Efficient, targeted, intuitive investigation.
Efficient, targeted, intuitive investigation.
Hunter
Efficient, targeted, intuitive investigation
Hunter makes effortless investigation possible, enabling targeted analysis and quick data connections to disrupt malicious activity before more harm is done.

Efficiently correlate and enrich data from our proprietary breach data lake, Paste bins, Passive DNS, WHOIS domain history, cryptocurrency, social profiles, standard search engines, Dark Web Forums, and other sources, to rapidly progress work, identify new intelligence and expose the true identity of threat actors.

Hunter
Efficient, targeted, intuitive investigation
Hunter makes effortless investigation possible, enabling targeted analysis and quick data connections to disrupt malicious activity before more harm is done.

Efficiently correlate and enrich data from our proprietary breach data lake, Paste bins, Passive DNS, WHOIS domain history, cryptocurrency, social profiles, standard search engines, Dark Web Forums, and other sources, to rapidly progress work, identify new intelligence and expose the true identity of threat actors.

Hunter

Hunter is an easy-to-use web application that enables intelligence analysts and investigators to quickly piece data from the breach data lake (a proprietary datalake with 25+ billion deduplicated and validated identity records from transient, historical and newly surfaced breach corpuses), correlate and enrich findings with Pastebin documents, historical DomainWhoIs data, cryptocurrency addresses and clusters, social profiles, standard search engines, reverse IP lookups and other data sources.

A single actor analysis can require hundreds of pivots. Hunter provides context to threat actors, revealing their real identities, cohorts, associations and criminal rings. By unmasking cybercriminals attacking your organization, you can take action to know your adversary and prevent future attacks.

Simple, targeted threat analysis and search
Comprehensive, easy to use visualizations
Fluid investigation management
Automated data correlations and target packs

Empower users to simply start with an attribute search and pivot, enriching information, making correlations across data sources and collating intelligence in one place. Search multiple attributes at once with our bulk search feature.

Visualize collected data in a dedicated, controlled workspace to easily identify links and conduct network analysis for a complete investigative picture—incorporating multiple sources and manual entries, downloading, saving and uploading, as needed.

Create multiple investigations and share with colleagues for collaborative working—building case-specific results, graphs, target packs, notes; archiving for future access or auditing; and deleting when no longer needed.

Save time and resources by producing actor summaries through automated breach data correlations, and build comprehensive profiles by recording targeted intelligence in dedicated target areas.

Simple, targeted threat analysis and search

Empower users to simply start with an attribute search and pivot, enriching information, making correlations across data sources and collating intelligence in one place. Search multiple attributes at once with our bulk search feature.

Comprehensive, easy to use visualizations

Visualize collected data in a dedicated, controlled workspace to easily identify links and conduct network analysis for a complete investigative picture—incorporating multiple sources and manual entries, downloading, saving and uploading, as needed.

Fluid investigation management

Create multiple investigations and share with colleagues for collaborative working—building case-specific results, graphs, target packs, notes; archiving for future access or auditing; and deleting when no longer needed.

Automated data correlations and target packs

Save time and resources by producing actor summaries through automated breach data correlations, and build comprehensive profiles by recording targeted intelligence in dedicated target areas.

Announcing Hunter for Improved Investigation Capability

Hunter – an investigation platform that allows you to hunt for threat actors across multiple data sets in one easy-to-use platform.
READ THE BLOG NOW

Customer Testimonial

Customer Testimonial

Slide
“It took two agents using 4iQ IDHunt™ Core one day to create a usable persona map versus 70 analysts about three months to build a comparable intel package for the same mission.” - Information Security Officer, Intel Agency
Slide
“We were able to solve a fraud case identifying criminals attacking our bank in just a few hours using IDHunt™ Core that we were not previously able to crack using three other vendor solutions for over three months.” - Fraud Analyst, Multinational Bank
Announcing Hunter for Improved Investigation Capability

Hunter – an investigation platform that allows you to
hunt for threat actors across multiple data sets in
one easy-to-use platform.
READ THE BLOG NOW

USE CASES

Hunter uncovers adversaries and provides actionable intelligence leading to more cases solved efficiently and effectively. The application is easy to use, requires little training, and increases analyst productivity. It enables fraud and financial crime analysts and investigators to deliver timely Suspicious Transaction Reports (STR) and Suspicious Activity Reports (SAR) enriched with exactly the information law enforcement needs to disrupt and deter crime.  

Cyber Crime
Fraud
AML & CTF
Insider Threats

Build target packages with true identities revealed, relationships and context on adversaries attacking your organization and operations in a fraction of time, with just one tool and fewer analysts.

Gather insights and uncover the real identities of criminals stealing funds from your business and your customers. Disrupt criminal activity and prevent future losses, while reducing the cost and complexity of investigating attacks.

Unmask cyber criminals behind suspicious transactions (including cryptocurrency), to speed Anti-Money Laundering (AML) & Counter Terrorism Financing (CTF) investigations, reducing financial losses and operating costs.

Identify and investigate suspicious personnel and uncover nefarious activities and leaked proprietary documents through dark web sales and trades.

Cyber Crime

Build target packages with true identities revealed, relationships and context on adversaries attacking your organization and operations in a fraction of time, with just one tool and fewer analysts.

Fraud

Gather insights and uncover the real identities of criminals stealing funds from your business and your customers. Disrupt criminal activity and prevent future losses, while reducing the cost and complexity of investigating attacks.

AML & CTF

Unmask cyber criminals behind suspicious transactions (including cryptocurrency), to speed Anti-Money Laundering (AML) & Counter Terrorism Financing (CTF) investigations, significantly reducing financial losses and operating costs.

Insider Threats

Identify and investigate suspicious personnel and uncover nefarious activities and leaked proprietary documents through dark web sales and trades.



Know your adversary.

Speed to results. Disrupt attackers.



Hunter Datasheet