Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

IOC Enrichment

The process of augmenting raw indicators of compromise with contextual threat intelligence to assess their severity, origin, and relevance.

Definition

IOC Enrichment is the process of taking a raw indicator of compromise — such as an IP address, domain, file hash, or URL — and querying multiple threat intelligence sources to build a complete picture of that indicator. The result includes reputation scores, geolocation, WHOIS data, malware associations, and historical sighting data. Enrichment transforms a bare artifact into actionable intelligence that analysts can use to prioritize and respond to threats.

Why It Matters

Raw IOCs without context are nearly useless at scale — an IP address alone does not tell you whether it belongs to a known botnet, a Tor exit node, or a legitimate CDN. Enrichment enables analysts to triage alerts faster, reduce false positives, and focus investigative effort on genuinely malicious indicators. In incident response, the speed of enrichment directly affects containment time.

How It Works

When an IOC is submitted for enrichment, it is simultaneously queried against multiple threat intelligence feeds and databases — such as VirusTotal, Shodan, AbuseIPDB, PassiveDNS providers, and WHOIS registries. Each source returns structured data that is normalized into a common schema, deduplicating and resolving conflicts across sources. The aggregated result is scored and tagged based on consensus across sources, producing a unified risk verdict. Batch enrichment extends this to bulk IOC sets, processing hundreds or thousands of indicators in parallel.

DFIR Platform

IOC Enrichment API

The DFIR Lab IOC Enrichment API accepts IPs, domains, file hashes, and URLs and returns normalized results aggregated from 14+ threat intelligence sources in a single API call. Batch mode supports bulk submissions for high-volume investigations. Results can also be retrieved via the CLI using `dfir-cli enrich <ioc>`.

View Documentation

Related Concepts

Attack Surface ManagementPhishing AnalysisMITRE ATT&CK FrameworkSigma Rules

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free