TOOLS / IOC EXTRACTOR
IOC Extractor
Paste any text (incident report, paste-bin dump, threat-intel article, email). We extract IPs, domains, URLs, hashes, CVEs, emails, BTC/ETH addresses, registry keys, and file paths. Defanging is decoded automatically.
What it does
Threat-intel reports embed indicators of compromise (IOCs) in prose. Pulling them out manually wastes hours. Our extractor uses 12 specialized regex patterns to pull every IP, domain, URL, hash (MD5/SHA-1/SHA-256), CVE ID, email, Bitcoin/Ethereum address, Windows registry key, and Unix/Windows file path from any text. We also handle defanging — hxxp:// becomes http://, [.] becomes . — so you can paste reports without manual cleanup.
How to use it
- Paste any text — threat-intel report, paste-bin dump, forum post, email body, or log file.
- Click "Extract IOCs".
- Results group by type: IPv4, domains, URLs, CVEs, hashes by algorithm, BTC, ETH, registry keys, file paths.
- Copy any group to clipboard for ingestion into your SIEM or MISP.
- Cross-reference suspicious IOCs against our Hash Reputation, URL Checker, or IP Reputation tools.
Common use cases
Frequently asked questions
What is defanging? +
Does this catch obfuscated indicators? +
Are private IPs filtered out? +
What’s the input size limit? +
Can I get the IOCs in CSV or STIX format? +
Related tools
Related coverage on Ciphers Security
- YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support
- Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes
- LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures
- MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware
- JDownloader Site Hacked, Installers Swapped with Python RAT Malware
Free for everyone, no signup required. Tool runs at /tools/ioc-extractor/ — bookmark or share.