Look deeper.
Find everything.

Deep packet inspection and threat analysis platform for network forensics, threat hunting, and incident response. 67 protocol dissectors. Automated threat hunts. No cloud required.

Download Free See Features
67Protocol Dissectors
7Automated Threat Hunts
500KPackets (Pro)
0Cloud Dependencies

See it in action

From dashboard triage to deep packet inspection — a complete investigation workflow.

Built for the analyst workflow

From initial triage through structured export, Intreys covers the full investigation lifecycle.

🔎

Deep Packet Inspection

Wireshark-compatible display filters, full TCP/UDP stream reassembly, hex dump inspection, protocol tree dissection, and expert info panels. Virtual scrolling handles 500K+ packet lists.

🎯

Automated Threat Hunting

C2 beacon detection, DNS tunneling, data exfiltration, lateral movement, port scanning, credential theft, and covert channel analysis. Hypothesis-driven hunts with playbook-guided investigation.

🤖

AI-Assisted Analysis

Attack narrative generation with Mermaid diagrams. Local AI analysis (runs on your hardware). Cloud providers supported with privacy controls and cost tracking.

🏭

ICS/SCADA Security

10 industrial protocol dissectors including Modbus, DNP3, S7comm, IEC-104, and OPC UA. Security policy enforcement, dangerous operation detection, and per-host health scoring.

📡

Live Packet Capture

High-performance capture engine with real-time streaming. PCAP file writing for captured traffic. No external tools required.

📈

MITRE ATT&CK Mapping

Visual ATT&CK matrix with detected techniques. Pyramid of Pain indicator classification. ATT&CK Navigator JSON export for team collaboration.

📦

Export Everywhere

STIX 2.1, MISP, TAXII 2.1, Sigma rules. PDF and DOCX reports. Full JSON and CSV export. YARA rule scanning on extracted artifacts.

🔒

Enterprise Security

Role-based access control, encrypted API key storage, login rate limiting, enterprise-grade security controls, audit logging, and cryptographically signed license verification.

🌐

Threat Intelligence

Online enrichment via AbuseIPDB, VirusTotal, GreyNoise, OTX, Shodan, and URLScan. Threat feed ingestion with local caching for offline use. DGA detection.

67 protocols. Zero-dependency installation.

No tshark, Wireshark, or Suricata required. Every dissector is built in with no external dependencies.

Ethernet ARP IPv4 IPv6 TCP UDP ICMP DNS HTTP/1.x HTTP/2 TLS/HTTPS QUIC SSH FTP SMTP POP3 IMAP SMB LDAP Kerberos DHCP SNMP NTP SIP Syslog RDP VNC WinRM WebSocket gRPC MySQL PostgreSQL Redis MSSQL Oracle Modbus TCP DNP3 S7comm IEC 60870-5-104 OPC UA BACnet PROFINET CIP/EtherNet/IP GE-SRTP Niagara Fox MQTT CoAP Bluetooth BLE ZigBee Thread 6LoWPAN LoRaWAN OSPF LLDP STP SOCKS Tor IEEE 802.15.4 LLMNR mDNS NBNS DCE/RPC Telnet RADIUS TACACS+ TFTP

Simple pricing

Start free. Scale when you need to.

Monthly Yearly Save 17%

Community

Free
Forever
For individual analysts and students
  • 10,000 packets per capture
  • 50 MB file size limit
  • Single user
  • All 67 protocol dissectors
  • Automated threat hunts
  • Basic CSV export
  • Local AI support
Download

Enterprise

$99/mo per seat
For MSSPs and large organizations
  • Unlimited packets
  • 2 GB file size limit
  • Unlimited users
  • ICS/SCADA module
  • Real-time collaboration
  • SIEM integration (Splunk, ELK, Syslog)
  • Campaign analysis & case management
  • Compliance mapping (NIST, PCI, HIPAA)
  • Priority support
Buy Enterprise
or Contact Sales for volume pricing

Get started in 60 seconds

Download the Community edition — no signup required.

Download Latest Contact Sales

Cross-platform (macOS, Linux, Windows) and Docker.
Pre-built packages available — no dependencies required.