bulk_ioc_lookup
Batch query up to 10 (free) or 50 (pro) IOCs in one request. Auto-detects indicator type and queries abuse.ch feeds for each. Use for SOC alert triage or batch enrichment.
Instructions
Batch query multiple IOCs (IP/domain/URL/hash, up to 10 free/50 pro) in 1 request: auto-detects type + queries abuse.ch feeds per-indicator. Per-type source coverage matches ioc_lookup: hash → ThreatFox only; IP → ThreatFox + Feodo + URLhaus; domain / URL → ThreatFox + URLhaus. Each result item carries its own verdict.sources_queried / sources_unavailable so partial failures are visible per indicator. Use for SOC alert triage or batch enrichment; use ioc_lookup for single indicator. Free: 100/hr (1 per item), Pro: 1000/hr. Returns {results, total, successful, failed, timed_out, partial, summary}.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| indicators | Yes | List of indicators of compromise: IP addresses, domains, URLs, or file hashes (e.g. ['8.8.8.8', 'evil.com', 'd41d8cd98f00b204e9800998ecf8427e']). Maximum 10 per request for free tier, 50 for Pro. Each indicator type is auto-detected. |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |