Threat Intelligence

Bulk Check

Mass threat intelligence lookups

Check thousands of domains, IPs, or URLs in a single API request. High-throughput processing with comprehensive results for each indicator.

10,000
Items/Request
10K/sec
Processing Speed
<2s
Response Time
Mixed
Input Types

Key Features

Everything you need to protect your infrastructure and users

High Throughput

Process up to 10,000 items per request with sub-second response times.

Multiple Formats

Accept JSON, CSV, or newline-delimited text input.

Mixed Types

Check domains, IPs, and URLs in the same request.

Full Results

Get complete threat data for each item, not just verdicts.

Async Processing

Submit large jobs and poll for results when ready.

Export Options

Download results as JSON, CSV, or STIX format.

Use Cases

How security teams use this tool

Log Enrichment

Enrich SIEM logs with threat data in bulk.

List Validation

Validate blocklists and allowlists against threat intel.

Incident Response

Quickly check IOCs during incident investigations.

Email Gateway

Check sender domains and URLs from email batches.

Why Bulk Threat Checking?

Security operations generate massive volumes of indicators that require threat analysis: firewall logs contain thousands of external IPs daily, email gateways process millions of URLs, SIEMs aggregate indicators from dozens of sources, and incident response investigations can involve hundreds of IOCs. Checking these one at a time is impractical. Bulk threat checking enables you to process thousands of domains, IPs, and URLs in a single API request, transforming hours of manual lookups into seconds of automated analysis.

Use Cases for Bulk Threat Intelligence

Security teams leverage bulk checking across numerous workflows: enrich SIEM alerts with threat context for thousands of indicators simultaneously, validate and prioritize blocklists before deployment, analyze log files to identify compromised hosts communicating with malicious infrastructure, screen vendor and partner domains for supply chain risk assessment, and process IOC feeds from ISAC sharing groups. Any scenario involving more than a handful of indicators benefits from bulk API efficiency.

API Integration Best Practices

Maximize bulk API effectiveness with these practices: batch indicators logically by time window or source for easier result correlation, implement async processing for very large batches to avoid timeout issues, cache results to reduce duplicate lookups for frequently-seen indicators, use mixed-type requests to check domains, IPs, and URLs together when investigating related infrastructure, and export results in STIX format for seamless integration with threat intelligence platforms.

Performance and Scalability

Our bulk API is engineered for enterprise-scale workloads: process up to 10,000 indicators per request with sub-2-second response times, handle mixed indicator types with automatic detection and routing, support multiple input formats including JSON arrays, CSV files, and newline-delimited text, provide complete threat data for each indicator rather than simple verdicts, and scale horizontally to support sustained high-volume usage during major security incidents or routine security operations.

Frequently Asked Questions

How many items can I check at once?
Free accounts can check 100 items per request. Paid plans support up to 10,000 items per request.
What formats do you accept?
We accept JSON arrays, newline-delimited text, and CSV files. You can also specify the format in the API request.
How fast is bulk processing?
We process approximately 10,000 items per second. A 10,000 item request typically completes in under 2 seconds.
Can I mix domains and IPs in one request?
Yes, our bulk API automatically detects the type of each item and routes it to the appropriate check.

Ready to Get Started?

Join thousands of security teams using isMalicious to protect their infrastructure.