Indicators

Bulk IOC lookup with full threat context

Enrich IPs, domains, file hashes, URLs, and email addresses against our live indicator database. Get severity scores, actor attribution, and historical context.

Get Free API Key View API Docs →
89,000+ IOC Lookup articles
20 yrs Historical coverage
Live Real-time updates

API Coverage

What you get with the IOC Lookup API

Data endpoints

  • IP, domain, hash, URL, email lookups
  • Severity score and classification
  • Threat actor attribution per indicator
  • Historical first/last-seen context
  • Bulk lookup (up to 100 IOCs per request)

Use cases

  • SIEM alert enrichment automation
  • Phishing email triage
  • Firewall/proxy blocklist generation
  • Incident response artifact lookup
  • Threat hunting pivot points

Query IOC Lookup intelligence in seconds

Single REST API key. JSON everywhere. Start for free with 30 req/min.

Get your free key →
# Search IOC Lookup threats curl https://dailycyberalert.com/api/v1/search \ -H "X-API-Key: cb_live_xxxxxxxxxxxx" \ -d '{"q": "malicious IP lookup", "limit": 5}' # Response { "total": 89120, "results": [{ "title": "Cobalt Strike C2 infrastructure: 47 new IPs identified", "severity": "high", "published": "2026-03-29" }] }

Start querying IOC Lookup data now

Free tier: 30 req/min, full search, IOC lookup, CVE data. No credit card required. API key in 30 seconds.