Paste anything.
We correlate across every source.
Company name, domain, email, wallet, hash or CVE — we detect the type and cross-reference live across the entire Darkfield corpus: ransomware victim disclosures, our blacklist and breach catalogs, and full-text search on the dark-web pages we crawl. Click any card to drill into the full dossier.
Correlation runs as you type · ⏎ for the full dossier
Try one of these
Pro tools
Investigate further
Targeted investigations and forensic analysis run in the background and bill Cyber Tokens. Available to signed-in Pro, Team and Enterprise accounts.
10 Cyber Tokens · ~5-10 min
Deep dark-web scan
Full investigation on a domain: ransomware leak corpus, indexed pages, live Tor search, credential exposure, AI summary.
25 Cyber Tokens · ~2-10 min
Forensic sample analysis
Download a leak sample via Tor, identify files, detect PII (emails, credentials, SSN, IBAN, cards), classify sensitivity, generate an IR report.
What we check, every search
- Ransomware corpus · 38k+ victim disclosures across 470 operators
- Blocklists · sanctioned, scam-tagged and phishing wallet + domain corpus
- Breach catalog · public data-breach disclosures with exposed-record counts
- Telegram channels · last 30 days of public OSINT / threat-intel channels we monitor