Classify the indicator
Write the indicator type, source, and observation time.
Check: The type and time are visible.
IOC
A workflow for checking IPs, domains, URLs, and hashes as defensive signals.
Goal
Use indicators as context, not as automatic proof of compromise or attribution.
Best for
Threat intelligence notes, SOC triage, and defensive enrichment.
Inputs
IP, Domain, URL, Hash, Observation time
Steps
Write the indicator type, source, and observation time.
Check: The type and time are visible.
Compare reputation, passive DNS, malware feeds, and reports.
Check: One feed is not the only basis.
Record first seen, last seen, and whether the signal is old.
Check: Old indicators are not treated as current activity.
Suggest monitoring, blocking, or review only when the evidence supports it.
Check: Attribution is not overstated.
Output
Indicator context, source comparison, freshness note, and defensive action.
Report line
The indicator appears in open threat sources, but freshness, context, and local relevance must be checked before action.