Quick Start
Submit your first IoC and get a threat verdict in minutes
API Reference
Integrate CyberThreat AI directly into your workflows via REST API
Threat Intelligence Sources
Learn how VirusTotal, AbuseIPDB, PolySwarm, and Robtex power the analysis
Using Your API Keys
Bring your own API keys for each intelligence provider
How it works
Submit an IoC
Enter an IPv4 address, IPv6 address, domain name, MD5, SHA1, or SHA256 hash in the search field. CyberThreat AI automatically detects the type.
Intelligence is gathered
The platform queries relevant threat intelligence providers in parallel — VirusTotal, AbuseIPDB, PolySwarm, and Robtex — depending on the IoC type.
AI delivers a verdict
Aggregated threat data is sent to an AI model via OpenRouter. The response streams in real time, classifying the IoC as Malicious, Suspicious, or Benign with supporting reasoning.
Supported IoC types
| Type | Example |
|---|---|
| IPv4 | 1.2.3.4 |
| IPv6 | 2001:4860:4860::8888 |
| Domain | example.com |
| MD5 hash | 44d88612fea8a8f36de82e1278abb02f |
| SHA1 hash | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 hash | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |