Hunt

The Hunt feature in Inopli DRP enables users to search and investigate threat indicators across the platform’s internal intelligence base and correlated public feeds. Designed for both proactive threat hunting and reactive validation, it supports security teams in identifying malicious infrastructure, leaked assets, and suspicious behaviors across multiple dimensions.

This module provides immediate visibility into known threats and related findings, allowing analysts to trace attacker footprints, validate detection signals, and enrich investigations with contextual threat data.


Searchable Indicator Types

Hunting can be performed using the following categories:

  • IP Address – Malicious or suspicious network indicators

  • Hash – Known malware or leaked file signatures

  • Domain – Phishing domains, typo-squats, and rogue infrastructure

  • Email – Exposed, spoofed, or attacker-attributed email addresses

  • URL – Hostnames or full links used in phishing or malware delivery

  • Username – Aliases used in forums, dumps, or credential leaks


Interface Overview

Users initiate a search by selecting the indicator type and entering the corresponding value. The Hunt engine returns results enriched with reputation signals, detection history, threat relationships, and classification.

Last updated