Bulk Enrichment for Threat Investigations

Bulk Enrichment for Threat Investigations

Bulk Enrichment for Threat Investigations

Hunt turns unstructured text into enriched IP and domain data you can use immediately in investigations.

From Raw Input

to Enriched Data

From Raw Input

to Enriched Data

From Raw Input

to Enriched Data

1

Upload Any Text

uploading multiple text files, users can leverage advanced processing tools to enrich

2

Automatically Extract IP and Domain

3

Get back an Enriched CSV

1

Upload Any Text

uploading multiple text files, users can leverage advanced processing tools to enrich

2

Automatically Extract IP and Domain

3

Get back an Enriched CSV

1

Upload Any Text

uploading multiple text files, users can leverage advanced processing tools to enrich

2

Automatically Extract IP and Domain

3

Get back an Enriched CSV

1

Upload Any Text

2

Automatically Extract IP and Domain

3

Get back an Enriched CSV

Upload Any Text

uploading multiple text files, users can leverage advanced processing tools to enrich

Kick Start Investigations

Kick Start Investigations

Kick Start Investigations

Pivot and Expansion

Bootstrap investigations by using research from other teams to narrow in on an incident or threat actor by expanding using their TTPs or ensuring that you don’t hit a dead end.

faq

faq

faq

Frequently
asked questions

Frequently
asked questions

Frequently
asked questions

What is Bulk Enrichment used for?

Bulk Enrichment is used to process large amounts of unstructured text and extract IP addresses and domains for enrichment and investigation.

What is Bulk Enrichment used for?

Bulk Enrichment is used to process large amounts of unstructured text and extract IP addresses and domains for enrichment and investigation.

What is Bulk Enrichment used for?

Bulk Enrichment is used to process large amounts of unstructured text and extract IP addresses and domains for enrichment and investigation.

What kind of input can I upload?

You can upload text files or paste raw text containing indicators such as IP addresses and domains for automatic extraction and enrichment.

What kind of input can I upload?

You can upload text files or paste raw text containing indicators such as IP addresses and domains for automatic extraction and enrichment.

What kind of input can I upload?

You can upload text files or paste raw text containing indicators such as IP addresses and domains for automatic extraction and enrichment.

What does the enrichment output look like?

The enrichment results are returned as a downloadable CSV file containing enriched data for the extracted IPs and domains.

What does the enrichment output look like?

The enrichment results are returned as a downloadable CSV file containing enriched data for the extracted IPs and domains.

What does the enrichment output look like?

The enrichment results are returned as a downloadable CSV file containing enriched data for the extracted IPs and domains.

How does Bulk Enrichment help investigations?

It helps teams quickly pivot from raw research or shared intelligence into enriched indicators, making it easier to expand investigations and avoid dead ends.

How does Bulk Enrichment help investigations?

It helps teams quickly pivot from raw research or shared intelligence into enriched indicators, making it easier to expand investigations and avoid dead ends.

How does Bulk Enrichment help investigations?

It helps teams quickly pivot from raw research or shared intelligence into enriched indicators, making it easier to expand investigations and avoid dead ends.

Find the threat
before it finds you

Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

Find the threat
before it finds you

Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

Find the threat
before it finds you

Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.