SCW INTEL

ThreatLens

IOC Investigation Accelerator

Paste any indicator β€” IP, hash, domain, URL, or email β€” and instantly get targeted lookup links across 26 threat intelligence platforms. ThreatLens identifies the IOC type and routes you to the right tool with context on what to look for.

How it works: ThreatLens doesn't query databases β€” it identifies your IOC type and generates direct investigation links to VirusTotal, Shodan, AbuseIPDB, and 23 more platforms. You click, they analyze.
1
Paste your IOCsRaw indicators from alerts, reports, or tickets β€” bulk paste supported
2
Auto-classifyEngine detects IPv4, IPv6, MD5, SHA1, SHA256, domains, URLs, and emails
3
Investigate everywhereGet platform-specific links with descriptions of what each source checks

SCAN  Paste Indicators


SOURCES  Threat Intel Platforms

🦠 VirusTotal ip, domain, hash, url
🚫 AbuseIPDB ip
πŸ” Shodan ip
πŸ“‘ GreyNoise ip
🌐 IPVoid ip
πŸ”Ž Censys ip
πŸ“Έ URLScan domain, url
πŸ›€οΈ SecurityTrails domain
πŸ—ΊοΈ DNSDumpster domain
πŸ“‹ Whois domain, ip
🧬 MalwareBazaar hash
πŸ”¬ Hybrid Analysis hash
πŸ‘½ AlienVault OTX ip, domain, hash, url
🦊 ThreatFox ip, domain, hash
πŸ›‘οΈ Google Safe Browsing url, domain
🎣 PhishTank url
πŸ’€ Have I Been Pwned email
πŸ“§ EmailRep email
πŸ•΅οΈ Intelligence X email
🎯 Hunter.io email
πŸ”“ Dehashed email
πŸ‘€ Holehe (OSINT) email
πŸ” Google (Dork) email
πŸ’“ Pulsedive ip, domain, url
🏠 URLhaus url, domain
πŸ”¬ InQuest hash, domain, ip

Save hours per investigation.

Instead of opening 10 tabs and manually pasting each IOC β€” paste once, get all your investigation links in one view. Built for SOC analysts, IR teams, and threat hunters.