Right-click any IP, domain, or hash to get instant threat intelligence from 9+ security sources in a sleek popup interface. Features built-in dark/light theme toggle and customizable display settings. No copy-paste, no context switching.
Watch IOCLens enrich threat indicators in real-time
Engineered for incident responders who think in TTPs and IOCs
Pattern matching for IPv4/IPv6, FQDNs, SHA256 hashes. Context menu injection via Chrome Extension API. Sub-100ms IOC identification.
Parallel REST API calls to VirusTotal, GreyNoise, AbuseIPDB, Shodan, AlienVault OTX, ThreatFox, URLhaus. Normalized JSON aggregation layer.
Client-side execution only. No proxy servers. No analytics beacons. Direct HTTPS to threat intel providers. Your OPSEC is intact.
Compiled regex engine detects indicators in logs, emails, tickets, chat. Works on any webpage including Slack, Gmail, Jira, Confluence.
JSON export for SIEM ingestion, threat intelligence platforms, ticketing workflows. One-click copy or export enriched data in structured format.
Toggle between dark and light themes directly in the popup. Granular settings control: show/hide individual API verdicts, tags, geolocation, threats, and technical details to match your workflow.
Open source free tier. One-time payment for lifetime Pro access.
One-time payment • Lifetime access
Under the hood: event-driven architecture for real-time threat correlation
Selection event → regex engine validates IOC type → Chrome storage API caches result → context menu dynamically rendered.
Background service worker spawns async fetch() calls. Headers injected with API keys. Rate limiting via token bucket algorithm.
Response parser extracts reputation scores, geolocation, malware families, WHOIS data. Unified schema rendered in side panel UI.
Install the extension or share your feedback to help me improve the tool
Get access to all 9+ integrations with a lifetime Pro license. One-time payment, no subscriptions.
Get Pro License