Using The Threat Search Bar
Search Bar Overview
The search option gives you full visibility into detected threats. To help you manage large volumes of data efficiently, the platform includes a simple yet powerful search bar.
This article explains how to use it to quickly find specific threats.
Search Bar Overview
At the top of the dashboard, you’ll see the search bar where you can enter in search criteria of your choice:
What You Can Do:
- Search by keyword: Type any term — such as a threat name, domain, email address, or part of a URL — to filter the visible threats.
- Quick match results: As you type, the list below automatically updates to match your query.
- Ideal for large datasets: When you're dealing with thousands of records the search helps you focus immediately on what matters.
Example: Searching for a Specific Threat
In the attached screenshot, the user has located a threat named "Lummac2 Threat", tied to a compromised login at https://www.farmaciasahumada.cl/customer/account/login
.
Other visible information includes:
- User and Password fields (blurred for privacy)
- Collected Date: August 6, 2025
With this layout, an analyst can quickly:
- Identify which user credentials were compromised
- View the source or affected domain
- Prioritize threats based on collection date
Navigating Large Datasets
If you’re managing thousands of records:
- Use the pagination arrows (top right) to scroll through result pages.
- Combine search + filters to zero in on a specific subset (e.g., LummaC2 threats collected this week).
- Use exact domain fragments for faster narrowing (e.g., mywebsite.cl)
- Search by email addresses to track if specific accounts have been compromised
- Sort by Collected Date to see the newest threats first
- Export filtered results if further analysis or reporting is needed
Updated on: 14/08/2025
Thank you!