One API to analyze text, URLs, wallets, and domains. Thousands of Ukrainian scam patterns, real-time SSE events, full decision audit trail.
Single endpoint to classify any input: SMS, URLs, crypto addresses, domains. Auto-detects input type.
Subscribe to live threat events: NEW_THREAT, THREAT_CONFIRMED, BLOCKLIST_UPDATED, FALSE_POSITIVE.
Full transparency: see OSINT hits, DomainWatch matches, crypto intel, graph clusters behind every verdict.
DaaS export in JSON, JSONL, CSV, STIX. Incremental delta updates. Integrity checksums.
Deep SMS/messenger analysis: artifact extraction, signal orchestration, safe response templates.
Nova Poshta, PrivatBank, Monobank, Diia, military donation fraud — all Ukrainian-specific scam vectors, continuously updated.
Send text, URL, wallet address, or domain via unified /analyze endpoint.
Thousands of Ukrainian-specific regex patterns checked first. Redis cache for instant repeat lookups.
If patterns inconclusive, Cloud LLM (OpenRouter/Claude) provides deep semantic analysis.
Get verdict with confidence score, categories, reasons, and full decision audit trail.
/api/v3/intelligence/analyzeRequest
{
"input": "Вітаю! Ваша посилка Nova Poshta
затримана. Сплатіть 49грн:
https://nova-poshta-ua.xyz/pay",
"source": "sms"
}Response
{
"verdict": "CRITICAL",
"risk_score": 97,
"categories": ["NOVA_POSHTA", "PHISHING"],
"reasons": ["fake_delivery_notification",
"suspicious_domain", "payment_request"],
"confidence": 0.99,
"iocs": {
"urls": ["nova-poshta-ua.xyz"],
"brands": ["Nova Poshta"]
}
}1000+
UA patterns
7
Active modules
<200ms
Avg latency
SSE
Event stream
Connect your systems to the most comprehensive threat intelligence platform.
Get started free →