Quick Threat Intel
When you need a quick answer about an IOC without the overhead of creating a formal investigation.
Direct query from CLI
# IPosint-agent -q "Investigate IP 185.220.101.34"
# Domainosint-agent -q "Is domain phishing-example.net malicious?"
# URLosint-agent -q "Analyze this URL: http://malware.host/payload.exe"
# Hashosint-agent -q "What is the file with hash d41d8cd98f00b204e9800998ecf8427e"Interactive session for triage
osint-agentosint> Investigate IP 185.220.101.34# → Complete analysis with risk score
osint> And the domain evil-relay.com that appears in the logs?# → The agent remembers session context
osint> /dashboard# → Comparison table of all analyzed IOCs
osint> /report save# → Report in reports/JSON for scripting
# Get only risk scoreosint-agent -q "Analyze 185.220.101.34" --json | jq '.risk_score'
# Process result in pipelineosint-agent -q "Investigate evil.com" --json | python3 -c "import json, sysdata = json.load(sys.stdin)if data['risk_score'] > 60: print(f'ALERT: {data[\"ioc\"]} risk {data[\"risk_score\"]}/100')"From MCP in Claude Desktop
Open Claude Desktop with MCP configured and write directly:
Investigate IP 185.220.101.34 and tell me if it's maliciousClaude uses MCP tools to call VirusTotal, AbuseIPDB, Shodan and returns complete analysis. No need to open the terminal.
Incident response: quick batch
When you have an IOC list from an alert or SIEM:
# Create iocs-incident.txt with IOCs from the incidentcat > iocs-incident.txt << EOF185.220.101.34evil-c2.example.comhttp://malware-url.net/payloadd41d8cd98f00b204e9800998ecf8427eEOF
# Analyze all with JSON outputosint-agent --batch iocs-incident.txt --json > incident-analysis.json
# See only high-risk onescat incident-analysis.json | jq '.[] | select(.risk_score > 60)'Quick contextual queries
The agent does more than just analyze technical IOCs:
osint> Give me context about APT Scattered Spiderosint> What's the current ransomware threat status this month?osint> Are there any major 0-day vulnerabilities in the last 7 days?For this it uses GDELT, security RSS feeds and threat classification.
Compare with history
If you investigated the same IOC some time ago:
osint> Investigate 185.220.101.34 and compare with history# → search_history returns the previous analysis# → The agent compares: "Last time it was MEDIUM, now it's CRITICAL"When to move to formal investigation
Use quick threat intel for:
- SIEM alert triage
- Quick verification during an incident
- Ad-hoc enrichment
Move to formal investigation (/investigation-init) when:
- The case has legal or compliance implications
- You need traceability for an external report
- Multiple analysts are working on the same case
- The investigation will last more than one session