IoC lookups

IoC lookups can be performed to find known malware and suspicious URLs and IP addresses.

These lookups can be initiated from the catalog, via email, or by creating a lookup request for the files, file hashes, URLs, or IP addresses you want to check. The lookups are performed by the appropriate third-party lookup source.

After threat lookups have completed, an email notification is sent to the requestor.