Browser extension for instant IOC lookups across 29 threat intelligence platforms.
Select any indicator of compromise on any web page - or highlight an entire paragraph from a threat report - and instantly extract and look up every IOC across multiple platforms. No copy-pasting between tabs.
ThreatCheck handles defanged indicators (hxxps://evil[.]com, admin[at]evil[.]com), bare URLs without protocol, and bulk extraction with auto-deduplication from paragraphs.
When you select a URL, ThreatCheck automatically extracts both the full URL and the domain, letting you choose which to investigate.
| Type | Examples |
|---|---|
| IPv4 / IPv6 | 192.168.1.1, 2001:db8::1 |
| Domain | evil.com, c2-server.example.net |
| URL | https://evil.com/payload, evil.com/path |
| Hash | MD5, SHA-1, SHA-256 |
admin@evil.com |
|
| CVE | CVE-2024-1234 |
| Windows Event ID | 4624, 4688 |
| Error codes | AADSTS50076, 0x80070005 |
Domain detection uses the complete IANA TLD list (1,285 TLDs) to avoid false positives.
| Service | IOC Types | API | |———|———–|—–| | VirusTotal | IP, Domain, Hash, URL, Email | Optional - enables auto-check with detection ratios, ASN, comments | | AbuseIPDB | IP, Domain | Optional - enables auto-check with abuse score and report categories | | AlienVault OTX | IP, Domain, Hash, URL | - | | ThreatFox | Hash, IP | - | | MalwareBazaar | Hash | - | | Pulsedive | IP, Domain, URL | - | | Recorded Future | IP, Domain, Hash, URL, Email, CVE | Optional - enables auto-check with risk scores and evidence | | OpenCTI | IP, Domain, Hash, URL, Email, CVE | Optional - enables auto-check with relationships and reports |
| Service | IOC Types | API | |———|———–|—–| | IPInfo | IP | - | | Spur | IP | Optional - enables auto-check with VPN/proxy/TOR detection | | Shodan | IP | - | | Censys | IP | - | | ZoomEye | IP | - | | GreyNoise | IP | - | | Spamhaus | IP, Domain | - | | TOR Archive | IP | - |
| Service | IOC Types | API | |———|———–|—–| | URLScan | URL, Domain | Optional - enables auto-check with scan history | | Wayback Machine | URL, Domain | - | | DNSDumpster | Domain | Required - shows A, MX, NS, TXT, CNAME records with banners | | Validin | Domain, IP | Optional - enables auto-check with DNS history | | MXToolbox | Domain, Email | - | | WHOIS | Domain | - |
| Service | IOC Types | API | |———|———–|—–| | GitHub Code Search | Hash, Domain, IP, Email | - | | LeakCheck | Email | Required - shows breach data with exposed passwords per source |
| Service | IOC Types | API | |———|———–|—–| | NVD (NIST) | CVE | - | | MITRE CVE | CVE | - | | Exploit-DB | CVE | - |
| Service | IOC Types | API | |———|———–|—–| | Microsoft Docs | Event ID, Error codes | - |
Most services work as direct links with no configuration needed. For deeper enrichment, you can optionally configure API keys in the extension settings. When configured, results appear directly in the popup without opening external tabs.
| Service | What you get |
|---|---|
| VirusTotal | Detection ratio (5/72), top engine detections, ASN, reputation, domain creation date, community comments |
| AbuseIPDB | Abuse confidence score, report count, ISP, usage type, TOR status, report category breakdown |
| Recorded Future | Risk score, evidence rules with timestamps, threat context, RF Intelligence Search button |
| OpenCTI | Score, relationships (threat actors, malware, campaigns), reports with descriptions, source attribution |
| Spur | VPN/proxy/TOR tunnel detection, operator name, entry/exit IPs, client profile, infrastructure type |
| URLScan | Historical scan results with page details, domain, IP, server info |
| DNSDumpster | Host records with IPs, PTR, ASN, banners (HTTP server, TLS, apps), MX, NS, TXT, CNAME |
| LeakCheck | Per-breach data with cleartext passwords, usernames, emails, phone numbers, source and date |
| Validin | DNS history records |
hxxps://evil[.]com and admin[at]evil[.]com are automatically converted to real IOCs. to [.], http to hxxp, @ to [at])Alt+T to trigger lookup on selected textchrome://extensions (or edge://extensions)*publication in progress**
After installation, a welcome page guides you through setup. Most services work immediately with no configuration.
To enable API auto-enrichment:
Each service can be individually enabled or disabled.
The only network requests ThreatCheck makes are the ones you explicitly trigger by selecting an IOC, and only to the services you have enabled.
The extension is built with vanilla JavaScript - no build step, no frameworks, no dependencies.
threatcheck/
manifest.json # MV3 extension manifest
content.js # IOC detection, popup UI, service registry
background.js # Service worker for API calls
styles.css # Popup and panel styles
options.html/js # Settings page
popup.html/js # Toolbar popup
welcome.html # Onboarding page
icons/ # Extension icons
MIT