Threat Lookup: Exporting to OpenIOC

Expand all | Collapse all

This section contains examples of OpenIOC files with investigation results for a hash, IP address, domain, and web address.

This format is not available for exporting investigation results for reserved IP addresses.

By default, the format of the file name is as follows: <request type>_<request>.ioc

Here:

You can change the file name if necessary.

See a file name example

OpenIOC for a hash

Below is an example of investigation results that Kaspersky Threat Intelligence Portal may return for the hash 495DB359D61411F0688211C8DD473CB7 in OpenIOC format.

See result example

OpenIOC for an IP address

Below is an example of investigation results that Kaspersky Threat Intelligence Portal may return for the IP address 14.14.14.14 in OpenIOC format.

See result example

OpenIOC for a domain

Below is an example of investigation results that Kaspersky Threat Intelligence Portal may return for the domain ddns.net in OpenIOC format.

See result example

OpenIOC for a web address

Below is an example of investigation results that Kaspersky Threat Intelligence Portal may return for the web address go.spaceshipads.com-afu.php-zone in OpenIOC format.

See result example

Page top