Use Case: Threat Investigation

From Alert to Attribution in Minutes

The OSINT Investigation Workbench transforms raw IOCs into structured intelligence. Guided playbooks, 72 enrichment engines, entity graphs, and evidence boards — everything your team needs to investigate phishing, malware, fraud, and APT campaigns.

72
Enrichment Engines
8
Playbook Templates
10
Entity Types
<5min
Alert to Attribution
Workflow

Six Steps from IOC to Intelligence

Every investigation follows a structured workflow — from initial triage to final verdict.

01

Receive Alert

A phishing email, suspicious URL, or malware hash triggers an investigation.

02

Create Investigation

Launch the wizard, select a playbook template, and paste your IOCs.

03

Auto-Enrichment

72 engines run in parallel — VirusTotal, Shodan, AbuseIPDB, URLScan, and more.

04

Entity Graph

Discovered connections between IPs, domains, hashes, and emails are mapped automatically.

05

Browser Research

Safely visit phishing pages in a sandboxed browser. Capture screenshots and DOM evidence.

06

Verdict & Report

AI-powered verdict with risk scoring, timeline, evidence board, and exportable report.

Capabilities

Built for Real-World Investigations

From phishing triage to APT attribution — the workbench covers the full investigation lifecycle.

Phishing Email Investigation

Extract URLs, domains, and IPs from suspicious emails. Check reputation across 72 sources. Identify credential harvesting forms. Build evidence for takedown requests.

Malware Analysis & IOC Extraction

Hash lookup across VirusTotal, MalwareBazaar, and ThreatFox. Behavioral analysis, YARA matching, and automated IOC extraction for threat intel sharing.

Domain & Infrastructure Mapping

WHOIS, DNS, SSL certificates, hosting history, and related infrastructure discovery. Map the full attack surface of threat actor domains.

Cryptocurrency Transaction Tracing

Wallet address analysis, transaction history, cluster identification, and exchange attribution for ransomware and fraud investigations.

Incident Response Evidence

Structured evidence collection with timestamps, screenshots, enrichment results, and audit trails. Export investigation packages for legal or compliance teams.

Threat Actor Attribution

Correlate indicators across investigations to identify patterns, infrastructure reuse, and threat actor TTPs using relationship graphs and cross-investigation pivoting.

Start Investigating Today

Create a free account and start your first investigation — no credit card required. OSINT plans include 5 investigations/month on Starter and unlimited on Pro.