Skip to content

Indicators of Compromise (IOCs)

ShadowMap provides a searchable database of indicators of compromise sourced from MISP (Malware Information Sharing Platform). With over 48.8 million MISP attributes indexed, this module enables threat hunting, detection engineering, and bulk IOC validation against your organization's security telemetry.

Overview

IOCs

Supported IOC Types

Use the type dropdown to filter by specific indicator categories:

TypeDescriptionExample
IP-dstDestination IP address (C2 servers, malicious infrastructure)203.0.113.42
IP-srcSource IP address (attack origin)198.51.100.15
DomainMalicious or suspicious domain nameevil-example.com
HostnameFully qualified hostnamec2.evil-example.com
URLFull URL (payload delivery, phishing, exploit kits)https://evil-example.com/payload.exe
MD5MD5 hash of a malicious filed41d8cd98f00b204e9800998ecf8427e
SHA256SHA256 hash of a malicious filee3b0c44298fc1c149afbf4c8996fb924...
SHA1SHA1 hash of a malicious fileda39a3ee5e6b4b0d3255bfef95601890afd80709
EmailEmail address used in phishing or spam campaigns[email protected]
  1. Select an IOC type from the dropdown (or leave as "All Types" for cross-type search)
  2. Enter at least 3 characters in the search field
  3. Press Enter or click the search icon
  4. Results appear as a table showing matched MISP attributes

Search Results

ColumnDescription
#Result number
TypeIOC type (ip-dst, domain, md5, etc.)
CategoryMISP category (Network activity, Payload delivery, External analysis, etc.)
ValueThe full IOC value (hover for tooltip on long values)
Event IDMISP event ID linking this IOC to a threat intelligence event
CommentAnalyst comment or context note from the MISP event
TimestampWhen this attribute was added to MISP

Bulk IOC Check

For validating multiple indicators at once, use the Bulk IOC Check feature below the search results.

How It Works

  1. Prepare a CSV file containing IOC values (one per row). Supported formats: IP addresses, domains, hashes, URLs, and email addresses.
  2. Upload the file using the file picker (accepts .csv and .txt files, maximum 500 entries).
  3. Click "Check IOCs" to run the bulk validation against the MISP database.
  4. Review results showing matched vs. unmatched indicators.

Bulk Results

ColumnDescription
IOC ValueThe indicator from your uploaded file
TypeAuto-detected or specified IOC type
MatchesNumber of MISP events containing this indicator (highlighted in red if matches found)
MISP Event DetailsCategory, value, and event ID for each match (shows up to 3 matches per IOC)

The summary bar shows total checked, total matched, and total unmatched counts.

How to Use IOCs

Use CaseActions
SIEM SearchQuery firewall, proxy, DNS, and endpoint logs for matched IOCs. A hit indicates exposure to the associated threat.
BlockingAdd IPs/domains to firewall blocklists, URLs to proxy deny lists, file hashes to EDR blocklists. Automate via SOAR.
Detection RulesBuild Sigma rules, Snort/Suricata signatures, YARA rules, or EDR policies from IOC patterns.
Feed EnrichmentLink IOCs to actors and campaigns via event ID. Pivot from matched events to discover related indicators.

ShadowMap by Security Brigade