Search for Security Artifacts helps you to search on artifacts
such as a file hash, a URL, a domain, or an IP address (IPv4 or
IPv6) to interact with data just for that artifact. Search results
include the history of artifact, threat intelligence on the artifact,
and third-party analysis findings for the artifact.