Check domains, IPs, and URLs against 50+ threat intelligence sources. Get instant risk scores, historical data, and detailed analysis.
Every lookup returns a comprehensive intelligence package — risk scoring, source breakdown, geolocation, MITRE mapping, and confidence metrics.
Risk Score
Categories
Geolocation
Blocklist Hits
Confidence
75%Risk Factors
MITRE ATT&CK Tactics
Composite 0-100 score weighted across threat feeds, scanner consensus, infrastructure, and behavioral context.
50+ threat feeds aggregated by category: malware, phishing, abuse, proxy, and more — each with reliability weighting.
Tactics, techniques, related threat actor groups, and recommended mitigations from the MITRE framework.
Country, region, city, ISP, ASN, and autonomous system ownership at global scale with lat/lon precision.
First seen, last seen, and full detection history across all monitoring windows and source updates.
Multi-factor confidence: source agreement, source quality, VirusTotal consensus, and inter-provider alignment.
Comprehensive threat analysis for every attack surface
Start with 30 free API requests per month. No credit card required.

Device code phishing turns a legitimate OAuth flow into a token theft path. Learn how AI-assisted lures, Entra ID abuse, and session token replay change phishing detection in 2026.

Model Context Protocol integrations give agents access to tools, files, and services. That power creates new risks: tool poisoning, prompt injection, overbroad permissions, and untrusted server abuse.

LLMjacking combines cloud credential theft with expensive AI workloads. Learn how attackers find exposed keys, abuse model APIs, hide compute costs, and how defenders can detect the pattern.