labs.inquest.net Open in urlscan Pro
18.235.18.122  Public Scan

URL: https://labs.inquest.net/iocdb'
Submission: On January 17 via api from GB — Scanned from GB

Form analysis 4 forms found in the DOM

<form _ngcontent-bwm-c139="" class="inquest-email-link-signin"><input _ngcontent-bwm-c139="" type="email" placeholder="Sign in via Business Email"><button _ngcontent-bwm-c139="" class="btn btn-danger" disabled="">Sign in</button></form>

<form _ngcontent-bwm-c121="" iquiform="" class="iqui">
  <div _ngcontent-bwm-c121="" class="modal-header">Privacy Policy</div>
  <div _ngcontent-bwm-c121="" class="modal-body"><textarea _ngcontent-bwm-c121="" rows="15" class="form-control w-100 mb-3 iqui-form-control" id="unique-id-2">InQuest respects and protects personal data. We would like to inform you what data we collect during your visit to our Site or when using our Services, how we use these data, and how we handle the security of the data. We process personal data collected during your visit to our Site or during the use of our Services in compliance with the applicable data protection regulations. The following data protection declaration explains what data we collect, process and use.

We use the following definitions in this privacy policy:

  Personal Data, for the purposes of this section, means any information relating to an identified or identifiable natural person (‘data subject’). An identifiable natural person is one who can be identified, directly or indirectly, by reference to an identifier such as a name, an identification number, location data, an online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
  Services means any of our products, services, or deliverables.
  Site means any website operated and controlled by us.

1. How we collect and use personal data

When you visit our website, based on your explicit consent we may collect personal information you provide, such as your company name, first name, last name, title, email, phone and country. We may also collect other information about you through usage of our Site and Services, like information about browser type, OS, time and date of visit, downloaded files. This data will be collected only for technical necessity, agreement obligations, or requests from you.

In order to maintain and provide the services to our customers, we may process certain Personal Data, such as names, addresses, email addresses, and other contact information for designated customer representatives or personnel (“Customer Relationship Data”). Additionally, we may send marketing materials or communications to potential or existing customers (“Marketing Activities”). 

For purposes of Customer Relationship Data and Marketing Activities, we function as a “controller.” Our disclosures with respect to our processing of data as a controller are set forth in this Privacy Policy.

For the Services we offer to our customers, pursuant to the European Union General Data Protection Regulation (GDPR), we function as a “processor”. The scope of applicable data protections and processing for those Services are set forth in contractual agreements with our customers and are therefore not covered by this Privacy Policy. 

2. How we disclose personal data 

Our disclosure is limited to circumstances where we are permitted to do so under applicable European and national data protection laws and regulations. 

Personal data may be shared with third parties on your behalf and only with your consent. When we share personal data, we ensure that third parties use your personal data only for the purpose you consented to and do not allow them to abuse your personal data.

3. Legal basis for processing 

We collect and process your Personal Data for a variety of different purposes which are set out in further detail later in this section. In some cases, we will ask for your consent so that we may process your Personal Data. However, in certain circumstances, applicable data protection laws allow us to process your Personal Data without needing to obtain your consent.  

3.1. Processing personal data where consent is not required 

In certain cases, separate consent is not required, including:

  Performance of a contract.  
  Compliance with legal obligations.  
  Legitimate Interests. 
  Legitimate interests may include: 
    To communicate with you regarding the Services, and to address and respond to your requests, inquiries, and complaints.
    For our direct marketing purposes.
    To send you surveys in connection with our Services.
    To assist in the investigation of suspected illegal or wrongful activity, and to protect and defend our rights and property, or the rights or safety of third parties.
    To develop, provide, and improve our Services.  
    To enforce our Terms of Use, License Agreements, or this Privacy Policy, or agreements with third parties. 

3.2. Consent for processing

In cases where we are not already authorized to process the Personal Data under applicable law, we may ask for your consent to process your Personal Data, including:

Marketing

We may ask for your consent to contact you by telephone, SMS, post and/or email about other offers, products, promotions, developments or Services which we think may be of interest to you, and for other marketing purposes. 

Use of Cookies

Our Site uses cookies and similar technologies for analytics and in order to improve user experience.

4. Protection of minors

We do not collect personal data of children without the consent of their parents. We do not request personal data from children and adolescents. We knowingly do not collect such data and do not pass it on to third parties. If we receive a notice that we have collected data of a minor, we will make all reasonable effort to delete such data.

5. Data subject rights

In certain circumstances, you have the right to request confirmation from us as to whether or not we are processing your Personal Data.  Where we are processing your Personal Data, you also have the right to request access to, modification of, or deletion of such Personal Data. 

You also have the right in certain circumstances to receive the Personal Data concerning you that you provided to us, to restrict processing of your Personal Data, or to transmit such data to another controller.

To exercise your rights with respect to your Personal Data, please contact us at privacy@inquest.net. 

As permitted by law, certain data elements may not be subject to access, modification, portability, restriction, and/or deletion.  Furthermore, where permissible, we may charge for this service.  We will respond to reasonable requests as soon as practicable and as required by law.

6. Withdrawing your consent 

  You may at any time withdraw the consent you provide for the processing of your Personal Data for the purposes set forth in this Privacy Policy, if we are not required by applicable law or professional standards to retain such information.

7. Personal data security

We use advanced security measures to protect your personal data, which we manage against accidental or intentional manipulation, loss, destruction or access by unauthorized persons. Our security measures are continuously improved according to developments in technology and changes in legislation. Additionally, we will report any unlawful data breach of this Site database or the database(s) of any of our third-party data processors to all relevant persons and authorities within 72 hours of the breach if it is apparent that personal data stored in an identifiable manner has been stolen.

8. Update of policy

We reserve the right to change the data protection policy at any time because of technical or other reasons and recommend that you revise the current privacy policy from time to time.

9. Data retention

We will retain your Personal Data for as long as you maintain an account or subscription agreement, or as otherwise necessary to provide you the Services.  We will also retain your Personal Data as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements. 

10. Contact us

If you have questions regarding this Privacy Policy or about handling your personal data, please contact us at: privacy@inquest.net. 
    </textarea>
    <div _ngcontent-bwm-c121="" iquiformgroup="" class="form-check m-0 iqui"><input _ngcontent-bwm-c121="" type="checkbox" class="form-check-input iqui" value="false" id="unique-id-3"><label _ngcontent-bwm-c121="" class="form-check-label iqui"
        for="unique-id-3"> I accept the privacy policy </label></div>
  </div>
  <div _ngcontent-bwm-c121="" class="modal-footer"><!----><button _ngcontent-bwm-c121="" class="btn btn-secondary iqui-btn">Decline</button><button _ngcontent-bwm-c121="" class="btn btn-danger iqui-btn" disabled="">Accept</button></div>
</form>

<form _ngcontent-bwm-c140="" class="mb-3">
  <div _ngcontent-bwm-c140="" class="modal-body">
    <p _ngcontent-bwm-c140=""> Enter your email address to receive a monthly mailer that provides insights into industry and InQuest happenings. Browse past issues at:
      <a _ngcontent-bwm-c140="" href="https://inquest.net/newsletter">https://inquest.net/newsletter</a></p><label _ngcontent-bwm-c140="">Email Address <span _ngcontent-bwm-c140="" class="asterisk">*</span></label><input _ngcontent-bwm-c140=""
      type="email" class="form-control"><!---->
  </div>
  <div _ngcontent-bwm-c140="" class="modal-footer"><button _ngcontent-bwm-c140="" type="button" class="btn btn-secondary"> Cancel </button><button _ngcontent-bwm-c140="" type="submit" class="btn btn-danger"> Subscribe </button></div>
</form>

<form _ngcontent-bwm-c122="" class="d-flex flex flex-column" style="min-width: 40vw;">
  <div _ngcontent-bwm-c122="" class="w-100 d-flex flex-grow-1 mb-2"><input _ngcontent-bwm-c122="" type="text" placeholder="IP, domain, URL, or hash." class="global-search-modal me"><button _ngcontent-bwm-c122=""
      class="btn btn-sm btn-danger">Lookup</button></div>
</form>

Text Content

We are thrilled to announce that InQuest has been acquired by OPSWAT. Read more.
Close
 * Log in
   
   


Indicator Lookup
   
 * 
 * HOME
 * DFI
 * REP-DB
 * IOC-DB
 * YARA
   YARA
   Base64 RegEx Generator CIDR Block RegEx Generator Mixed Hex Case Generator
   UInt() Trigger Generator Awesome-YARAInQuest Open Source YARA Rules
 * SOCIAL
   SOCIAL
   TwitterLinkedInGitHubPyPiYouTube
 * ABOUT
   ABOUT
   About InQuest About Deep File Inspection (DFI) About the Reputation Database
   About the IOC Harvesting Database About the Trystero Project What's New?
   Changelog. User Guide / WikiAPI DocumentationOpenAPI SpecificationPython CLI
   / Library
 * 
 * Newsletter
   
 * 
 * Sign(Up|In)



THE TRYSTERO PROJECT

The vast majority of attacks (>90%) are email borne. The "Trystero Project" is
our code name for an experiment that we're actively conducting to measure the
security efficacy of the two largest mail providers, Google and Microsoft, as
well as InQuest, against real-world emerging malware. Click the graph below to
list evasive samples from any given day, take a deeper dive into the history and
specifics, or register here to test how well your email security stacks up.
Totals

Attacks Missed in1 month4 months1 yearAll time:Line (Logarithmic)Line
(Linear)Bar

DFI
Files: 4.3M,Artifacts: 740.9M,Queued: 0

DEEP FILE INSPECTION (DFI)

Upload common malware lures (DOC(X), XLS(X), PPT(X)) for Deep File Inspection
and heuristical analysis. Explore the embedded logic, semantic context,
metadata, and millions of artifacts harvested from this growing corpus of files.
Download samples for research purposes.

Launch
Inspect file(s)
REP-DB
IOCs: 76.9M

AGGREGATE REPUTATION DATABASE

Search a catalog of IP addresses, ASNs, URLs, and domains aggregated from over
two dozen public reputation dissemination feeds. Pivot from these indicators
through other tools like Shodan, Greynoise, DomainTools, VirusTotal, and
PacketTotal.

Launch

IOC-DB
IOCs: 44.2M

INDICATORS OF COMPROMISE (IOC) DATABASE

Discover IOCs and artifacts published by individuals and teams through mediums
such as Twitter, Github, and blogs. Data types include URLs, domains, IP
addresses, file hashes, and YARA rules.

Launch

YARA


BASE64 REGULAR EXPRESSION GENERATOR

Save time and avoid tedious manual labor by automatically converting plain-text
regular expressions into their base64 compatible form.

Launch

YARA


CIDR BLOCK REGEXP GENERATOR

Convert an IPv4 CIDR block to a regular expression suitable for usage as a YARA
string.
NEW

Launch

YARA


MIXED HEX CASE GENERATOR

Translate hex encoded strings into a regular expression form that is agnostic to
MixED CaSE CharACtErS.

Launch

YARA


UINT() TRIGGER GENERATOR

Improve the performance of your YARA rules by converting string comparisons into
unsigned integer pointer dereferences.

Launch


LATEST FROM INQUEST BLOG

What is Detection Engineering? 
Published 2024-12-05 by Darren Spruell

Detection engineering is a field of cybersecurity focused on designing,
implementing, and maintaining detection methods to identify potential security
threats within an organization’s environment. It goes beyond simply setting up
alerts and involves a strategic approach to understanding threat behaviors,
identifying IOCs (indicators of compromise), and developing detection logic that
accurately identifies malicious activity without […]

USPS Parcel Delivery Themed Smishing Campaign Activity
Published 2024-07-17 by Hunter Headapohl

Cybercriminals and threat actors continually evolve their tactics to deceive and
exploit users. One of the most persistent threats is smishing—a blend of SMS
(text message) and phishing attacks. Recently, smishing campaigns have
increasingly leveraged themes from the United States Postal Service (USPS),
making them particularly dangerous and difficult to detect when targeted
directly at […]

Ever Rising Threat of Modern Data Extortion
Published 2024-06-28 by William MacArthur

Intro Glancing at the present-day threat landscape, ransomware is top of mind
whenever an incident starts flooding the news cycle. It is a constantly growing
problem that seems to know no bounds, no organization is immune, and everyone is
a potential target. The large number of companies leveraging cloud services and
systems always connected to […]

Sitemap
Deep File Inspection (DFI)
DFI
Crawler Databases (DB)
Reputation DB
Indicators of Compromise (IOC) DB
YARA Tools
Base64 RegEx Generator
CIDR Block RegExp Generator
Mixed Hex Case Generator
UInt() Trigger Generator
Awesome-YARA
InQuest Open Source YARA Rules
The Trystero Project
🎺About Trystero
Contact
 * Free Email Attack Simulation
 * Free Threat Intelligence

 * Phone: +1 (866) 982-0561
 * Support web: support.inquest.net
 * Support: support@inquest.net
 * Sales: sales@inquest.net
 * PGP Key

InQuest™ Labs
2403 East 16th Street Studio Q
Austin Texas 78702
Social
 * 😃YARA Mate
 * Twitter
 * LinkedIn
 * GitHub
 * PyPi
 * YouTube
 * InQuest™ Blog

Docs
 * User Guide / Wiki
 * API Documentation
 * OpenAPI Specification
 * Python CLI / Library

Copyright InQuest™ © 2025
sitemap.xml
Base64 RegEx Generator CIDR Block RegEx Generator Mixed Hex Case Generator
UInt() Trigger Generator

Awesome-YARAInQuest Open Source YARA Rules

TwitterLinkedInGitHubPyPiYouTube

About InQuest About Deep File Inspection (DFI) About the Reputation Database
About the IOC Harvesting Database About the Trystero Project What's New?
Changelog.

User Guide / WikiAPI DocumentationOpenAPI SpecificationPython CLI / Library

Queue Notifications [clear all]
0 files in queue (0 total queue length)




SIGN INTO INQUEST LABS

InQuest Labs supports authentication via OAuth as well as "magic link" login for
business e-mail addresses. Signing in/up is free and provides access to the
following full feature-set:
 * Login via business e-mail address to receive e-mail notifications when
   ingested files reference your company domain.
 * Unlimited daily requests and increased look-back.
 * See/sort/filter by AntiVirus and InQuest ML analysis.
 * Download malicious samples.
 * Generate API key(s) for CLI/programmatic interfacing.

Access via Email Magic Link

Sign in

Access via OAuth

Sign in with GoogleSign in with GitHub

Privacy Policy
InQuest respects and protects personal data. We would like to inform you what
data we collect during your visit to our Site or when using our Services, how we
use these data, and how we handle the security of the data. We process personal
data collected during your visit to our Site or during the use of our Services
in compliance with the applicable data protection regulations. The following
data protection declaration explains what data we collect, process and use. We
use the following definitions in this privacy policy: Personal Data, for the
purposes of this section, means any information relating to an identified or
identifiable natural person (‘data subject’). An identifiable natural person is
one who can be identified, directly or indirectly, by reference to an identifier
such as a name, an identification number, location data, an online identifier,
or to one or more factors specific to the physical, physiological, genetic,
mental, economic, cultural or social identity of that natural person. Services
means any of our products, services, or deliverables. Site means any website
operated and controlled by us. 1. How we collect and use personal data When you
visit our website, based on your explicit consent we may collect personal
information you provide, such as your company name, first name, last name,
title, email, phone and country. We may also collect other information about you
through usage of our Site and Services, like information about browser type, OS,
time and date of visit, downloaded files. This data will be collected only for
technical necessity, agreement obligations, or requests from you. In order to
maintain and provide the services to our customers, we may process certain
Personal Data, such as names, addresses, email addresses, and other contact
information for designated customer representatives or personnel (“Customer
Relationship Data”). Additionally, we may send marketing materials or
communications to potential or existing customers (“Marketing Activities”). For
purposes of Customer Relationship Data and Marketing Activities, we function as
a “controller.” Our disclosures with respect to our processing of data as a
controller are set forth in this Privacy Policy. For the Services we offer to
our customers, pursuant to the European Union General Data Protection Regulation
(GDPR), we function as a “processor”. The scope of applicable data protections
and processing for those Services are set forth in contractual agreements with
our customers and are therefore not covered by this Privacy Policy. 2. How we
disclose personal data Our disclosure is limited to circumstances where we are
permitted to do so under applicable European and national data protection laws
and regulations. Personal data may be shared with third parties on your behalf
and only with your consent. When we share personal data, we ensure that third
parties use your personal data only for the purpose you consented to and do not
allow them to abuse your personal data. 3. Legal basis for processing We collect
and process your Personal Data for a variety of different purposes which are set
out in further detail later in this section. In some cases, we will ask for your
consent so that we may process your Personal Data. However, in certain
circumstances, applicable data protection laws allow us to process your Personal
Data without needing to obtain your consent. 3.1. Processing personal data where
consent is not required In certain cases, separate consent is not required,
including: Performance of a contract. Compliance with legal obligations.
Legitimate Interests. Legitimate interests may include: To communicate with you
regarding the Services, and to address and respond to your requests, inquiries,
and complaints. For our direct marketing purposes. To send you surveys in
connection with our Services. To assist in the investigation of suspected
illegal or wrongful activity, and to protect and defend our rights and property,
or the rights or safety of third parties. To develop, provide, and improve our
Services. To enforce our Terms of Use, License Agreements, or this Privacy
Policy, or agreements with third parties. 3.2. Consent for processing In cases
where we are not already authorized to process the Personal Data under
applicable law, we may ask for your consent to process your Personal Data,
including: Marketing We may ask for your consent to contact you by telephone,
SMS, post and/or email about other offers, products, promotions, developments or
Services which we think may be of interest to you, and for other marketing
purposes. Use of Cookies Our Site uses cookies and similar technologies for
analytics and in order to improve user experience. 4. Protection of minors We do
not collect personal data of children without the consent of their parents. We
do not request personal data from children and adolescents. We knowingly do not
collect such data and do not pass it on to third parties. If we receive a notice
that we have collected data of a minor, we will make all reasonable effort to
delete such data. 5. Data subject rights In certain circumstances, you have the
right to request confirmation from us as to whether or not we are processing
your Personal Data. Where we are processing your Personal Data, you also have
the right to request access to, modification of, or deletion of such Personal
Data. You also have the right in certain circumstances to receive the Personal
Data concerning you that you provided to us, to restrict processing of your
Personal Data, or to transmit such data to another controller. To exercise your
rights with respect to your Personal Data, please contact us at
privacy@inquest.net. As permitted by law, certain data elements may not be
subject to access, modification, portability, restriction, and/or deletion.
Furthermore, where permissible, we may charge for this service. We will respond
to reasonable requests as soon as practicable and as required by law. 6.
Withdrawing your consent You may at any time withdraw the consent you provide
for the processing of your Personal Data for the purposes set forth in this
Privacy Policy, if we are not required by applicable law or professional
standards to retain such information. 7. Personal data security We use advanced
security measures to protect your personal data, which we manage against
accidental or intentional manipulation, loss, destruction or access by
unauthorized persons. Our security measures are continuously improved according
to developments in technology and changes in legislation. Additionally, we will
report any unlawful data breach of this Site database or the database(s) of any
of our third-party data processors to all relevant persons and authorities
within 72 hours of the breach if it is apparent that personal data stored in an
identifiable manner has been stolen. 8. Update of policy We reserve the right to
change the data protection policy at any time because of technical or other
reasons and recommend that you revise the current privacy policy from time to
time. 9. Data retention We will retain your Personal Data for as long as you
maintain an account or subscription agreement, or as otherwise necessary to
provide you the Services. We will also retain your Personal Data as necessary to
comply with our legal obligations, resolve disputes, and enforce our agreements.
10. Contact us If you have questions regarding this Privacy Policy or about
handling your personal data, please contact us at: privacy@inquest.net.
I accept the privacy policy
DeclineAccept


SUBSCRIBE TO INQUEST NEWSLETTER

Enter your email address to receive a monthly mailer that provides insights into
industry and InQuest happenings. Browse past issues at:
https://inquest.net/newsletter

Email Address *
Cancel Subscribe


INQUEST LABS IOC LOOKUP

Lookup


Drop to upload and inspect file(s)
Copied to clipboard.