AI Tools for Cybercrime Investigators
AI tools that help cybercrime investigators research threat actors, analyze vulnerabilities, scan domains, trace IPs, monitor dark web activity, and compile digital forensics reports.
Works in Chat, Cowork and Code
Domain and IP threat intelligence
Investigate suspicious domains and IP addresses: check against 70+ threat feeds, identify hosting infrastructure, look up WHOIS records, and build a network map of attacker infrastructure.
Threat scan: flagged by 18/70 engines (PhishTank, URLhaus, VirusTotal). Domain registration: 3 days old (registered April 1, 2026), anonymized registrant via Namecheap proxy. DNS: A record → 185.220.101.45 (known Tor exit node). IP geolocation: Amsterdam, NL, ASN: AS12714 (high abuse score, 847 prior threat reports). Pattern: newly registered domain on Tor-adjacent IP — high confidence malicious infrastructure.
Phishing and email fraud analysis
Analyze suspicious emails for phishing indicators, spoofed sender addresses, malicious links, and social engineering patterns. Document findings for victim support and prosecution.
Analysis: HIGH CONFIDENCE PHISHING. Sender domain: microsoft-securityalert.com — not a Microsoft domain. SPF: FAIL. DKIM: not present. Domain registered 8 days ago. URL: redirects to credential harvesting page (5 AV flags). Techniques used: urgency language, Microsoft brand impersonation, lookalike domain. Recommended action: block domain, notify victim organization, preserve headers for prosecution. Similar campaign targeting 3 other organizations detected in threat intelligence feeds.
Vulnerability and exploit research
Research CVEs being actively exploited in ongoing attack campaigns, look up exploit details, and track which threat actors are using specific vulnerabilities. Critical for attribution and incident response.
CVE-2025-21234: Ivanti Connect Secure, remote code execution pre-authentication. CVSS: 9.8 (Critical). Affected versions: 22.6.x and prior. Exploit: heap overflow in SSL VPN authentication handler — proof-of-concept published on GitHub. Threat actors: CISA KEV listed. Attributed campaigns: Volt Typhoon (Chinese state actor), LockBit 4.0 affiliate initial access broker. Patch: Ivanti hotfix available Jan 2025. 7,200+ internet-exposed instances unpatched as of April 2026.
Threat actor profiling
Build comprehensive profiles of ransomware groups, APT actors, and cybercriminal organizations: TTPs, known infrastructure, affiliate relationships, and recent campaigns.
RansomHub profile: Emerged March 2024 as RaaS successor to ALPHV/BlackCat following FBI disruption. Recruited displaced ALPHV affiliates. TTPs (MITRE): Initial access via VPN exploits (T1190), lateral movement via Living-off-the-Land (T1059), exfiltration before encryption (T1041) for double extortion. 2025 stats: 150+ victims claimed; average demanded ransom $2.3M; sectors: healthcare (34%), legal, government. Infrastructure: .onion leak site; affiliate split 90/10. Notable victim: UnitedHealth Group Change Healthcare (Feb 2024, $22M ransom paid).
Supply chain and dependency vulnerability scanning
Audit open-source packages used by victim organizations for known advisories and supply chain compromises. Essential for software supply chain attack investigations.
Audit results: lodash 4.17.21 — No active critical CVEs. axios 1.6.0 — CVE-2023-45857 (CSRF token exposure, medium severity, patched in 1.6.2, this version vulnerable). express 4.18.2 — No critical CVEs. react 18.2.0 — No CVEs. webpack 5.88.0 — CVE-2024-43788 (cross-site scripting in dev server, fixed in 5.94.0). Recommend patching axios and webpack. Supply chain integrity: all 5 packages verified against published npm checksums — no tampering detected.
Cybercrime investigation report writing
Compile digital forensics findings, threat intelligence, and attack timelines into professional investigation reports for law enforcement, legal proceedings, and victim organizations.
Cybercrime Investigation Report — Case #2026-CCI-0104. Victim: [Organization]. Attack Type: Ransomware (RansomHub). Summary: Threat actor gained initial access via CVE-2025-21234 (Ivanti VPN) on March 18, 2026. Dwell time: 14 days. Activity: lateral movement, credential harvesting, 350GB data exfiltration (March 25–31). Encryption deployed April 1. Ransom: $1.5M USD (not paid). IoCs: [4 IPs, 2 domains, 3 hashes listed]. Attribution confidence: MODERATE (RansomHub TTPs and infrastructure consistent). Recommended actions: Ivanti patch, credential resets, network segmentation review.
Ready-to-use prompts
Scan the domain phish-site.net across all available threat intelligence engines — check for malware, phishing, botnet indicators, and recent abuse reports.
Look up IP 45.33.32.156 — geolocation, ASN, abuse reputation, and any associated threat intelligence or prior incident reports.
Build a profile on LockBit 4.0 — their RaaS affiliate structure, current TTPs, notable 2025–2026 attacks, ransom demand patterns, and known decryptors.
Analyze this suspicious email for phishing indicators: From: noreply@paypal-account-services.com, Subject: Unauthorized login from Russia — verify now. Include header analysis and link analysis.
Look up CVE-2024-49104 — full technical details, CVSS score, affected Microsoft Exchange versions, known exploit status, and any attributed ransomware campaigns.
Audit these npm packages for known CVEs and supply chain advisories: lodash 4.17.20, moment 2.29.4, minimist 1.2.6, node-fetch 2.6.7.
Write a cybercrime investigation report: victim organization hit by business email compromise (BEC), CFO credentials compromised via spearphishing, $340K fraudulent wire transfer initiated. Three sending IPs identified. Investigation timeline April 1–3, 2026.
Tools to power your best work
165+ tools.
One conversation.
Everything cybercrime investigators need from AI, connected to the assistant you already use. No extra apps, no switching tabs.
Incident investigation package
Investigate a cyber incident end-to-end: scan attacker infrastructure, research threat actor, audit victim packages, and compile the full investigation report.
Phishing campaign investigation
Investigate a phishing campaign: analyze emails, scan malicious links, research sending infrastructure, and build victim notification content.
Frequently Asked Questions
Can these tools help me identify the geographic source of an attack?
IP Geolocation can identify the city, country, and ASN associated with an attacker IP. However, sophisticated attackers use VPNs, Tor exit nodes, and compromised infrastructure. Geolocation identifies hosting location, not necessarily the attacker's location. Always corroborate with additional intelligence.
Is scanning someone else's domain legal?
The Security Scanner tool retrieves publicly visible information about a domain — threat feed lookups, WHOIS data, SSL checks — similar to what any browser makes visible. Active penetration testing requires authorization. For investigation of potentially malicious infrastructure you don't control, consult your agency's legal guidance before active testing.
How current is the CVE and threat intelligence data?
Vulnerability Database syncs with the NVD (National Vulnerability Database) and CISA KEV list, typically within hours of publication. Security Scanner checks against 70+ real-time threat feeds. Threat actor research from Deep Research reflects published reporting, which may lag active operations.
Can I use these tools to investigate darknet activity?
These tools operate exclusively on the public internet. They can research threat actor groups, ransomware operations, and cybercrime trends through published reporting and threat intelligence feeds, but do not provide access to darknet marketplaces or forums.
Give your AI superpowers.
Works in Chat, Cowork and Code