- Home
- Threat Management
- Threat Intelligence Platforms
- Threat Intelligence Hunter (TIH)
Threat Intelligence Hunter (TIH)
TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs.

Threat Intelligence Hunter (TIH)
TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs.

Founder & Fractional CISO
Not sure if Threat Intelligence Hunter (TIH) is right for your team?
Book a 60-minute strategy call with Nikoloz. You will get a clear roadmap to evaluate products and make a decision.
→Align tool selection with your actual business goals
→Right-sized for your stage (not enterprise bloat)
→Not 47 options, exactly 3 that fit your needs
→Stop researching, start deciding
→Questions that reveal if the tool actually works
→Most companies never ask these
→The costs vendors hide in contracts
→How to uncover real Total Cost of Ownerhship before signing
Threat Intelligence Hunter (TIH) Description
TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own set of indicators. Requirements: Python 2.7, Argparse, Requests, API keys from Virustotal and URLVoid. Features: Local storage of threat feeds, check an IP against existing threat feeds and your local database, check for Bulk IP address list, check for MD5 Hash.
Threat Intelligence Hunter (TIH) FAQ
Common questions about Threat Intelligence Hunter (TIH) including features, pricing, alternatives, and user reviews.
Threat Intelligence Hunter (TIH) is TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs.. It is a Threat Management solution designed to help security teams with Python, Threat Intelligence, IOC.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure