`resolve_identity` correlates IPs to hostnames across DHCP, EDR, and proxy logs. Temporal joins mean accurate mapping even with dynamic IPs. NAT detection flags suspicious multi-host IPs.
process tree:
[powershell.exe]
explorer.exe (PID: 1234)
outlook.exe (PID: 2345)
powershell.exe (PID: 3456)
cmd.exe /c whoami (PID: 4567)
certutil.exe-decode... (PID: 5678)
payload.exe (PID: 6789)
prevalence
common
uncommon
rare
Visualize process trees, web session flows, and any parent-child relationship. Integrated prevalence shows what's rare at a glance.
IPs enriched with GeoIP and ASN data. Domains checked against threat intel. Hashes matched to known malware. All automatic.
Enriched in 312ms
5 sources
GeoIP
1
2
3
185.220.101.1
Country: Russia
City: Moscow
Hash Lookup
1
2
3
abc123...
Cobalt Strike
Family: Beacon
ASN Lookup
1
2
3
AS12345
Org: DigitalOcean
Type: Hosting
Asset Context
1
2
3
192.168.1.50
Owner: J. Smith
Dept: Finance
Threat Intel
1
2
3
evil-c2.ru
Known C2
Confidence: 95%
Rust Backend
Memory-safe, fast, reliable
React UI
Modern, responsive UI
Clickhouse Storage
Columnar storage, billions of rows, sub-second queries
Vector Ingest
High-throughput log ingestion
AI Gateway
Allowing support for any AI provider
[detection engine]
// BRUTE FORCE DETECTION
1
2
3
4
5
source_type=auth action=login status=failure
stats count as attempts by src_ip, user
where attempts > 10
sort -attempts
...
// RARE DOMAIN HUNTING
1
2
3
4
5
source_type=proxy earliest=-7d
prevalence window=7d enrich=true
where host_count < 3 AND is_rare=true
table dest_host, first_seen, host_count
...
// PROCESS TREE ANALYSIS
1
2
3
4
5
source_type=sysmon action=process_create
tree process root="*powershell*"
prevalence enrich=true
where depth > 3
...
// BEACONING DETECTION
1
2
3
4
5
source_type=proxy
bin span=10m
stats count by dest_host, _time
streamstats window=6 stdev(count) as jitter by
dest_host
Get started in minutes. No credit card. No sales call.