Paste a log file, threat report, or raw list of IOCs. We'll extract IPs, domains, and file hashes, then check them against our database — returning any associated threat actors, source vendors, and reference posts.