Have your team hunting through our web-based interface.
Threat Hunting
Core hunting modules for C2 infrastructure, malware, phishing, IOCs, and threat actors.
HuntSQL™
Powerful SQL queries designed for pivoting across attacker infrastructure and datasets.
Feeds & API Integrations
Real-time threat intelligence feeds and APIs for integrating Hunt data into existing workflows.
Bulk Enrichment
Enhance your data analysis capabilities with Bulk Enrichment.
Advanced Search
Run precise queries across attacker infrastructure data to quickly discover and analyze malicious activity.
Real Time Stats
Meticulously engineered for identifying and tracking malicious online activities.
Associations
Pivot from one IP to associated SSH keys, IOCs, malware configs, and certificates.
DNS by IP
Lists domain names that have resolved to a given IP address based on observed DNS data.










