Fast IoC matching against logs, network traffic, and security data.
Matchy builds memory-mapped databases from threat intelligence feeds, enabling fast lookups of IPs, domains, file hashes, and glob patterns.
# Build a threat database from your intel feeds
matchy build threats.csv -o threats.mxy
# Scan your logs for matches (multi-threaded)
matchy match threats.mxy access.log
# Query individual indicators
matchy query threats.mxy 1.2.3.4Threat Intelligence Matching: You have threat feeds (IPs, domains, file hashes) and need to search for them in your data.
Use Cases:
- Scan logs for known-bad IPs, domains, hashes, or C2 infrastructure
- Enrich logs with threat context before sending to SIEM or storage
- Real-time lookups in scripts and pipelines
- Offline analysis when SIEM access is limited
- Pre-filtering before expensive SIEM queries
- Unified database: IPs, CIDRs, exact strings, glob patterns in one file
- Fast loading: <1ms regardless of database size (memory-mapped)
- Fast queries: Sub-millisecond lookups on 100K+ indicators
- Log scanning: Auto-extracts IPs, domains, emails, hashes from unstructured logs
- Glob patterns:
*.evil.commatches subdomains automatically - Rich metadata: Attach threat level, category, source to each indicator
- MaxMind compatible: Query GeoIP databases directly - no need for separate libmaxminddb
- Build MMDB databases: Create MaxMind-compatible databases from CSVs (libmaxminddb has no builder)
- Multiple formats: Import from CSV, JSONL, or read existing MaxMind MMDB files
cargo install matchyRequirements: Rust 1.87+ (or use pre-built binaries)
Create a CSV with your indicators:
entry,threat_level,category,source
1.2.3.4,high,malware,abuse.ch
10.0.0.0/8,low,internal,rfc1918
*.evil.com,critical,phishing,urlhaus
malware.example.com,high,c2,internal
ab5ef3c21d4e...,high,malware,virustotal
Build the database:
matchy build threats.csv -o threats.mxy --format csv
# Build MaxMind-compatible MMDB (IP data only)
matchy build ip-blocklist.csv -o blocklist.mmdb --format csv
# Works with any tool expecting MMDB format!# Scan access logs (outputs JSON, one match per line)
matchy match threats.mxy /var/log/nginx/access.log
# With statistics
matchy match threats.mxy access.log --stats
# Scan gzip logs (automatic decompression)
matchy match threats.mxy access.log.gz
# Watch live logs
tail -f /var/log/app.log | matchy match threats.mxy -
# Quick testing: skip the build step (auto-builds from JSON/CSV)
matchy match threats.json access.log # builds database in-memory# Check an IP
matchy query threats.mxy 1.2.3.4
# [{"threat_level":"high","category":"malware","source":"abuse.ch"}]
# Check a domain
matchy query threats.mxy sub.evil.com
# [{"threat_level":"critical","category":"phishing","source":"urlhaus"}]
# Check a hash
matchy query threats.mxy ab5ef3c21d4e...
# Query MaxMind GeoIP databases (no libmaxminddb needed)
matchy query GeoLite2-City.mmdb 8.8.8.8
# {"city":"Mountain View","country":"US",...}cargo add matchy --no-default-features # Library only, no CLISee API docs for building databases, querying, and extracting IoCs from text.
#include <matchy/matchy.h>
matchy_t *db = matchy_open("threats.mxy");
matchy_result_t result = matchy_query(db, "1.2.3.4");
matchy_close(db);MaxMind-compatible API also available. See The Matchy Book for integration guides.
- The Matchy Book - Complete CLI guide and examples
- API Reference - Rust library documentation
- DEVELOPMENT.md - Architecture and performance details
License: Apache-2.0 Contributing: CONTRIBUTING.md
Matchy extends MaxMind's MMDB format with Paraglob-style glob matching and literal string matching, creating a unified IoC database format.