Back to Documentation
Threat Intelligence Platform (TIP)

IOC Lookup

Search IOCs

This section is designed to help you search for indicators such as IP addresses, domains, and URLs, and even validate SMS messages containing links to check if they are legitimate. You can search across multiple open-source threat intelligence feeds and benefit from AI-powered insights that enhance the accuracy of the information gathered.

We are constantly working on bringing more trusted feeds that are widely used by the security community.


Special thanks to all the open-source threat intelligence feed providers for their invaluable support to the community. If you feel any feed is missing and it’s open-source, feel free to submit a feature request in our contact form.


IOC Search & Lookup

The IOC Search module allows users to perform powerful lookups on Indicators of Compromise (IOCs) such as IP addresses, URLs, and Domains. It aggregates data from multiple vendors and internal sources, providing a centralized view of intelligence and context.


Features Overview

  • Cross-vendor Lookup: Checks IOCs against multiple vendor feeds (blacklists & whitelists).
  • Reputation Score: Aggregated threat score from: - VirusTotal - AbuseIPDB - AlienVault OTX
  • Internal Scoring Logic
  • Network, Host, WhoIs, Certificate, Behaviour Info
  • Search Timeline: Shows how frequently the IOC has been searched in the last 30, 60 or 90 days.
  • Bulk Lookup: Supports batch analysis of up to 20 indicators at once.

Categories

  • Malware is harmful software designed to damage or exploit systems, networks, or devices. We categorize any IP, domain, or URL involved in malware-related activities under the "Malware" category.
  • Phishing involves deceptive practices where attackers try to trick individuals into revealing sensitive information, such as login credentials or personal details, by pretending to be trustworthy entities. Any IP, domain, or URL involved in phishing activities is categorized under the "Phishing" category.
  • Botnet consist of networks of compromised computers that are controlled remotely to perform malicious activities, often without the users' knowledge. IPs involved in scanning or exhibiting bot-like behaviors are categorized under the "Botnet" category.
  • Anonymizers are services or tools that protect users' privacy by masking their IP addresses or routing their traffic through multiple servers. This category includes proxies, VPNs, and the Tor network, which anonymizes internet activity by routing traffic through a distributed network of relays. IPs and domains associated with these services are categorized under "Anonymizers" feeds.
  • Exploits are methods used to take advantage of vulnerabilities in systems, applications, or networks to gain unauthorized access or cause damage. These vulnerabilities can exist in software, hardware, or configurations, and exploits are designed to exploit these weaknesses to compromise security.
  • Spam refers to unsolicited and often irrelevant or inappropriate messages sent over the internet, typically in bulk, to promote products or services, or simply to flood inboxes. These messages can appear in various forms, including emails, comments, or social media posts, and are often used to distribute malicious content or scams. Many of the spam feeds we use are based on an older technology known as DNS-based Blackhole Lists (DNSBLs).

IP Lookup

ip-score

ip-info

When performing an IP address lookup, the following information is displayed:

SectionDescription
Reputation ScoreAggregated from multiple threat feeds and scoring engines.
Vendor Feeds CheckIndicates whether the IP is listed in known blacklist or whitelist feeds.
Network InformationASN, ISP, Country, Reverse DNS, etc.
Host InformationDevice fingerprint, OS guess (if available), etc.
User Search TimelineGraph showing search frequency of this IP by other users over the last 30, 60 or 90 days.
Google SearchGoogle search of the indicator

Bulk IP Lookup


Bulk IP Lookup: Users can search up to 20 IPs at once via input.


bulk-lookup

How to Use:

  1. Paste up to 20 indicators into the search field.
  2. The system will:
    • Detect IOC type automatically.
    • Perform concurrent lookups.
    • Display results in a tabular format with score summary.

URL Lookup

url-score

url-info

When performing a URL lookup, the following data replaces network/host info:

SectionDescription
Reputation ScoreThreat score and flags based on scans and vendor feeds.
WHOIS InformationDomain registrant, registrar, and creation/expiry dates.
Behavioral SummaryPage content, scripts observed, redirection behavior.
Website ScreenshotVisual preview of the URL at the time of scan.
Resolved IP InfoIPs the URL resolves to, with reputation scores.
Domain RankingAlexa or similar global ranking.
Search TimelineActivity timeline for the same URL by other users.
Google SearchGoogle search of the indicator

URL's are automatically normalized and decoded before lookup.


In addition to the core URL analysis features such as reputation scoring, WHOIS, screenshot, and domain ranking, the platform provides two advanced tabs:


Inspect Elements Tab

This tab emulates Developer Tools (DevTools) for analysts to do a deep behavioral dive into how the website operates in the browser.

Sections Available:

  1. Console Logs
    View console messages, JavaScript errors, and runtime warnings triggered by scripts on the page.

  2. Network Requests
    See real-time requests made by the webpage — including DNS queries, API calls, JavaScript imports, and beacon traffic. Useful for detecting:

    • Malicious redirects
    • Beaconing activity
    • C2 communications
  3. Application Storage
    Inspect cookies, local/session storage, and service workers. Useful to spot:

    • Tracking behavior
    • Suspicious persistent cookies
    • Token or credential leakage

All actions are sandboxed and safely rendered in a secured browser environment.


Extracted Indicators Tab

The platform automatically extracts and classifies IOCs embedded or referenced in the URL’s webpage.

IOC Types Detected:

  • IP addresses
  • Domains
  • URLs
  • Hashes (MD5, SHA1, SHA256)
  • Email addresses

Output Includes:

  • IOC Type
  • IOC Value
  • Frequency (Number of times it appeared)
  • Lookup Button – One-click to view full details of that extracted IOC

This helps uncover:

  • Hidden threats embedded in the page (e.g., dropped links, C2 URLs)
  • Redirect chains or embedded scripts leading to external IOCs
  • Contextual clustering of related malicious infrastructure

Example Use Case

  • A suspicious shortened URL resolves to a redirect chain that leads to a phishing page.
  • Console logs reveal obfuscated JavaScript used to load a credential-harvesting form.
  • Network tab shows outgoing beacon to a known C2 server.
  • Extracted indicators show additional domains/IPs referenced via iframe or image tags.
  • Analyst can instantly lookup those IOCs to trace the infrastructure or report further.

These advanced tabs make URL inspection not just a scan — but a live browser intelligence session.


Domain Lookup

domain-score

domain-info

For domains, the following specialized information is included:

SectionDescription
Reputation ScoreAggregated threat reputation.
WHOIS InformationRegistrar, registrant details, domain age, etc.
SSL/TLS CertificatesCertificate chain, issuer, expiry date, and fingerprint.
Resolved IPsAssociated IPs and their reputation scores.
Domain RankingGlobal visibility score (e.g., Alexa, Majestic).
Search Timeline30-day frequency history of domain lookups by users.
Google SearchGoogle search of the indicator

Domain aliases (e.g., www vs non-www) are resolved and mapped internally.


Alongside the core features like WHOIS, certificate details, resolved IPs, and threat scoring, the Domain Lookup section includes a Subdomains Tab for deeper infrastructure mapping.


Subdomains Tab

This tab lists all discovered subdomains associated with the queried root domain. It helps analysts understand the broader infrastructure and potentially malicious or forgotten subdomains still pointing to active servers.

Key Features:

  1. Subdomain Enumeration
    Uses both passive and active DNS sources to identify subdomains.

  2. Output Includes:

    • Subdomain name (e.g., mail.example.com)
    • Resolved IP address (if available)

Use Cases:

  • Discover attack surfaces (admin panels, APIs, staging environments)
  • Identify hijacked or parked subdomains
  • Investigate related domains in phishing or C2 campaigns
  • Enable targeted blocking or monitoring on associated assets

Subdomain Lookups

Every subdomain listed can be:

  • Check for individual IOC lookup
  • Cross-referenced with known malicious infrastructure

Example: A phishing site login-security.example.com is found under a legitimate domain. Lookup reveals it was resolving to a known C2 IP, and had an SSL cert issued just days ago.


The Subdomains Tab empowers analysts to go beyond surface-level lookups and build complete intelligence around a domain's digital footprint.


Smart Scoring Engine

Reputation scores are calculated based on:

  • Vendor feed weightage
  • Past false positives
  • Frequency of sighting in malicious contexts
  • Time-decay (older indicators may have reduced score)

Summary of Lookup Capabilities

FeatureIP LookupURL LookupDomain Lookup
Vendor Feed Check✅ Yes✅ Yes✅ Yes
Reputation Score✅ Yes✅ Yes✅ Yes
WHOIS Information❌ No✅ Yes✅ Yes
Certificate Info❌ No❌ No✅ Yes
Network/Host Info✅ Yes❌ No❌ No
Behavior Summary❌ No✅ Yes❌ No
Screenshot❌ No✅ Yes❌ No
Resolved IP Scoring❌ No✅ Yes✅ Yes
Domain Ranking❌ No✅ Yes✅ Yes
Search Timeline (30, 60 & 90 Days)✅ Yes✅ Yes✅ Yes
Google Search✅ Yes✅ Yes✅ Yes
Bulk Lookup (up to 20 IOCs)✅ Yes❌ No❌ No

Blacklist / Whitelist Feed Overview Tab

The Blacklist Tab allows users to view which threat intelligence feeds have marked a particular IOC (IP, Domain, or URL) as malicious (blacklisted) or safe (whitelisted).

This view helps analysts understand the broader community and vendor stance on a given IOC by categorizing it based on:

  • Whitelist
  • Spam
  • Anonymizer
  • Phishing
  • Exploit
  • Botnet
  • Malware

Feed Classification Example

Here’s how the threat intelligence feeds are organized in the interface:

CategorySample Feeds
WhitelistSPFB, 0Spam, UCEProtect-Network
SpamBlocklist.de, Stop Forum Spam
AnonymizerTor Project, Socks Proxy, Dan.me.uk
PhishingBlocklist.de
ExploitDShield, Turris, Bytefarm.ch
BotnetAnti-Attacks, Abuse.ch, BotScout
MalwareFireHOL, Emerging Threats, CyberCrime

Each feed entry includes:

  • Indicator Presence
  • Expand option to show feeds (where available)

IOC Types Supported

The Blacklist/Whitelist Tab supports:

  • IP Address
  • Domain
  • URL

Use Cases

  • Quick Threat Attribution: Identify which vendors classify the IOC as malicious or safe.
  • Confidence Scoring: More feeds listing an IOC as malicious increases confidence in its threat level.
  • Cross-checking False Positives: Spot discrepancies across feeds to identify potential false positives or benign entities.

Example: An IP marked as malicious in Emerging Threats but listed as safe in SPFBL can indicate conflicting reports that need deeper investigation.


blacklist Visual snapshot of the Blacklist Tab showing feeds by category.


SMS Verification

The SMS Verification section allows users to analyze suspicious text messages for potential phishing or scam content using AI-powered detection.


How It Works

  1. The user pastes the SMS message into the input field.
  2. The system extracts any links or domains present in the message.
  3. An AI model analyzes the message content and link behavior.
  4. A detailed verdict is displayed including:
    • Target brand (if any)
    • Extracted domain or URL
    • Domain age
    • Blacklist status of the domain
    • Phishing probability score (e.g., 95%)
    • Reasons for classification (e.g., impersonation, urgency, misleading URL)
    • Prior reports (if message has been reported earlier)

AI-Powered Detection

We use trained AI model to assess:

  • The language style and tone of the SMS
  • The structure and domain patterns in embedded links
  • Threat signatures based on previously reported phishing campaigns

Example Verdict:
Potential Phishing95% Confidence “Urgent and official-looking request”, “Misleading URL”, “Impersonation of a government entity”


sms


Community Contribution

If the message is confirmed malicious:

  • Users can click Report SMS to submit it.
  • The message will be saved and made available to warn others.
  • Reported data is also used to train and improve the model over time.

Only messages containing indicators (URLs/domains) will be verified. Plain text messages without any actionable content will not be analyzed.


Safety Warning


Do not click on any links from suspicious messages.
The classifier may make occasional mistakes. If you believe the classification is wrong, you can report an error for reanalysis.


This tool is a free and privacy-respecting service to help the general public stay safe from SMS-based phishing attacks.


If you have suggestions for improvements or any misclassifications, please reach out. We're all ears!