How Wiestell Works
Understanding our threat intelligence pipeline
IOC Submission
Submit an Indicator of Compromise (IOC) for analysis. Wiestell supports IP addresses, domain names, URLs, and file hashes (MD5, SHA1, SHA256).
Our validation engine automatically detects the IOC type and formats it correctly for analysis across multiple threat intelligence sources.
Feed Aggregation
Your IOC is queried against our curated collection of open-source threat intelligence feeds including AlienVault OTX, AbuseIPDB, URLhaus, MalwareBazaar, PhishTank, ThreatFox, and more.
We aggregate results from multiple sources to provide comprehensive threat context and reduce false positives.
Enrichment
Our enrichment engine enhances each IOC with additional context including geolocation data, WHOIS information, DNS records, reputation scores, and historical threat activity.
This enrichment process helps security analysts understand the full scope and potential impact of each indicator.
AI-Powered Scoring
Our AI-powered scoring engine analyzes all collected data to generate a comprehensive threat score (0-100). The score considers factors like feed confidence, maliciousness indicators, activity patterns, and correlation with known threats.
This helps prioritize which threats require immediate attention versus those that may be false positives or low-risk indicators.
Results & Correlation
View comprehensive results including threat classification, associated malware families, MITRE ATT&CK tactics and techniques, related IOCs, and historical activity timelines.
Our correlation engine identifies relationships between IOCs, helping you discover campaigns, infrastructure, and threat actor patterns.
Ready to Analyze Threats?
Start investigating IOCs with Wiestell's free threat intelligence platform
Start Analyzing