Examples
The following real-world examples demonstrate how to use Validin data to pivot from a single indicator to a wider threat campaign using Synapse.
Example 1: Pivot via HTTP body hash (LaundryBear)
In this workflow, we'll discover related infrastructure by identifying servers that host identical content (HTTP body hashes).
1. Enrich the seed domain
Use the unified enrichment command to pull DNS, HTTP, and certificate data for your starting indicator:
// Tag the seed domain
[inet:fqdn=malicious-seed.com +#research.laundrybear.seed]
// Enrich the domain (including subdomains)
inet:fqdn#research.laundrybear.seed | s1.validin.enrich --wildcard
Inet:fqdn nodes in Optic (Synapse UI)
2. Identify pivot points (HTTP Requests)
The enrichment process creates inet:http:request nodes containing fingerprints such as hash:sha1 (body) and hash:md5 (favicon).
// List HTTP requests associated with the seed
inet:fqdn#research.laundrybear.seed -> inet:fqdn -> inet:url -> inet:http:request
Pivot in Optic to summarize hashes across inet:http:request nodes

Collapsed list of nodes yielded from pivot
3. Statistical analysis (Dry Run)
Check how common the body hash is before pivoting. A count of 5-50 suggests a specific threat cluster:
// Check counts for the body hash
inet:fqdn#research.laundrybear.seed -> inet:fqdn -> inet:url -> inet:http:request -> hash:sha1
| uniq | s1.validin.http.pivot --dry-run4. Materialize the infrastructure
If the count is relevant, remove the --dry-run flag to ingest the connected domains:
// Pivot from the body hash to all apex domains hosting that content
hash:sha1=<HASH_VALUE> | s1.validin.http.pivot --yield
| +inet:fqdn -> inet:fqdn +:iszone=true
| uniq
Resulting inet:fqdn nodes from the http pivot
Example 2: Pivot via WHOIS and registrars (FreeDrain)
In this next example, we'll analyze phishing domains to identify bulk registration patterns.
1. Enrich multiple domains
Enrich a set of suspicious domains with historical WHOIS data:
// Enrich all domains tagged as 'href' in the investigation
inet:fqdn#research.freedrain.href | s1.validin.whois2. Analyze registrar distribution
Check if the domains share a common registrar to find bulk patterns.
inet:fqdn#research.freedrain.href | s1.validin.whois --yield
| :registrar -> * | uniq
Unique registrars for specified domain pool
3. Filter by registrar
Isolate the domains that use a specific bulk registrar (e.g., "PDR Ltd.") to find the core infrastructure.
inet:fqdn#research.freedrain.href -> inet:whois:rec
| +:registrar="PDR Ltd."4. Tagging infrastructure
Once the bulk infrastructure is identified, apply a tag to track it in your graph.
// Apply a tag to the identified infrastructure
inet:fqdn#research.freedrain.href -> inet:whois:rec
| +:registrar="PDR Ltd."
| -> inet:fqdn
| [+#research.freedrain.infrastructure]Updated about 2 months ago
