Logo
Sign in
Product Logo
Threat Intelligence LookupANY.RUN

Enrich threat investigations with fresh data from millions of malware and phishing samples.

Vendor

Vendor

ANY.RUN

Company Website

Company Website

intro-first.webp
features-4.webp
content-3.webp
features-3.webp
Product details

Examine cyberattacks faster by using up-to-date data from other investigations

Fast Results

Get in-depth threat context for any indicator quickly, with a 2-second response time for 180-day queries. Simplify and speed up your research to quickly identify and prevent threats.

Threat Context Enrichment

Gather extensive information on any threat using a wide range of search parameters, including threat names, file hashes, IPs, registry keys, and YARA rules. Explore sandbox sessions where detected indicators were found to see how the entire attack unfolds.

Attack Data from 15,000 Companies

Leverage real-time, community-driven threat intelligence from samples uploaded by over 500,000 analysts worldwide to enhance proactive security and improve SOC efficiency. Discover unique data not found elsewhere.

Improve your incident response and forensic capabilities

Automate initial triage, and access contextual data to quickly identify alerts for investigation or escalation to incident response teams

01 Perform deep searches

Use any suspicious indicator found in your system to find contextual threat information.

02 Look up object relationships

Expedite threat identification, automate triage and help your security team prioritise alerts that need to be investigated.

03 Enrich security solutions

Get a feed IOCs pre-processed in our sandbox to enrich your security solutions.

04 Look up threats online

Track aggressively used TTPs, malware families and test your detection rules against our database of malicious objects.

Benefits of ANY.RUN Threat Intelligence Lookup

Browse contextual data

Every record contains related information such as threat names, IP addresses, and hashes.

Reinforce security systems

Receive continuously updated feeds of IOCs in your SIEMs and IPS/IDS systems using API and supplement it with SDK.

Perform deep searches

Search by any event fields or indicators, including TTPs, connections, paths and URLs.

Look up threat indicators

Easily tell what malicious objects are connected to IOCs.

Look up threats across millions of sandbox research sessions

Find data, like malware actions and IOCs, across all ANY.RUN sandbox malware research sessions from 500,000 analysts.

Use over 40 search parameters

Get results as wide or as precise as you need from 6 months research data, which includes links to examples of TTPs implementation within interactive sandbox sessions.

See examples of TTPs implementation

Each MITRE TTP entry contains an implementation example, from a real-world malware sample processed in our sandbox.

Track activity per family

Access comprehensive threat profile pages to get a holistic view of malware families, including popularity trends, detailed descriptions, and the latest IOCs.

Apply expert research on new cyber attacks and APTs

Discover reports, complete with search queries, on active threats from our analyst team to improve threat monitoring, incident response, and compliance.

Find more products by category
Security SoftwareView all