This section is designed to help you search for indicators such as IP addresses, domains, and URLs, and even validate SMS messages containing links to check if they are legitimate. You can search across multiple open-source threat intelligence feeds and benefit from AI-powered insights that enhance the accuracy of the information gathered.
We are constantly working on bringing more trusted feeds that are widely used by the security community.
Special thanks to all the open-source threat intelligence feed providers for their invaluable support to the community. If you feel any feed is missing and it’s open-source, feel free to submit a feature request in our contact form.
The IOC Search module allows users to perform powerful lookups on Indicators of Compromise (IOCs) such as IP addresses, URLs, and Domains. It aggregates data from multiple vendors and internal sources, providing a centralized view of intelligence and context.
Malware
is harmful software designed to damage or exploit systems, networks, or devices. We categorize any IP, domain, or URL involved in malware-related activities under the "Malware" category.Phishing
involves deceptive practices where attackers try to trick individuals into revealing sensitive information, such as login credentials or personal details, by pretending to be trustworthy entities. Any IP, domain, or URL involved in phishing activities is categorized under the "Phishing" category.Botnet
consist of networks of compromised computers that are controlled remotely to perform malicious activities, often without the users' knowledge. IPs involved in scanning or exhibiting bot-like behaviors are categorized under the "Botnet" category.Anonymizers
are services or tools that protect users' privacy by masking their IP addresses or routing their traffic through multiple servers. This category includes proxies, VPNs, and the Tor network, which anonymizes internet activity by routing traffic through a distributed network of relays. IPs and domains associated with these services are categorized under "Anonymizers" feeds.Exploits
are methods used to take advantage of vulnerabilities in systems, applications, or networks to gain unauthorized access or cause damage. These vulnerabilities can exist in software, hardware, or configurations, and exploits are designed to exploit these weaknesses to compromise security.Spam
refers to unsolicited and often irrelevant or inappropriate messages sent over the internet, typically in bulk, to promote products or services, or simply to flood inboxes. These messages can appear in various forms, including emails, comments, or social media posts, and are often used to distribute malicious content or scams. Many of the spam feeds we use are based on an older technology known as DNS-based Blackhole Lists (DNSBLs).When performing an IP address lookup, the following information is displayed:
Section | Description |
---|---|
Reputation Score | Aggregated from multiple threat feeds and scoring engines. |
Vendor Feeds Check | Indicates whether the IP is listed in known blacklist or whitelist feeds. |
Network Information | ASN, ISP, Country, Reverse DNS, etc. |
Host Information | Device fingerprint, OS guess (if available), etc. |
User Search Timeline | Graph showing search frequency of this IP by other users over the last 30, 60 or 90 days. |
Google Search | Google search of the indicator |
Bulk IP Lookup: Users can search up to 20 IPs at once via input.
When performing a URL lookup, the following data replaces network/host info:
Section | Description |
---|---|
Reputation Score | Threat score and flags based on scans and vendor feeds. |
WHOIS Information | Domain registrant, registrar, and creation/expiry dates. |
Behavioral Summary | Page content, scripts observed, redirection behavior. |
Website Screenshot | Visual preview of the URL at the time of scan. |
Resolved IP Info | IPs the URL resolves to, with reputation scores. |
Domain Ranking | Alexa or similar global ranking. |
Search Timeline | Activity timeline for the same URL by other users. |
Google Search | Google search of the indicator |
URL
's are automatically normalized and decoded before lookup.
In addition to the core URL analysis features such as reputation scoring, WHOIS, screenshot, and domain ranking, the platform provides two advanced tabs:
This tab emulates Developer Tools (DevTools) for analysts to do a deep behavioral dive into how the website operates in the browser.
Console Logs
View console messages, JavaScript errors, and runtime warnings triggered by scripts on the page.
Network Requests
See real-time requests made by the webpage — including DNS queries, API calls, JavaScript imports, and beacon traffic. Useful for detecting:
Application Storage
Inspect cookies, local/session storage, and service workers. Useful to spot:
All actions are sandboxed and safely rendered in a secured browser environment.
The platform automatically extracts and classifies IOCs embedded or referenced in the URL’s webpage.
This helps uncover:
These advanced tabs make URL inspection not just a scan — but a live browser intelligence session.
For domains, the following specialized information is included:
Section | Description |
---|---|
Reputation Score | Aggregated threat reputation. |
WHOIS Information | Registrar, registrant details, domain age, etc. |
SSL/TLS Certificates | Certificate chain, issuer, expiry date, and fingerprint. |
Resolved IPs | Associated IPs and their reputation scores. |
Domain Ranking | Global visibility score (e.g., Alexa, Majestic). |
Search Timeline | 30-day frequency history of domain lookups by users. |
Google Search | Google search of the indicator |
Domain aliases (e.g.,
www
vsnon-www
) are resolved and mapped internally.
Alongside the core features like WHOIS, certificate details, resolved IPs, and threat scoring, the Domain Lookup section includes a Subdomains Tab for deeper infrastructure mapping.
This tab lists all discovered subdomains associated with the queried root domain. It helps analysts understand the broader infrastructure and potentially malicious or forgotten subdomains still pointing to active servers.
Subdomain Enumeration
Uses both passive and active DNS sources to identify subdomains.
Output Includes:
mail.example.com
)Every subdomain listed can be:
Example: A phishing site login-security.example.com
is found under a legitimate domain. Lookup reveals it was resolving to a known C2 IP, and had an SSL cert issued just days ago.
The Subdomains Tab empowers analysts to go beyond surface-level lookups and build complete intelligence around a domain's digital footprint.
Reputation scores are calculated based on:
Feature | IP Lookup | URL Lookup | Domain Lookup |
---|---|---|---|
Vendor Feed Check | ✅ Yes | ✅ Yes | ✅ Yes |
Reputation Score | ✅ Yes | ✅ Yes | ✅ Yes |
WHOIS Information | ❌ No | ✅ Yes | ✅ Yes |
Certificate Info | ❌ No | ❌ No | ✅ Yes |
Network/Host Info | ✅ Yes | ❌ No | ❌ No |
Behavior Summary | ❌ No | ✅ Yes | ❌ No |
Screenshot | ❌ No | ✅ Yes | ❌ No |
Resolved IP Scoring | ❌ No | ✅ Yes | ✅ Yes |
Domain Ranking | ❌ No | ✅ Yes | ✅ Yes |
Search Timeline (30, 60 & 90 Days) | ✅ Yes | ✅ Yes | ✅ Yes |
Google Search | ✅ Yes | ✅ Yes | ✅ Yes |
Bulk Lookup (up to 20 IOCs) | ✅ Yes | ❌ No | ❌ No |
The Blacklist Tab allows users to view which threat intelligence feeds have marked a particular IOC (IP, Domain, or URL) as malicious (blacklisted) or safe (whitelisted).
This view helps analysts understand the broader community and vendor stance on a given IOC by categorizing it based on:
Whitelist
Spam
Anonymizer
Phishing
Exploit
Botnet
Malware
Here’s how the threat intelligence feeds are organized in the interface:
Category | Sample Feeds |
---|---|
Whitelist | SPFB, 0Spam, UCEProtect-Network |
Spam | Blocklist.de, Stop Forum Spam |
Anonymizer | Tor Project, Socks Proxy, Dan.me.uk |
Phishing | Blocklist.de |
Exploit | DShield, Turris, Bytefarm.ch |
Botnet | Anti-Attacks, Abuse.ch, BotScout |
Malware | FireHOL, Emerging Threats, CyberCrime |
The Blacklist/Whitelist Tab supports:
Example: An IP marked as malicious in Emerging Threats but listed as safe in SPFBL can indicate conflicting reports that need deeper investigation.
Visual snapshot of the Blacklist Tab showing feeds by category.
The SMS Verification section allows users to analyze suspicious text messages for potential phishing or scam content using AI-powered detection.
We use trained AI model to assess:
Example Verdict:
Potential Phishing
— 95% Confidence
“Urgent and official-looking request”, “Misleading URL”, “Impersonation of a government entity”
If the message is confirmed malicious:
Report SMS
to submit it.Only messages containing indicators (URLs/domains) will be verified. Plain text messages without any actionable content will not be analyzed.
Do not click on any links from suspicious messages.
The classifier may make occasional mistakes. If you believe the classification is wrong, you can report an error for reanalysis.
This tool is a free and privacy-respecting service to help the general public stay safe from SMS-based phishing attacks.
If you have suggestions for improvements or any misclassifications, please reach out. We're all ears!