Hunt
The Hunt feature in Inopli DRP enables users to search and investigate threat indicators across the platform’s internal intelligence base and correlated public feeds. Designed for both proactive threat hunting and reactive validation, it supports security teams in identifying malicious infrastructure, leaked assets, and suspicious behaviors across multiple dimensions.
This module provides immediate visibility into known threats and related findings, allowing analysts to trace attacker footprints, validate detection signals, and enrich investigations with contextual threat data.
Searchable Indicator Types
Hunting can be performed using the following categories:
IP Address – Malicious or suspicious network indicators
Hash – Known malware or leaked file signatures
Domain – Phishing domains, typo-squats, and rogue infrastructure
Email – Exposed, spoofed, or attacker-attributed email addresses
URL – Hostnames or full links used in phishing or malware delivery
Username – Aliases used in forums, dumps, or credential leaks
Interface Overview
Users initiate a search by selecting the indicator type and entering the corresponding value. The Hunt engine returns results enriched with reputation signals, detection history, threat relationships, and classification.

Last updated