
		<lastmod>2025-03-10T20:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/logo-LOLBAS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/majestic-million/</loc>
		<lastmod>2025-03-10T20:36:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/majestic-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/pipl/</loc>
		<lastmod>2025-03-10T20:39:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Pipl-logo-e1735502500527.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/virustotal/</loc>
		<lastmod>2025-03-11T14:48:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/VirusTotal_logo.svg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/crxcavator/</loc>
		<lastmod>2025-03-11T18:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/CRXcavator-e1735499667396.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cyber-risk-analytics/</loc>
		<lastmod>2025-03-11T18:57:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2024-12-29-at-2.22.49-PM-e1735500351390.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/vertex-synapse/</loc>
		<lastmod>2025-03-11T18:59:39+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/VTX_LOGO-FullHorz-RGB.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/urlscan/</loc>
		<lastmod>2025-03-11T19:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/urlscan-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/urlhaus/</loc>
		<lastmod>2025-03-11T19:11:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/URLhaus.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/unshorten-me/</loc>
		<lastmod>2025-03-11T19:14:21+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/unshorten.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/trellix-2/</loc>
		<lastmod>2025-03-11T19:30:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/05/Trellix-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/threatminer/</loc>
		<lastmod>2025-03-18T06:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Screenshot-2024-12-20-at-2.24.57-PM-e1734722712876.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/thehive/</loc>
		<lastmod>2025-03-18T06:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/TheHive.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/swimlane/</loc>
		<lastmod>2025-03-18T07:03:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2018/08/swimlane-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cisa/</loc>
		<lastmod>2025-03-18T07:16:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/05/CISA_Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/stack-overflow/</loc>
		<lastmod>2025-03-18T07:19:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/stackoverflow.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/stairwell/</loc>
		<lastmod>2025-03-18T07:22:56+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/08/Stairwell-logo-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/spycloud/</loc>
		<lastmod>2025-03-18T07:25:44+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Spycloud-Logo_website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/spur/</loc>
		<lastmod>2025-03-18T07:30:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/05/Spur-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/mysql/</loc>
		<lastmod>2025-03-18T08:17:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Host.io-logo-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/snort-sig/</loc>
		<lastmod>2025-03-18T08:26:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/09/snortlogo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/rapid7/</loc>
		<lastmod>2025-03-18T09:03:06+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/08/rapid7-e1735663835399.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/snapattack/</loc>
		<lastmod>2025-03-18T09:04:23+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/snapattack-color-logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/microsoft/</loc>
		<lastmod>2025-03-19T02:40:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2019/05/Microsoft-Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/slashnext/</loc>
		<lastmod>2025-03-19T18:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/SlashNext-Logo_Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/silent-push/</loc>
		<lastmod>2025-03-19T18:18:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/05/Silent-Push-Name-Black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/vulncheck/</loc>
		<lastmod>2025-03-19T18:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/08/VulnCheck-logotext.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/pulsedive/</loc>
		<lastmod>2025-03-21T13:32:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/pulsedive-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/mxtoolbox/</loc>
		<lastmod>2025-03-21T14:08:08+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2023/06/Mx-Logo-590x150-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/nvd/</loc>
		<lastmod>2025-03-21T14:08:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/NVD.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cyberchef/</loc>
		<lastmod>2025-03-21T14:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/02/Untitled-design-4-e1739295802470.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cybereason/</loc>
		<lastmod>2025-03-21T14:19:33+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/cybereason-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cyware/</loc>
		<lastmod>2025-03-21T14:22:38+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/06/Cyware-Hi-Res-Logo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/darkowl/</loc>
		<lastmod>2025-03-21T14:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/04/DarkOwl.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/dataminr/</loc>
		<lastmod>2025-03-21T14:27:27+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/07/DTMRMrk_RGB_Navy-B.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/devo-2/</loc>
		<lastmod>2025-03-21T14:29:54+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-Devo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/digital-shadows/</loc>
		<lastmod>2025-03-21T14:32:26+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Logo-ThreatConnect-Partner-Digital-Shadows.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/emailrep/</loc>
		<lastmod>2025-03-21T15:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/emailrep-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/polarity/</loc>
		<lastmod>2025-03-21T15:04:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Polarity-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/exabeam-2/</loc>
		<lastmod>2025-03-21T15:07:34+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Exabeam-Logo-Website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/domaintools/</loc>
		<lastmod>2025-03-21T16:01:14+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Logo-ThreatConnect-Partner-Domain-Tools.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/gigamon/</loc>
		<lastmod>2025-03-21T18:10:03+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/gigamon-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/opswat/</loc>
		<lastmod>2025-03-21T18:18:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/OPSWAT-Logo-Website.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/mandiant/</loc>
		<lastmod>2025-03-21T18:24:52+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/03/Mandiant-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/jira/</loc>
		<lastmod>2025-03-21T18:36:50+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Jira_Logo.svg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/ironnet-collective-defense-portal/</loc>
		<lastmod>2025-03-21T18:38:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Ironnet-Logo-TM-Color-300x212-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/ipinfo/</loc>
		<lastmod>2025-03-21T18:41:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2017/10/IPinfo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/intel471/</loc>
		<lastmod>2025-03-21T18:44:30+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Intel471.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/host-io/</loc>
		<lastmod>2025-03-21T18:56:05+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2021/07/Host.io-logo-e1740352137246.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/haveibeenpwned/</loc>
		<lastmod>2025-03-21T18:57:53+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/01/Have-I-Been-Pwned_idygmeO0R3_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/greynoise-2/</loc>
		<lastmod>2025-03-21T19:01:40+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Threatconnect-Technology-Partners-GreyNoise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/okta/</loc>
		<lastmod>2025-03-24T09:30:19+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/okta-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/google/</loc>
		<lastmod>2025-03-24T09:39:18+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Google-logo.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/arkime/</loc>
		<lastmod>2025-03-31T19:24:57+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/03/Arkime_Logo-e1743449081982.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/censys/</loc>
		<lastmod>2025-05-02T19:52:17+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/03/Censys-Primary-logo-Orange-Black-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/blinkops/</loc>
		<lastmod>2025-05-15T17:31:01+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/04/BlinkOps-logo-e1747330249245.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/wireshark-oui/</loc>
		<lastmod>2025-05-15T17:39:43+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/05/wireshark-logo-big.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/feedly/</loc>
		<lastmod>2025-05-20T19:24:35+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2024/12/Feedly.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/cognyte/</loc>
		<lastmod>2025-09-03T20:30:28+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2025/08/Luminar-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/symantec/</loc>
		<lastmod>2025-10-09T18:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2016/08/image-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/silobreaker/</loc>
		<lastmod>2026-02-17T18:21:51+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2020/02/Logo-stacked-version-orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://threatconnect.com/marketplace/reversing-labs-2/</loc>
		<lastmod>2026-03-26T15:56:02+00:00</lastmod>
		<image:image>
			<image:loc>https://threatconnect.com/wp-content/uploads/2022/11/Logo-ThreatConnect-Partner-Reversing-Labs.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->