SCW INTEL
ThreatLens
IOC Investigation Accelerator
Paste any indicator β IP, hash, domain, URL, or email β and instantly get targeted lookup links across 26 threat intelligence platforms. ThreatLens identifies the IOC type and routes you to the right tool with context on what to look for.
How it works: ThreatLens doesn't query databases β it identifies your IOC type and generates direct investigation links to VirusTotal, Shodan, AbuseIPDB, and 23 more platforms. You click, they analyze.
1
Paste your IOCsRaw indicators from alerts, reports, or tickets β bulk paste supported
2
Auto-classifyEngine detects IPv4, IPv6, MD5, SHA1, SHA256, domains, URLs, and emails
3
Investigate everywhereGet platform-specific links with descriptions of what each source checks
SCAN Paste Indicators
SOURCES Threat Intel Platforms
π¦
VirusTotal
ip, domain, hash, url
π«
AbuseIPDB
ip
π
Shodan
ip
π‘
GreyNoise
ip
π
IPVoid
ip
π
Censys
ip
πΈ
URLScan
domain, url
π€οΈ
SecurityTrails
domain
πΊοΈ
DNSDumpster
domain
π
Whois
domain, ip
π§¬
MalwareBazaar
hash
π¬
Hybrid Analysis
hash
π½
AlienVault OTX
ip, domain, hash, url
π¦
ThreatFox
ip, domain, hash
π‘οΈ
Google Safe Browsing
url, domain
π£
PhishTank
url
π
Have I Been Pwned
email
π§
EmailRep
email
π΅οΈ
Intelligence X
email
π―
Hunter.io
email
π
Dehashed
email
π€
Holehe (OSINT)
email
π
Google (Dork)
email
π
Pulsedive
ip, domain, url
π
URLhaus
url, domain
π¬
InQuest
hash, domain, ip
Save hours per investigation.
Instead of opening 10 tabs and manually pasting each IOC β paste once, get all your investigation links in one view. Built for SOC analysts, IR teams, and threat hunters.