
Enrich threat investigations with fresh data from millions of malware and phishing samples.
Vendor
ANY.RUN
Company Website




Examine cyberattacks faster by using up-to-date data from other investigations
Fast Results
Get in-depth threat context for any indicator quickly, with a 2-second response time for 180-day queries. Simplify and speed up your research to quickly identify and prevent threats.
Threat Context Enrichment
Gather extensive information on any threat using a wide range of search parameters, including threat names, file hashes, IPs, registry keys, and YARA rules. Explore sandbox sessions where detected indicators were found to see how the entire attack unfolds.
Attack Data from 15,000 Companies
Leverage real-time, community-driven threat intelligence from samples uploaded by over 500,000 analysts worldwide to enhance proactive security and improve SOC efficiency. Discover unique data not found elsewhere.
Improve your incident response and forensic capabilities
Automate initial triage, and access contextual data to quickly identify alerts for investigation or escalation to incident response teams
01 Perform deep searches
Use any suspicious indicator found in your system to find contextual threat information.
02 Look up object relationships
Expedite threat identification, automate triage and help your security team prioritise alerts that need to be investigated.
03 Enrich security solutions
Get a feed IOCs pre-processed in our sandbox to enrich your security solutions.
04 Look up threats online
Track aggressively used TTPs, malware families and test your detection rules against our database of malicious objects.
Benefits of ANY.RUN Threat Intelligence Lookup
Browse contextual data
Every record contains related information such as threat names, IP addresses, and hashes.
Reinforce security systems
Receive continuously updated feeds of IOCs in your SIEMs and IPS/IDS systems using API and supplement it with SDK.
Perform deep searches
Search by any event fields or indicators, including TTPs, connections, paths and URLs.
Look up threat indicators
Easily tell what malicious objects are connected to IOCs.
Look up threats across millions of sandbox research sessions
Find data, like malware actions and IOCs, across all ANY.RUN sandbox malware research sessions from 500,000 analysts.
Use over 40 search parameters
Get results as wide or as precise as you need from 6 months research data, which includes links to examples of TTPs implementation within interactive sandbox sessions.
See examples of TTPs implementation
Each MITRE TTP entry contains an implementation example, from a real-world malware sample processed in our sandbox.
Track activity per family
Access comprehensive threat profile pages to get a holistic view of malware families, including popularity trends, detailed descriptions, and the latest IOCs.
Apply expert research on new cyber attacks and APTs
Discover reports, complete with search queries, on active threats from our analyst team to improve threat monitoring, incident response, and compliance.