Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy CheckAPI Playground

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

Free Tool

Is this IOC malicious?

Check any IP, domain, hash, or URL instantly.

Free IOC reputation lookup across 14+ threat intelligence sources. Check any IP, domain, URL, hash, or email for malicious activity — aggregated verdict, source-by-source breakdown, shareable results.

Try:

Public results are stored to generate shareable links. Want private analysis? See below.

What We Check

Indicator Types
  • IPv4 & IPv6 addresses
  • Domains & URLs
  • File hashes (MD5 / SHA-1 / SHA-256)
  • Email addresses
Threat Intel Sources
  • VirusTotal, AbuseIPDB, OTX
  • Shodan, Censys, GreyNoise
  • URLScan, Pulsedive, Hybrid Analysis
  • … and 5+ more
Scoring
  • Weighted composite 0–100
  • Clean / Suspicious / Malicious
  • Source-by-source breakdown
  • Category tags (bruteforce, C2, phishing…)
Output
  • Shareable permanent URL
  • Defanged IOC for reports
  • JSON via API
  • No signup required
Want private, sandboxed results?Free tier

Public results on this page are stored as shareable URLs and visible to anyone with the link. Sign up for the DFIR Platform and every enrichment stays inside your organization's private sandbox — never indexed, never shared, with full raw source data, batch mode, and API access.

Sign up free
Sign up free
About IOC Check

What does this tool check?

An aggregated reputation lookup for any indicator of compromise. The tool fans out in parallel to 14+ threat intelligence sources, normalizes their verdicts, and returns a composite risk score.

IP Reputation

IPv4/IPv6 scoring across AbuseIPDB, GreyNoise, Shodan, OTX. Detects scanners, botnets, Tor, known C2.

Domain Reputation

Category, registration age, typosquat signals, phishing history across VirusTotal, OTX, URLScan.

URL / Phishing

Live URL scan via URLScan, CheckPhish, VirusTotal. Flags phishing kits, credential harvesters, malware distribution.

File Hash

MD5, SHA-1, SHA-256, SHA-512 lookups against VirusTotal, Hybrid Analysis. Returns AV family, first-seen, detection ratio.

Scoring Methodology

The composite score (0–100) is the mean of per-source scores that returned a hit. The verdict band is thresholded:

Clean0–29Suspicious30–69Malicious70–100Unknownno hit
AV / Sandbox
35%
IP / Network TI
30%
Phishing / URL
20%
Passive DNS / OSINT
15%
How It Works
Step 01

Paste an indicator

IP, domain, URL, hash, or email. The type is auto-detected from the value — no need to pick a category.

Step 02

Parallel enrichment

14+ threat intel providers are queried in parallel. Failures and timeouts are handled gracefully — no single provider blocks the response.

Step 03

Verdict + share

Composite score 0–100, clean/suspicious/malicious verdict, per-source breakdown. Every result gets a permanent shareable URL.

Need programmatic access? Use our API for automated IOC enrichment.

View API Documentation
Threat Intel Sources

Every check fans out to 14+ providers across AV aggregators, IP reputation, phishing detection, and passive DNS — in a single request.

VirusTotal

60+ AV engines aggregated. IP/domain/URL/hash verdicts, detection ratios, relationships.

AbuseIPDB

Crowdsourced abuse confidence score. SSH brute force, spam, scanning reports.

Shodan

Internet-wide scan data. Open ports, banners, services for any IP.

Censys

Host and certificate scan data. Historical exposure snapshots.

GreyNoise

Background internet noise classification. Separates mass scanners from targeted probes.

AlienVault OTX

Open threat exchange pulses. Known campaigns, IOCs shared by the community.

URLScan.io

Live URL sandboxing. Screenshot, DOM tree, effective URL, verdict.

CheckPhish

Phishing-focused URL classification. Zero-day phishing kits and credential harvesters.

Hybrid Analysis

File detonation sandbox. MITRE mapping, YARA matches, behavioral indicators.

Pulsedive

Unified TI platform. Aggregated risk, threats, related indicators.

Passive DNS / OSINT

Historical DNS resolutions and domain telemetry for pivoting.

… + more

Spur, IPQualityScore, and others — the full set grows over time. Paid API tier unlocks raw per-source data.

Guide

What Is an IOC and Why Check Reputation?

An indicator of compromise (IOC) is a forensic artifact observed on a network or host that, with high confidence, indicates malicious activity: an IP address contacting a C2 server, a domain hosting a phishing kit, a file hash matching a known malware family. Reputation lookups cross-reference that artifact against threat intelligence databases to convert a raw value into an actionable verdict — the first step of nearly every SOC triage workflow.

The Five Indicator Types

IPv4 / IPv6 Addresses

Scoring spans abuse history, scanner classification, open-port exposure, and country enrichment. Useful for triaging firewall hits, suspicious logins, outbound beacons.

Domains

Category, registration age, passive DNS history, and known-bad flags. Newly registered domains with no history are a classic phishing signal.

URLs

Live URL sandboxing. The request is rendered in a safe browser, screenshot is compared against brand databases, and the effective URL (after redirects) is verdicted.

File Hashes

MD5 / SHA-1 / SHA-256 / SHA-512. Returns AV family, first-seen, detection ratio, sandbox reports, and YARA matches. The safest way to check suspected malware — no sample needed.

Aggregation: Why 14+ Sources Beat One

Single-source lookups have blind spots. A fresh phishing domain may not yet be flagged by any AV aggregator, but URLScan will already have a rendered screenshot and brand-detection verdict. An IP running active bruteforce shows up on AbuseIPDB within hours; the same IP only appears on VirusTotal days later when telemetry propagates. Aggregating reduces time-to-detection and keeps false negatives manageable.

Defanging: Safe IOCs in Reports

Every result includes a defanged representation of the input — for example 185[.]220[.]101[.]45 or evil[.]com. Defanging prevents accidental clicks when IOCs are pasted into chat, tickets, or PDF reports, and keeps email security gateways from rewriting the indicator. Always defang when sharing externally. Learn more about threat intelligence · IP reputation →

Public Sharing vs. Private Enrichment

Results on this page are stored so you can send a link to a teammate. That also means the URL is publicly reachable. For ongoing investigations where the IOC itself is sensitive — a victim's IP, an internal phishing target, an attribution hypothesis — use the DFIR Platform instead. Enrichment there happens inside your organization's sandbox, results are never indexed or shared, and you get the raw per-source data that the free tier strips.

FAQ
What is an IOC?

An indicator of compromise is a forensic artifact — an IP, domain, URL, hash, or email — that, observed on a network or host, indicates malicious activity. Reputation checks convert raw IOCs into verdicts by cross-referencing threat intelligence databases.

What types of IOCs can I check?

IPv4 and IPv6 addresses, domains, URLs (with scheme), file hashes (MD5 / SHA-1 / SHA-256 / SHA-512), and email addresses. The input type is auto-detected — just paste the value.

Is this tool really free?

Yes. The public checker is free with a 10-checks-per-hour rate limit per IP, no account required. The paid API tier on the DFIR Platform adds raw per-source data, batch mode, webhooks, and removes the rate limit.

How accurate is the reputation scoring?

The composite score aggregates 14+ threat intel sources, which reduces single-source blind spots. That said, no reputation tool is infallible — always treat a 'malicious' verdict as a strong lead to investigate, not a final conclusion, and a 'clean' verdict as 'not currently flagged', not 'definitively safe'.

How many free checks do I get?

10 checks per hour per IP address. The limit resets on a rolling hour window. If you need higher throughput, the DFIR Platform's paid API tier has per-second rate limits measured in the hundreds.

Where does the data come from?

VirusTotal, AbuseIPDB, Shodan, Censys, GreyNoise, AlienVault OTX, URLScan.io, CheckPhish, Hybrid Analysis, Pulsedive, and several more. Each provider contributes a normalized score and summary to the aggregated verdict.

Do you store my IOCs?

Public results are stored to make share URLs work. If you need sensitive IOCs to stay inside your organization — victim IPs, internal phishing targets, attribution research — sign up for the DFIR Platform, where every enrichment runs in a private org sandbox and is never indexed.

What should I do if an IOC is flagged as malicious?

Triage the asset: block the IOC at the perimeter, check logs for prior activity, identify exposed hosts, and pivot on related indicators (domain → resolving IPs, IP → other domains on that host, hash → same-family samples). This tool returns tags to help pivot — the full workflow is in the DFIR Platform.

Related Tools

Phishing Email Checker

Paste email headers to check for phishing, spoofing, and authentication failures.

Domain Lookup

Full WHOIS, DNS, SPF / DMARC / BIMI, TLS, and CT log analysis with A+ to F grading.

Exposure Scanner

Scan any domain for open ports, SSL issues, DNS misconfigurations, and attack surface.

Need Private Enrichment at Scale?

The DFIR Platform gives you API access, batch enrichment, webhooks, full raw source data, and a private org sandbox — results never leave your workspace. Free tier includes 300 credits to get started.

Sign up freeView API Docs