Search Prefix Documentation

This documentation provides a introduction to search prefixes helping you track down digital threats. Whether you're hunting malware, phishing, or gathering threat intel, these prefixes will be essential to track and identify threats your looking for. While there are other possibilities, this list is a great starting point to get you on your way.

Advanced Search Techniques

General Search Prefixes

KeyDescription
dateThe date when the report was generated.
tagsThe tags associated with the report, applied by urlquery.
submit.tagsTags assigned during the submission of the URL.
url.addrSubmitted URL - full URL, without schema, http:// or https://
url.domainSubmitted URL, the domain part.
url.fqdnSubmitted URL - the Fully Qualified Domain Name (FQDN).
url.tldSubmitted URL - the top-level domain (TLD) of the URL (e.g., com, org).
ip.addrThe IP address associated with the submitted URL.
ip.country_codeThe ISO 3166-1 alpha-2 country code of the IP address's location of the submitted URL.
ip.countryThe country derived from the GeoIP location of the IP address of the submitted URL.
ip.asThe Autonomous System (AS) number associated with the IP address of the submitted URL.
final.url.addrThe final URL address after redirects.
final.url.domainThe domain part of the final URL after redirects.
final.url.fqdnThe Fully Qualified Domain Name (FQDN) of the final URL after redirects.
final.url.tldThe top-level domain (TLD) of the final URL after redirects.
final.titleThe final title of the web page after redirects.

HTTP Search Prefixes

KeyDescription
http.url.addrThe full URL found in HTTP transactions within the report. This includes URLs visited during analysis. Supports wildcards (*).
http.url.domainThe domain part of the URLs found in HTTP transactions within the report. This includes URLs visited during analysis.
http.url.fqdnThe Fully Qualified Domain Name (FQDN) of the URLs found in HTTP transactions within the report.
http.url.tldThe top-level domain (TLD) of the URLs found in HTTP transactions within the report (e.g., .com, .org, etc.).
http.ip.addrThe IP address associated with the URLs found in HTTP transactions.
http.ip.country_codeThe ISO 3166-1 alpha-2 country code for IP addresses found in HTTP transactions.
http.ip.countryThe country derived from the GeoIP location of the URLs found in HTTP transactions
http.ip.asThe Autonomous System (AS) number associated with the IP address.
http.request.rawThe raw HTTP request data.
http.response.rawThe full response header.
http.response.data.magicFile magic (file type) from the response data.
http.response.data.sizeThe size of the response data.
http.response.data.md5The MD5 hash of the HTTP response data.
http.response.data.sha1The SHA-1 hash of the HTTP response data.
http.response.data.sha256The SHA-256 hash of the HTTP response data.
http.response.data.sha512The SHA-512 hash of the HTTP response data.
http.security_info.cert.validity.startStart date of validity of TLS certificate.
http.security_info.cert.validity.endEnd date of validity of TLS certificate.

Artifacts Search Prefixes

KeyDescription
artifacts.files.md5The MD5 hash of the file.
artifacts.files.sha1The SHA-1 hash of the file.
artifacts.files.sha256The SHA-256 hash of the file.
artifacts.files.sha512The SHA-512 hash of the file.
artifacts.files.magicThe file type magic signature.
artifacts.files.alerts.analyzer.alertAlerts related to the file generated by an analyzer.
artifacts.files.archive.md5The MD5 hash of the file in an archive.
artifacts.files.archive.sha1The SHA-1 hash of the file in an archive.
artifacts.files.archive.sha256The SHA-256 hash of the file in an archive.
artifacts.files.archive.sha512The SHA-512 hash of the file in an archive.
artifacts.files.archive.magicThe file type magic signature of the within an archive.
artifacts.files.archive.filenameThe filename of the file within an archive.
artifacts.files.archive.pathThe file path of the file within an archive.
artifacts.files.archive.alerts.analyzer.alertAlerts related to the file in an archive, generated by an analyzer.
artifacts.windows_shortcuts.md5The MD5 hash of the Windows shortcut.
artifacts.windows_shortcuts.sha1The SHA-1 hash of the Windows shortcut.
artifacts.windows_shortcuts.sha256The SHA-256 hash of the Windows shortcut.
artifacts.windows_shortcuts.sha512The SHA-512 hash of the Windows shortcut.
artifacts.windows_shortcuts.magicThe file type magic signature of the Windows shortcut.
artifacts.windows_shortcuts.sizeThe size of the Windows shortcut.
artifacts.windows_shortcuts.url.addrThe URL address where the Windows shortcut was found.
artifacts.windows_shortcuts.url.domainThe domain part of the URL where the Windows shortcut was found.
artifacts.windows_shortcuts.url.fqdnThe Fully Qualified Domain Name (FQDN) of the URL where the Windows shortcut was found.
artifacts.windows_shortcuts.url.tldThe top-level domain (TLD) of the URL where the Windows shortcut was found.
artifacts.windows_shortcuts.string_data_section.command_line_argumentsCommand line arguments found in the string data section of the Windows shortcut.
artifacts.telegram.tokenThe Telegram token associated with the bot or user.
artifacts.telegram.is_revokedIndicates whether the Telegram token has been revoked.
artifacts.telegram.bot.tokenThe Telegram bot's unique token.
artifacts.telegram.bot.user_idThe user ID of the Telegram bot.
artifacts.telegram.bot.usernameThe username of the Telegram bot.
artifacts.telegram.bot.first_nameThe first name of the Telegram bot.
artifacts.telegram.bot.last_nameThe last name of the Telegram bot.
artifacts.telegram.bot.chat.chat_idThe chat ID associated with the Telegram bot.
artifacts.telegram.bot.chat.titleThe title of the Telegram bot's chat.
artifacts.telegram.bot.chat.typeThe type of the Telegram bot's chat (e.g., private, group).
artifacts.telegram.bot.chat.bot_isIndicates if the Telegram bot is active or bot-specific info.
artifacts.telegram.bot.chat.total_usersThe total number of users in the Telegram bot's chat.
artifacts.telegram.bot.pendint_messagesThe number of pending messages in the Telegram bot's chat.

Example Search Queries

DescriptionExample Query
Search for a specific domain used (submitted url):url.domain:example.com
Look for any URL with `xyz`:url.tld:xyz
Find any report where URL submitted resolve to IP:ip.addr:8.8.8.8
Look for a specific file extension inside archives files (e.g., `.php`):artifacts.files.archive.filename:*.php
Find URLs by checking for URLs with the word `login` in the path:url.addr:*login*
Search for Telegram bot tokens that could be linked to malicious activity:artifacts.telegram.bot.token:abc123xyz
Find URLs that contain a pattern or signature in the HTTP response header:http.response.raw:"Apache"
Check for files of a given type (e.g., PDF files):artifacts.files.magic:"PDF"
Find report where TLS certificate's validity expires within a time range:http.security_info.cert.validity.end:[2024-01-01 TO 2024-02-03]