KNOW YOUR ADVERSARY.

Uncover the true identities behind cyber attacks.
KNOW YOUR ADVERSARY.

Uncover the true identities behind cyber attacks.
IDHuntTM Core
Adversary Intelligence
Speed to Results.
Discover, Uncover and Disrupt Adversaries.

The only way to stop cyber-enabled crimes is to unmask whoever is truly behind it. By identifying bad actors, you can recover funds, freeze accounts, takedown infrastructure — and, most importantly, thwart future attacks and exploitations.

For even the most advanced intelligence operations, however, identifying threat actors can be a slow and difficult process. And one with many dead ends.

That’s where 4iQ IDHunt™ Core comes in.

IDHunt™ Core enables investigators to analyze monikers or pseudonyms and other identity related attributes, connect the dots, enhance attribution analysis, and uncover the real identities behind criminal activities.

IDHunt Core
Adversary Intelligence
Speed to Results.
Discover, Uncover and Disrupt Adversaries.

The only way to stop cyber-enabled crimes is to unmask whoever is truly behind it. By identifying bad actors, you can recover funds, freeze accounts, takedown infrastructure — and, most importantly, thwart future attacks and exploitations.

For even the most advanced intelligence operations, however, identifying threat actors can be a slow and difficult process. And one with many dead ends.

That’s where 4iQ IDHunt™ Core comes in.

IDHunt™ Core enables investigators to analyze monikers or pseudonyms and other identity related attributes, connect the dots, enhance attribution analysis, and uncover the real identities behind criminal activities.

4iQ IDHunt Core

4iQ IDHunt Core is an easy-to-use web application that enables intelligence analysts and investigators to quickly piece data from the 4iQ IDLake™ (a proprietary datalake with 20+ billion identity records from transient, historical and newly surfaced breach corpuses), correlate and enrich findings with Pastebin documents, historical DomainWhoIs data, cryptocurrency addresses and clusters, social profiles, standard search engines, reverse IP lookups and other data sources.

A single actor analysis can require hundreds of pivots. 4iQ IDHunt Core provides context to threat actors, revealing their real identities, cohorts, associations and criminal rings. By unmasking cybercriminals attacking your organization, you can take action to know your adversary and prevent future attacks.

Targeted Threat Analysis
Accelerate Findings
ML-based Analytics
No Training Required

Investigators start with what they already know – an indicator on a suspect – and pivot and enrich information within the 4iQ IDLake™ and other open data sources to begin making connections.

4iQ has spent years curating and verifying billions of identity records, so that you can more efficiently unmask adversaries — sometimes within a matter of hours.

ML technology calculates malicious identity and domain scores and builds relationship graphs in seconds. Our AI-based classifier computes and flags malicious, suspicious and benign emails.

4iQ IDHunt™ Core is simple to use. Within an intuitive  web app interface, investigators can search, pivot and enrich findings immediately with no prior training required.

Targeted Threat Analysis

Investigators start with what they already know – an indicator on a suspect – and pivot and enrich information within the 4iQ IDLake™ and other open data sources to begin making connections.

Accelerate Findings

4iQ has spent years curating and verifying billions of identity records, so that you can more efficiently unmask adversaries — sometimes within a matter of hours.

ML-based Analytics

Machine Learning technology calculates malicious identity and domain scores and builds relationship graphs in seconds. Our ML-based classifier computes and flags malicious and suspicious identities.

No Training Required

4iQ IDHunt™ Core is simple to use. Within an intuitive  web app interface, investigators can search, pivot and enrich findings immediately with no prior training required

NEW: Modern-Day Manhunt:
Operationalizing Cyber Attribution Paper

Identity attribution is an effective way to
disrupt adversaries and prevent future attacks.
READ THE PAPER NOW

Customer Testimonial

Customer Testimonial

NEW: Modern-Day Manhunt:
Operationalizing Cyber Attribution Paper

Identity attribution is an effective way to
disrupt adversaries and prevent future attacks.
READ THE PAPER NOW

USE CASES

4iQ IDHunt™ Core uncovers adversaries and provides actionable intelligence leading to more cases solved efficiently and effectively. The application is easy to use, requires little training, and increases analyst productivity. It enables fraud and financial crime analysts and investigators to deliver timely Suspicious Transaction Reports (STR) and Suspicious Activity Reports (SAR) enriched with exactly the information law enforcement needs to disrupt and deter crime.  

Cyber Crime
Fraud
AML & CTF
Insider Threats

Build target packages with true identities revealed, relationships and context on adversaries attacking your organization and operations in a fraction of time, with just one tool and fewer analysts.

Gather insights and uncover the real identities of criminals stealing funds from your business and your customers. Disrupt criminal activity and prevent future losses, while reducing the cost and complexity of investigating attacks.

Unmask cyber criminals behind suspicious transactions (including cryptocurrency), to speed Anti-Money Laundering (AML) & Counter Terrorism Financing (CTF) investigations, reducing financial losses and operating costs.

Identify and investigate suspicious personnel and uncover nefarious activities and leaked proprietary documents through dark web sales and trades.

Cyber Crime

Build target packages with true identities revealed, relationships and context on adversaries attacking your organization and operations in a fraction of time, with just one tool and fewer analysts.

Fraud

Gather insights and uncover the real identities of criminals stealing funds from your business and your customers. Disrupt criminal activity and prevent future losses, while reducing the cost and complexity of investigating attacks.

AML & CTF

Unmask cyber criminals behind suspicious transactions (including cryptocurrency), to speed Anti-Money Laundering (AML) & Counter Terrorism Financing (CTF) investigations, significantly reducing financial losses and operating costs.

Insider Threats

Identify and investigate suspicious personnel and uncover nefarious activities and leaked proprietary documents through dark web sales and trades.



Know your adversary.

Speed to results. Disrupt attackers.



IDHunt Core Datasheet