Good IOCs are specific, actionable, and reliable. They provide clear evidence of malicious activity and can be used to detect threats effectively. Examples include: