Skip to main content

Artifacts

The Artifact Administration page is the master database of all IOCs (Indicators of Compromise) collected across all Intel collection activities. Every wallet address, URL, script, domain, and IP address encountered by workers, conversations, and domain scans is stored here for review and triage.

Artifacts

Overview stats

MetricDescription
Total artifactsAll IOCs in the system
False positivesItems that have been reviewed and marked as benign after initially flagging
Blocked domainsDomains currently on the active blocklist
Recent deletionsItems removed in the last reporting period

Artifacts tab

The main artifacts table shows every collected IOC across all collection sources:

ColumnDescription
TypeThe IOC category: url, script, domain, wallet, ip, qr_code
ValueThe actual IOC: the full URL, wallet address, domain name, or IP address
SourceWhere it was collected: Browser Scan: domain, Browser Worker Scan, Conversation, Domain Monitor
Confidence0–100% confidence score that this IOC is malicious, assigned by the threat assessment LLM
StatusCurrent triage state: Pending / Malicious / Benign / False Positive
First seenThe date this IOC was first recorded in the system
Last seenMost recent time this IOC was observed in use

Artifact types

TypeWhat it representsWhy it matters
urlFull URLs encountered during scans, including redirect chains and embedded linksThe atomic unit of investigation; every report links back to one or more URLs
domainHostnames extracted from URLs and on-page referencesUsed for takedown submissions, blocklists, and infrastructure mapping
walletCrypto addresses found on pages, in scripts, and in form destinationsPushed to Platform for risk scoring and webhook delivery
ipIP addresses resolved during scansUsed by Maps to find co-hosted domains
scriptExternal and inline JavaScript fingerprints. External scripts are tracked by URL + SHA-256; inline scripts by content hash + a short previewLets you link sister scam sites that share a phishing kit even when domains rotate. Two domains running the same drainer JS will share script artifacts.
qr_codeDecoded QR codes detected in page images during scans (actual page assets, not screenshots)Often hide the real malicious URL or the drainer wallet behind a QR image to bypass URL filtering

QR-code and script artifacts are particularly useful for campaign attribution. When a new domain shows up running the same JS hash as a known scam, the Maps and Threats views will surface that link automatically and it can be tagged to the responsible threat actor.

Understanding the status values

StatusMeaningAction taken
PendingNewly collected and awaiting analyst reviewNo threat feed action yet
MaliciousConfirmed threat by analyst or high-confidence automated classificationAdded to active threat feeds and blocklist
BenignLegitimate service that appeared in a scan (e.g. a CDN or analytics service)Excluded from threat feeds
False positiveInitially flagged but determined on review to not be a threatSuppressed from future alerts

Blocklist tab

The Blocklist contains domains and IPs that are actively excluded from all worker investigations.

Artifacts: Blocklist

Adding a domain to the blocklist prevents workers from accidentally interacting with known benign infrastructure: for example, CDN providers, analytics platforms, or ad networks that appear on nearly every site and are not themselves threats.

Managing the blocklist

  1. Click the Blocklist tab
  2. Click Add to Blocklist
  3. Enter the domain or IP address to block
  4. Add a note explaining why this entry should be excluded from worker investigations
  5. Click Save

Workers will stop following links to blocklisted domains during future investigations. Existing artifacts from a blocklisted domain are not retroactively removed: you can mark them as Benign manually.

Reviewing artifacts

Regularly reviewing Pending artifacts keeps your threat feeds clean and accurate. The recommended workflow:

  1. In the search box, filter by status:pending to surface only unreviewed items
  2. For each pending artifact, review:
    • The Value: is this a known malicious indicator or a legitimate service?
    • The Source: does it come from a conversation (high confidence) or a broad browser scan (lower confidence)?
    • The Confidence score: use this as a guide, not a final verdict
  3. Mark the artifact with the appropriate status:
    • Malicious: adds the IOC to active threat feeds and flags it for Platform sync
    • False Positive: suppresses future alerts for this indicator
    • Benign: records it as a known-good service; excludes from threat feeds
tip

Prioritize reviewing artifacts with high confidence scores from Conversation sources first: these are the most actionable and highest-quality intelligence items.

Searching artifacts

The search box supports free-text search across all artifact fields. You can search by:

  • Domain or URL substring
  • Wallet address (partial or full)
  • Source type
  • Status filter keywords (e.g. pending, malicious)
  • Date ranges

Export

Export the full artifact database for external analysis or ingestion into a SIEM:

  • Click Export in the top right
  • Choose CSV for spreadsheet-compatible output or JSON for structured data
  • All fields including confidence scores, sources, and timestamps are included in the export