labs.inquest.net
Open in
urlscan Pro
18.235.18.122
Public Scan
URL:
https://labs.inquest.net/iocdb'
Submission: On January 17 via api from GB — Scanned from GB
Submission: On January 17 via api from GB — Scanned from GB
Form analysis
4 forms found in the DOM<form _ngcontent-bwm-c139="" class="inquest-email-link-signin"><input _ngcontent-bwm-c139="" type="email" placeholder="Sign in via Business Email"><button _ngcontent-bwm-c139="" class="btn btn-danger" disabled="">Sign in</button></form>
<form _ngcontent-bwm-c121="" iquiform="" class="iqui">
<div _ngcontent-bwm-c121="" class="modal-header">Privacy Policy</div>
<div _ngcontent-bwm-c121="" class="modal-body"><textarea _ngcontent-bwm-c121="" rows="15" class="form-control w-100 mb-3 iqui-form-control" id="unique-id-2">InQuest respects and protects personal data. We would like to inform you what data we collect during your visit to our Site or when using our Services, how we use these data, and how we handle the security of the data. We process personal data collected during your visit to our Site or during the use of our Services in compliance with the applicable data protection regulations. The following data protection declaration explains what data we collect, process and use.
We use the following definitions in this privacy policy:
Personal Data, for the purposes of this section, means any information relating to an identified or identifiable natural person (‘data subject’). An identifiable natural person is one who can be identified, directly or indirectly, by reference to an identifier such as a name, an identification number, location data, an online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
Services means any of our products, services, or deliverables.
Site means any website operated and controlled by us.
1. How we collect and use personal data
When you visit our website, based on your explicit consent we may collect personal information you provide, such as your company name, first name, last name, title, email, phone and country. We may also collect other information about you through usage of our Site and Services, like information about browser type, OS, time and date of visit, downloaded files. This data will be collected only for technical necessity, agreement obligations, or requests from you.
In order to maintain and provide the services to our customers, we may process certain Personal Data, such as names, addresses, email addresses, and other contact information for designated customer representatives or personnel (“Customer Relationship Data”). Additionally, we may send marketing materials or communications to potential or existing customers (“Marketing Activities”).
For purposes of Customer Relationship Data and Marketing Activities, we function as a “controller.” Our disclosures with respect to our processing of data as a controller are set forth in this Privacy Policy.
For the Services we offer to our customers, pursuant to the European Union General Data Protection Regulation (GDPR), we function as a “processor”. The scope of applicable data protections and processing for those Services are set forth in contractual agreements with our customers and are therefore not covered by this Privacy Policy.
2. How we disclose personal data
Our disclosure is limited to circumstances where we are permitted to do so under applicable European and national data protection laws and regulations.
Personal data may be shared with third parties on your behalf and only with your consent. When we share personal data, we ensure that third parties use your personal data only for the purpose you consented to and do not allow them to abuse your personal data.
3. Legal basis for processing
We collect and process your Personal Data for a variety of different purposes which are set out in further detail later in this section. In some cases, we will ask for your consent so that we may process your Personal Data. However, in certain circumstances, applicable data protection laws allow us to process your Personal Data without needing to obtain your consent.
3.1. Processing personal data where consent is not required
In certain cases, separate consent is not required, including:
Performance of a contract.
Compliance with legal obligations.
Legitimate Interests.
Legitimate interests may include:
To communicate with you regarding the Services, and to address and respond to your requests, inquiries, and complaints.
For our direct marketing purposes.
To send you surveys in connection with our Services.
To assist in the investigation of suspected illegal or wrongful activity, and to protect and defend our rights and property, or the rights or safety of third parties.
To develop, provide, and improve our Services.
To enforce our Terms of Use, License Agreements, or this Privacy Policy, or agreements with third parties.
3.2. Consent for processing
In cases where we are not already authorized to process the Personal Data under applicable law, we may ask for your consent to process your Personal Data, including:
Marketing
We may ask for your consent to contact you by telephone, SMS, post and/or email about other offers, products, promotions, developments or Services which we think may be of interest to you, and for other marketing purposes.
Use of Cookies
Our Site uses cookies and similar technologies for analytics and in order to improve user experience.
4. Protection of minors
We do not collect personal data of children without the consent of their parents. We do not request personal data from children and adolescents. We knowingly do not collect such data and do not pass it on to third parties. If we receive a notice that we have collected data of a minor, we will make all reasonable effort to delete such data.
5. Data subject rights
In certain circumstances, you have the right to request confirmation from us as to whether or not we are processing your Personal Data. Where we are processing your Personal Data, you also have the right to request access to, modification of, or deletion of such Personal Data.
You also have the right in certain circumstances to receive the Personal Data concerning you that you provided to us, to restrict processing of your Personal Data, or to transmit such data to another controller.
To exercise your rights with respect to your Personal Data, please contact us at privacy@inquest.net.
As permitted by law, certain data elements may not be subject to access, modification, portability, restriction, and/or deletion. Furthermore, where permissible, we may charge for this service. We will respond to reasonable requests as soon as practicable and as required by law.
6. Withdrawing your consent
You may at any time withdraw the consent you provide for the processing of your Personal Data for the purposes set forth in this Privacy Policy, if we are not required by applicable law or professional standards to retain such information.
7. Personal data security
We use advanced security measures to protect your personal data, which we manage against accidental or intentional manipulation, loss, destruction or access by unauthorized persons. Our security measures are continuously improved according to developments in technology and changes in legislation. Additionally, we will report any unlawful data breach of this Site database or the database(s) of any of our third-party data processors to all relevant persons and authorities within 72 hours of the breach if it is apparent that personal data stored in an identifiable manner has been stolen.
8. Update of policy
We reserve the right to change the data protection policy at any time because of technical or other reasons and recommend that you revise the current privacy policy from time to time.
9. Data retention
We will retain your Personal Data for as long as you maintain an account or subscription agreement, or as otherwise necessary to provide you the Services. We will also retain your Personal Data as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements.
10. Contact us
If you have questions regarding this Privacy Policy or about handling your personal data, please contact us at: privacy@inquest.net.
</textarea>
<div _ngcontent-bwm-c121="" iquiformgroup="" class="form-check m-0 iqui"><input _ngcontent-bwm-c121="" type="checkbox" class="form-check-input iqui" value="false" id="unique-id-3"><label _ngcontent-bwm-c121="" class="form-check-label iqui"
for="unique-id-3"> I accept the privacy policy </label></div>
</div>
<div _ngcontent-bwm-c121="" class="modal-footer"><!----><button _ngcontent-bwm-c121="" class="btn btn-secondary iqui-btn">Decline</button><button _ngcontent-bwm-c121="" class="btn btn-danger iqui-btn" disabled="">Accept</button></div>
</form>
<form _ngcontent-bwm-c140="" class="mb-3">
<div _ngcontent-bwm-c140="" class="modal-body">
<p _ngcontent-bwm-c140=""> Enter your email address to receive a monthly mailer that provides insights into industry and InQuest happenings. Browse past issues at:
<a _ngcontent-bwm-c140="" href="https://inquest.net/newsletter">https://inquest.net/newsletter</a></p><label _ngcontent-bwm-c140="">Email Address <span _ngcontent-bwm-c140="" class="asterisk">*</span></label><input _ngcontent-bwm-c140=""
type="email" class="form-control"><!---->
</div>
<div _ngcontent-bwm-c140="" class="modal-footer"><button _ngcontent-bwm-c140="" type="button" class="btn btn-secondary"> Cancel </button><button _ngcontent-bwm-c140="" type="submit" class="btn btn-danger"> Subscribe </button></div>
</form>
<form _ngcontent-bwm-c122="" class="d-flex flex flex-column" style="min-width: 40vw;">
<div _ngcontent-bwm-c122="" class="w-100 d-flex flex-grow-1 mb-2"><input _ngcontent-bwm-c122="" type="text" placeholder="IP, domain, URL, or hash." class="global-search-modal me"><button _ngcontent-bwm-c122=""
class="btn btn-sm btn-danger">Lookup</button></div>
</form>
Text Content
We are thrilled to announce that InQuest has been acquired by OPSWAT. Read more. Close * Log in Indicator Lookup * * HOME * DFI * REP-DB * IOC-DB * YARA YARA Base64 RegEx Generator CIDR Block RegEx Generator Mixed Hex Case Generator UInt() Trigger Generator Awesome-YARAInQuest Open Source YARA Rules * SOCIAL SOCIAL TwitterLinkedInGitHubPyPiYouTube * ABOUT ABOUT About InQuest About Deep File Inspection (DFI) About the Reputation Database About the IOC Harvesting Database About the Trystero Project What's New? Changelog. User Guide / WikiAPI DocumentationOpenAPI SpecificationPython CLI / Library * * Newsletter * * Sign(Up|In) THE TRYSTERO PROJECT The vast majority of attacks (>90%) are email borne. The "Trystero Project" is our code name for an experiment that we're actively conducting to measure the security efficacy of the two largest mail providers, Google and Microsoft, as well as InQuest, against real-world emerging malware. Click the graph below to list evasive samples from any given day, take a deeper dive into the history and specifics, or register here to test how well your email security stacks up. Totals Attacks Missed in1 month4 months1 yearAll time:Line (Logarithmic)Line (Linear)Bar DFI Files: 4.3M,Artifacts: 740.9M,Queued: 0 DEEP FILE INSPECTION (DFI) Upload common malware lures (DOC(X), XLS(X), PPT(X)) for Deep File Inspection and heuristical analysis. Explore the embedded logic, semantic context, metadata, and millions of artifacts harvested from this growing corpus of files. Download samples for research purposes. Launch Inspect file(s) REP-DB IOCs: 76.9M AGGREGATE REPUTATION DATABASE Search a catalog of IP addresses, ASNs, URLs, and domains aggregated from over two dozen public reputation dissemination feeds. Pivot from these indicators through other tools like Shodan, Greynoise, DomainTools, VirusTotal, and PacketTotal. Launch IOC-DB IOCs: 44.2M INDICATORS OF COMPROMISE (IOC) DATABASE Discover IOCs and artifacts published by individuals and teams through mediums such as Twitter, Github, and blogs. Data types include URLs, domains, IP addresses, file hashes, and YARA rules. Launch YARA BASE64 REGULAR EXPRESSION GENERATOR Save time and avoid tedious manual labor by automatically converting plain-text regular expressions into their base64 compatible form. Launch YARA CIDR BLOCK REGEXP GENERATOR Convert an IPv4 CIDR block to a regular expression suitable for usage as a YARA string. NEW Launch YARA MIXED HEX CASE GENERATOR Translate hex encoded strings into a regular expression form that is agnostic to MixED CaSE CharACtErS. Launch YARA UINT() TRIGGER GENERATOR Improve the performance of your YARA rules by converting string comparisons into unsigned integer pointer dereferences. Launch LATEST FROM INQUEST BLOG What is Detection Engineering? Published 2024-12-05 by Darren Spruell Detection engineering is a field of cybersecurity focused on designing, implementing, and maintaining detection methods to identify potential security threats within an organization’s environment. It goes beyond simply setting up alerts and involves a strategic approach to understanding threat behaviors, identifying IOCs (indicators of compromise), and developing detection logic that accurately identifies malicious activity without […] USPS Parcel Delivery Themed Smishing Campaign Activity Published 2024-07-17 by Hunter Headapohl Cybercriminals and threat actors continually evolve their tactics to deceive and exploit users. One of the most persistent threats is smishing—a blend of SMS (text message) and phishing attacks. Recently, smishing campaigns have increasingly leveraged themes from the United States Postal Service (USPS), making them particularly dangerous and difficult to detect when targeted directly at […] Ever Rising Threat of Modern Data Extortion Published 2024-06-28 by William MacArthur Intro Glancing at the present-day threat landscape, ransomware is top of mind whenever an incident starts flooding the news cycle. It is a constantly growing problem that seems to know no bounds, no organization is immune, and everyone is a potential target. The large number of companies leveraging cloud services and systems always connected to […] Sitemap Deep File Inspection (DFI) DFI Crawler Databases (DB) Reputation DB Indicators of Compromise (IOC) DB YARA Tools Base64 RegEx Generator CIDR Block RegExp Generator Mixed Hex Case Generator UInt() Trigger Generator Awesome-YARA InQuest Open Source YARA Rules The Trystero Project 🎺About Trystero Contact * Free Email Attack Simulation * Free Threat Intelligence * Phone: +1 (866) 982-0561 * Support web: support.inquest.net * Support: support@inquest.net * Sales: sales@inquest.net * PGP Key InQuest™ Labs 2403 East 16th Street Studio Q Austin Texas 78702 Social * 😃YARA Mate * Twitter * LinkedIn * GitHub * PyPi * YouTube * InQuest™ Blog Docs * User Guide / Wiki * API Documentation * OpenAPI Specification * Python CLI / Library Copyright InQuest™ © 2025 sitemap.xml Base64 RegEx Generator CIDR Block RegEx Generator Mixed Hex Case Generator UInt() Trigger Generator Awesome-YARAInQuest Open Source YARA Rules TwitterLinkedInGitHubPyPiYouTube About InQuest About Deep File Inspection (DFI) About the Reputation Database About the IOC Harvesting Database About the Trystero Project What's New? Changelog. User Guide / WikiAPI DocumentationOpenAPI SpecificationPython CLI / Library Queue Notifications [clear all] 0 files in queue (0 total queue length) SIGN INTO INQUEST LABS InQuest Labs supports authentication via OAuth as well as "magic link" login for business e-mail addresses. Signing in/up is free and provides access to the following full feature-set: * Login via business e-mail address to receive e-mail notifications when ingested files reference your company domain. * Unlimited daily requests and increased look-back. * See/sort/filter by AntiVirus and InQuest ML analysis. * Download malicious samples. * Generate API key(s) for CLI/programmatic interfacing. Access via Email Magic Link Sign in Access via OAuth Sign in with GoogleSign in with GitHub Privacy Policy InQuest respects and protects personal data. We would like to inform you what data we collect during your visit to our Site or when using our Services, how we use these data, and how we handle the security of the data. We process personal data collected during your visit to our Site or during the use of our Services in compliance with the applicable data protection regulations. The following data protection declaration explains what data we collect, process and use. We use the following definitions in this privacy policy: Personal Data, for the purposes of this section, means any information relating to an identified or identifiable natural person (‘data subject’). An identifiable natural person is one who can be identified, directly or indirectly, by reference to an identifier such as a name, an identification number, location data, an online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. Services means any of our products, services, or deliverables. Site means any website operated and controlled by us. 1. How we collect and use personal data When you visit our website, based on your explicit consent we may collect personal information you provide, such as your company name, first name, last name, title, email, phone and country. We may also collect other information about you through usage of our Site and Services, like information about browser type, OS, time and date of visit, downloaded files. This data will be collected only for technical necessity, agreement obligations, or requests from you. In order to maintain and provide the services to our customers, we may process certain Personal Data, such as names, addresses, email addresses, and other contact information for designated customer representatives or personnel (“Customer Relationship Data”). Additionally, we may send marketing materials or communications to potential or existing customers (“Marketing Activities”). For purposes of Customer Relationship Data and Marketing Activities, we function as a “controller.” Our disclosures with respect to our processing of data as a controller are set forth in this Privacy Policy. For the Services we offer to our customers, pursuant to the European Union General Data Protection Regulation (GDPR), we function as a “processor”. The scope of applicable data protections and processing for those Services are set forth in contractual agreements with our customers and are therefore not covered by this Privacy Policy. 2. How we disclose personal data Our disclosure is limited to circumstances where we are permitted to do so under applicable European and national data protection laws and regulations. Personal data may be shared with third parties on your behalf and only with your consent. When we share personal data, we ensure that third parties use your personal data only for the purpose you consented to and do not allow them to abuse your personal data. 3. Legal basis for processing We collect and process your Personal Data for a variety of different purposes which are set out in further detail later in this section. In some cases, we will ask for your consent so that we may process your Personal Data. However, in certain circumstances, applicable data protection laws allow us to process your Personal Data without needing to obtain your consent. 3.1. Processing personal data where consent is not required In certain cases, separate consent is not required, including: Performance of a contract. Compliance with legal obligations. Legitimate Interests. Legitimate interests may include: To communicate with you regarding the Services, and to address and respond to your requests, inquiries, and complaints. For our direct marketing purposes. To send you surveys in connection with our Services. To assist in the investigation of suspected illegal or wrongful activity, and to protect and defend our rights and property, or the rights or safety of third parties. To develop, provide, and improve our Services. To enforce our Terms of Use, License Agreements, or this Privacy Policy, or agreements with third parties. 3.2. Consent for processing In cases where we are not already authorized to process the Personal Data under applicable law, we may ask for your consent to process your Personal Data, including: Marketing We may ask for your consent to contact you by telephone, SMS, post and/or email about other offers, products, promotions, developments or Services which we think may be of interest to you, and for other marketing purposes. Use of Cookies Our Site uses cookies and similar technologies for analytics and in order to improve user experience. 4. Protection of minors We do not collect personal data of children without the consent of their parents. We do not request personal data from children and adolescents. We knowingly do not collect such data and do not pass it on to third parties. If we receive a notice that we have collected data of a minor, we will make all reasonable effort to delete such data. 5. Data subject rights In certain circumstances, you have the right to request confirmation from us as to whether or not we are processing your Personal Data. Where we are processing your Personal Data, you also have the right to request access to, modification of, or deletion of such Personal Data. You also have the right in certain circumstances to receive the Personal Data concerning you that you provided to us, to restrict processing of your Personal Data, or to transmit such data to another controller. To exercise your rights with respect to your Personal Data, please contact us at privacy@inquest.net. As permitted by law, certain data elements may not be subject to access, modification, portability, restriction, and/or deletion. Furthermore, where permissible, we may charge for this service. We will respond to reasonable requests as soon as practicable and as required by law. 6. Withdrawing your consent You may at any time withdraw the consent you provide for the processing of your Personal Data for the purposes set forth in this Privacy Policy, if we are not required by applicable law or professional standards to retain such information. 7. Personal data security We use advanced security measures to protect your personal data, which we manage against accidental or intentional manipulation, loss, destruction or access by unauthorized persons. Our security measures are continuously improved according to developments in technology and changes in legislation. Additionally, we will report any unlawful data breach of this Site database or the database(s) of any of our third-party data processors to all relevant persons and authorities within 72 hours of the breach if it is apparent that personal data stored in an identifiable manner has been stolen. 8. Update of policy We reserve the right to change the data protection policy at any time because of technical or other reasons and recommend that you revise the current privacy policy from time to time. 9. Data retention We will retain your Personal Data for as long as you maintain an account or subscription agreement, or as otherwise necessary to provide you the Services. We will also retain your Personal Data as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements. 10. Contact us If you have questions regarding this Privacy Policy or about handling your personal data, please contact us at: privacy@inquest.net. I accept the privacy policy DeclineAccept SUBSCRIBE TO INQUEST NEWSLETTER Enter your email address to receive a monthly mailer that provides insights into industry and InQuest happenings. Browse past issues at: https://inquest.net/newsletter Email Address * Cancel Subscribe INQUEST LABS IOC LOOKUP Lookup Drop to upload and inspect file(s) Copied to clipboard.