Interactive Malware Sandbox Website

ANY.RUN

ANY.RUN is an interactive online malware sandbox and threat-intelligence website where analysts submit files, URLs, and suspicious activity to observe behavior, collect indicators, and investigate malware or phishing threats.

Official site
any.run is the main public website for ANY.RUN.
Core products
The official site presents Interactive Sandbox, Threat Intelligence Lookup, and Threat Intelligence Feeds as ANY.RUN's core products.
Common use
Security teams use ANY.RUN to analyze malware and phishing behavior, enrich indicators, collaborate on investigations, and connect results to SOC workflows.
ANY.RUN provides an interactive malware sandbox, threat intelligence lookup, and threat intelligence feeds for security investigation workflows.View logo on Wikimedia Commons

What ANY.RUN is

ANY.RUN official site presents ANY.RUN as an interactive online malware sandbox and threat-intelligence service. Analysts can use it to investigate files, URLs, phishing pages, malware behavior, indicators of compromise, and threat activity in a controlled analysis environment.

Interactive sandboxing

Traditional sandboxing often runs a sample automatically and waits for a report. ANY.RUN emphasizes interactive analysis, where an analyst can observe behavior in real time and interact with the environment when needed. That can matter when malware waits for clicks, checks the system, or hides behavior unless a realistic workflow occurs.

Threat intelligence lookup

ANY.RUN also offers threat intelligence lookup and feeds. These products help analysts enrich indicators such as IP addresses, domains, URLs, hashes, process behavior, malware families, and related artifacts with context from previous analysis sessions and observed threat activity.

Malware and phishing work

The service is commonly used for malware triage, phishing investigation, suspicious attachment review, incident response, and threat hunting. A report can include network connections, process behavior, screenshots, dropped files, registry activity, command execution, and extracted indicators that help explain what a sample attempted to do.

SOC integrations

ANY.RUN's official pages describe integrations through API, SDK, STIX/TAXII, and connectors for SIEM, TIP, SOAR, and related security platforms. These integrations let teams bring sandbox results into alert triage, case management, threat-intelligence workflows, and automated response pipelines.

Who uses ANY.RUN

ANY.RUN is used by SOC analysts, malware researchers, incident responders, threat-intelligence teams, managed security providers, and independent malware hunters. It is especially useful when a team needs to see behavior rather than only static metadata or reputation scores.

Safety and privacy limits

Sandbox submissions require care. Private documents, credentials, internal URLs, customer data, and proprietary files should not be uploaded casually, especially to public analysis settings. Analysts should choose visibility controls carefully and treat sandbox results as evidence that still needs interpretation.

Why it matters

Malware and phishing threats often behave differently depending on timing, user interaction, system details, and network access. ANY.RUN matters because it gives defenders a practical way to watch suspicious activity unfold, collect indicators, and turn a confusing file or link into an investigation record.

WHOIS domain data

Data pulled: May 23, 2026View current WHOIS record

Domain
any.run
IP address
172.66.169.161
Registrar
Key-Systems, LLC
Created
February 13, 2016
Updated
November 29, 2025
Expires
February 13, 2028
Nameservers
iris.ns.cloudflare.com; rudy.ns.cloudflare.com
Domain status
clientTransferProhibited
Registrant location
Dubai, AE
Contact privacy
Registrant email is provided through a domain-contact privacy address.