<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="text-align: center;">As mentioned in our previous post on <a href="/threat-exchanges-ioc-sharing" rel="noopener" target="_blank">IOC Collection and Sharing</a>, analyzable indicators can be found on a variety of platforms and channels, each with its own level of reliability and information detail. Once an analyst has deemed the collected IOCs suspicious, they can review its background and infrastructure information, such as ASN and passive DNS for IPs, and Whois, resolving IPs, and popularity score for domains. In addition, the analyst can also check if leading security vendors have already deemed the IOC malicious by choosing from a wide array of open-source blacklists. At the end of this process, the analyst will have the information and knowledge required to decide if the inbound and/or outbound traffic to the indicator should be blocked.</p> <p style="text-align: center;">In this post we will review free, open-source tools that analysts can use to collect technical and reputation information on IOCs, with a focus on IPs and domains.</p> <p style="text-align: center;"><!--more--></p> <h5 style="font-size: 16px;"><strong><a href="https://www.virustotal.com/gui/home/search" rel=" noopener">1.&nbsp; VirusTotal</a></strong></h5> <p>VirusTotal is a scanning and information platform that inspects IOCs with over 70 antivirus scanners and URL/domain blacklisting services. The platform offers a search engine for previously scanned items, as well as a number of URL and file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. VirusTotal's aggregated data is the output of many different antivirus engines, website scanners, file and URL analysis tools, and user contributions. Malware signatures are updated frequently as antivirus companies distribute them, ensuring that the platform uses the latest signature sets.</p> <p>VirusTotal’s web interface is extremely easy to use, with a visually pleasing layout and intuitive ways to jump between data sets. This and their aggregation of top security vendor data makes VirusTotal one of our favorite tools for IOC analysis.</p> <p><strong><u>What VirusTotal Has to Offer:</u></strong></p> <p><strong>IPs: </strong>ASN, Google results, passive DNS replication, (malicious) detected URLs, (malicious) downloaded files, (malicious) communicating files, (malicious) referrer files, community score, graph summary</p> <p><strong>Domains: </strong>Whois, Google results, subdomains, passive DNS replication, (malicious) detected URLs, (malicious) downloaded files, (malicious) communicating files, (malicious) referrer files, community score, graph summary</p> <p>&nbsp;</p> <p style="text-align: left;"><img src="https://info.threatstop.com/hubfs/image-25.png"></p> <p style="text-align: left;">&nbsp;</p> <p style="text-align: left;"><img src="https://info.threatstop.com/hubfs/image-26.png"></p> <p style="text-align: left;">&nbsp;</p> <h5 style="font-size: 16px;"><strong><a href="https://check-ioc.threatstop.com/" rel="noopener">2.&nbsp; ThreatSTOP's Check IOC</a></strong></h5> <p style="font-weight: normal;"><span style="font-size: 16px;">ThreatSTOP’s Check IOC is a security research tool that provides users with invaluable information on whether and why IPs and domains are potentially malicious. With CheckIOC, you can get rich metadata, passive dns and aggregated threat intelligence on millions of indicators of compromise from ThreatSTOP's extensive threat database.</span></p> <p style="font-weight: normal;"><span style="font-size: 16px;">Among the valuable information that this tool offers, users can check in which of ThreatSTOP’s 800+ threat intelligence sources deem a certain IOC as malicious. Users can also upload log files to Check IOC, and the tool will return intel on IOCs it recognizes inside the logs.</span></p> <p><strong><u><span style="font-size: 16px;">What CheckIOC Has to</span> Offer:</u></strong></p> <p style="direction: ltr;"><strong>IPs:&nbsp;</strong><span style="font-weight: normal;">ASN, Whois, DNS lookup, severity level, confidence level, risk level, current target inclusion (blocklist activity), historical current target inclusion, first seen, last seen, number of communication attempts blocked, related records.</span></p> <p style="direction: ltr;"><strong>Domains: </strong><span style="font-weight: normal;">Whois, DNS lookup, severity level, confidence level, risk level, current target inclusion (blocklist activity), historical current target inclusion, first seen, last seen, number of communication attempts blocked, related records.</span></p> <p style="direction: ltr;">&nbsp;</p> <p style="text-align: left;"><img src="https://info.threatstop.com/hubfs/checkioc3.png" alt="checkioc3" width="1860" loading="lazy" style="width: 1860px;"></p> <h5>&nbsp;</h5> <h5 style="font-size: 16px;"><strong><a href="https://threatintelligenceplatform.com/" rel=" noopener">3.&nbsp; Threat Intelligence Platform</a></strong></h5> <p>The Threat Intelligence Platform offers easy to use threat intelligence tools, services, and APIs to get detailed information about hosts and the infrastructure behind them. The platform aggregates data from different providers, their substantial internal databases with information compiled for 10+ years, and real-time host configuration analysis, providing an in-depth look at the target IOCs. TIP’s search engine allows the user to easily search an IP or domain, and quickly receive a full, detailed report.</p> <p>Threat Intelligence Platform offers great technical details on IOCs, and is a great source for that type of information. With that being said, in our security team’s experience using the platform, it seems that its “maliciousness vetting” functionalities aren’t as comprehensive as other platforms, with proven malicious indicators getting high reputation scores TIP. Therefore, we recommend using Threat Intelligence Platform if you want to collect detailed technical and infrastructure data, while we would choose a different platform from this list for maliciousness-reputation inquiries.</p> <p style="font-size: 12px;"><span style="text-decoration: underline; font-size: 16px;"><strong>What TIP Has to Offer:</strong></span></p> <p style="font-size: 12px;"><span style="font-size: 16px;"><span style="text-decoration: underline;"><strong>IPs:</strong></span> Domains hosted, website analysis, potentially dangerous content, host configuration issues, open ports and services, SSL certificate, malware detection, Whois.</span></p> <p style="font-size: 12px;"><span style="font-size: 16px;"><span style="text-decoration: underline;"><strong>Domains:</strong></span> IP resolutions, main infrastructure servers, other domains on the same IP, website analysis, potentially dangerous content, host configuration issues, open ports and services, SSL certificate, malware detection, Whois, and MX, NS and SOA data.</span></p> <p style="font-size: 12px;">&nbsp;</p> <p style="font-size: 12px;"><img src="https://info.threatstop.com/hubfs/image-27.png"></p> <p style="font-size: 12px;">&nbsp;</p> <p style="font-size: 12px;"><img src="https://info.threatstop.com/hubfs/image-28.png"></p> <p>&nbsp;</p> <h5 style="font-size: 16px;"><strong><a href="https://www.ipvoid.com/" rel=" noopener">4.&nbsp; IPVoid</a><span style="color: #000000;"> &amp;</span> <a href="https://www.urlvoid.com/" rel=" noopener">URLVoid</a></strong></h5> <p>IPVoid is a diverse IP analysis toolset, including over 20 tools such as an IP blacklist checker service and various network tools. Each tool is used separately through the Popular IP Tools interface. URLVoid provides URL and domain data, including a blacklist report which checks 30+ blacklist engines and online website reputation services to facilitate the detection of fraudulent and malicious websites.</p> <p><span style="text-decoration: underline;"><strong>What IPVoid and URLVoid Have to Offer:</strong></span></p> <p><span style="text-decoration: underline;"><strong>IPs</strong><strong>:</strong></span> Blacklist check, Whois, ping, CIDR calculator, HTTP headers, DiG, MX, reverse DNS, geolocation, traceroute.</p> <p><span style="text-decoration: underline;"><strong>Domains:</strong></span> Blacklist report, Whois, DNS, ping, resolving IP address.</p> <p>&nbsp;</p> <h5><img src="https://info.threatstop.com/hubfs/image-29.png" loading="lazy"></h5> <p>&nbsp;</p> <h5 style="font-size: 16px;"><strong><a href="https://dnsdumpster.com/" rel=" noopener">5.&nbsp; DNSdumpster</a></strong></h5> <p>DNSdumpster is a domain research tool that displays domain data, including a static and dynamic connections graph, all of which can be easily exported. The platform offers the ability to execute a number of actions on the DNS information, such as get HTTP headers from IP addresses, attempt zone transfers, trace path to IP using MTR, find hosts sharing the same DNS server, search banners for netblock, and do an Nmap port scan.</p> <p><strong><span style="text-decoration: underline;">What DNS</span><u>dumpster Has to Offer:</u></strong></p> <p>Domains: Hosting history by AS, GeoIP of host locations, DNS information, static and dynamic graphs.</p> <p>&nbsp;</p> <p><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;"><img src="https://info.threatstop.com/hubfs/image-31.png"></span></p> <p><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;"><img src="https://info.threatstop.com/hubfs/image-32.png"></span></p> <p>&nbsp;</p> <h5 style="font-size: 16px;"><strong><a href="https://bgpranking.circl.lu/" rel=" noopener">6.&nbsp; CIRCL BGP Ranking</a></strong></h5> <p>CIRCL.lu BGP Ranking a simple platform used to calculate the security ranking of Internet Service Providers. The system gathers external datasources (e.g. dshield, shadowserver, Arbor ATLAS) in order to evaluate the ranking over time, in order to detect any malicious activities of a specific AS number fast and to validate the data sources used for security.</p> <p>This platform is different from the rest in this list, as it does not contain useful data about specific IPs or domains, but rather can give insight to the IP’s ASN. The BGP ranking is a sum of the individual IP rankings, multiplied by each list’s weight. When analyzing an IP, knowing the ASN’s reputation can be helpful in determining the IP’s maliciousness level.</p> <p>&nbsp;</p> <p style="text-align: left;"><img src="https://info.threatstop.com/hubfs/image-33.png"></p> <p style="text-align: center;">&nbsp;</p> <p style="text-align: center;">Each of the above tools has its own advantages and unique data offerings. We recommend trying them out, and experiencing which tools best suit your security needs, as well as your security team’s analysis style.</p> <p style="text-align: center;">&nbsp;</p> <p><strong>Looking for more on IOC analysis? View the other blog posts in this series:</strong></p> <p>Part 1: <a href="/free-open-source-ioc-analysis-tools-why-use-iocs" rel="noopener">Why Use IOCs?</a></p> <p style="direction: ltr;">Part 2: <a href="/threat-exchanges-ioc-sharing" rel="noopener">Threat Exchanges &amp; IOC Sharing</a></p> <p><span>Part 4:&nbsp;<a href="https://blog.threatstop.com/enrichments-connecting-the-dots">Enrichments and Connecting the Dots</a></span></p> <p><span>Part 5:&nbsp;<a href="https://blog.threatstop.com/emotet-banking-trojan-use-case" rel="noopener" target="_blank">Emotet Banking Trojan Use Case</a></span></p> <p><span>Part 6:&nbsp;</span><a href="https://blog.threatstop.com/use-case-guildma-information-stealer" rel="noopener" target="_blank"><span>Guildma Information Stealer Use Case</span></a></p> <p>Part 7: <a href="/blog/apt-10-use-case" rel="noopener">APT10 Use Case</a></p> <p style="text-align: center;">&nbsp;</p> <p style="text-align: center;"><strong>If you haven't yet, subscribe to our blog so you don't miss out on this series and other posts from our experts around all things cyber security. </strong></p> <p style="text-align: center; font-weight: bold;"><em>Ready to try ThreatSTOP in your network? Want an expert-led demo to see how it works?</em></p> <p style="text-align: center;">&nbsp; &nbsp; &nbsp; &nbsp; </p></span>