OSINT Investigations

Investigation Workbench

Guided threat investigations with 72 enrichment engines, automated playbooks, interactive entity graphs, evidence boards, and a built-in browser research workspace.

1Overview

The Investigation Workbench transforms raw indicators of compromise (IOCs) into structured intelligence. Starting from a suspicious URL, IP address, file hash, or email address, the workbench walks your team through a wizard-driven workflow that extracts entities, enriches them against 72 threat intelligence sources, builds a relationship graph, and produces an evidence-backed verdict.

Investigations are stored in Firestore with full audit trails and can be shared, exported, or used as evidence for incident response and compliance documentation.

72
Enrichment Engines
8
Playbook Templates
10
Entity Types

2Playbook Templates

Playbooks automate the investigation workflow — selecting the right entities, tools, and enrichment sequence for each scenario.

Phishing InvestigationURL, Domain, IP, Email

Analyze suspicious URLs, domains, and email headers. Extract IOCs, check reputation, and build a phishing verdict.

Malware AnalysisHash, File, URL

Hash lookup, sandbox results, YARA matches, and behavioral analysis across multiple threat intel databases.

Domain InvestigationDomain, IP, URL

WHOIS, DNS records, SSL certificates, hosting history, and related infrastructure mapping.

IP IntelligenceIP, ASN, Domain

Geolocation, ASN, reputation, open ports, reverse DNS, and historical activity from multiple sources.

Cryptocurrency TracingWallet, Transaction

Wallet address analysis, transaction history, cluster identification, and exchange attribution.

Person InvestigationEmail, Username, Phone

Username, email, social media presence, and data breach exposure analysis.

Organization ReconDomain, IP, Email

Company infrastructure, DNS footprint, technology stack, leaked credentials, and attack surface mapping.

Custom InvestigationAny

Blank canvas with manual entity and tool selection for unique investigation scenarios.

3Enrichment Engines

The workbench integrates 72 enrichment engines across 10 categories. OSINT Starter includes 8 core engines; OSINT Pro unlocks all 72.

CategoryEnginesExamples
URL & Domain12VirusTotal, URLScan.io, Google Safe Browsing, PhishTank, OpenPhish
IP Intelligence10Shodan, Censys, GreyNoise, AbuseIPDB, IPinfo, MaxMind
Hash & Malware8VirusTotal, MalwareBazaar, ThreatFox, CIRCL, Hybrid Analysis
DNS & WHOIS7SecurityTrails, DomainTools, PassiveTotal, RDAP, DNS Dumpster
Email & Identity6Have I Been Pwned, Hunter.io, EmailRep, Dehashed
SSL & Certificates5crt.sh, Censys Certificates, SSL Labs, Certificate Transparency
Cryptocurrency4Blockchain.com, Etherscan, Chainalysis OSINT, Blockchair
Threat Intel Feeds8AlienVault OTX, Pulse Dive, ThreatCrowd, MISP, Abuse.ch
Social & OSINT6Sherlock, Maigret, Holehe, Namechk, Social Searcher
Network & ASN6BGP Toolkit, RIPE, ARIN, PeeringDB, Hurricane Electric

4Entity Graph

Every investigation builds an interactive entity relationship graph. As enrichment runs, new entities and connections are discovered and added to the graph automatically. Entity types include:

IP Address
Domain
URL
Email
Hash
Wallet
ASN
Person
Organization
Phone

Click any node to view enrichment details, run additional tools, or pivot to connected entities. The graph supports zoom, pan, filtering by entity type, and export to PNG/SVG.

5Evidence & Reporting

Screenshot Capture

Capture browser screenshots of phishing pages, suspicious domains, and web content with timestamps.

Evidence Board

Organize all enrichment results, screenshots, notes, and artifacts into a structured evidence board.

AI Verdict

AI-generated investigation verdict with confidence scoring, risk assessment, and recommended actions.

Report Export

Export investigation reports as PDF with entity graph, timeline, evidence, and verdict for compliance or legal teams.

6Browser Research Workspace

The built-in browser research workspace uses Puppeteer running in a sandboxed Cloud Function to safely visit and analyze live URLs. This enables:

Safe navigation to phishing URLs without exposing analyst workstations
Automated screenshot capture with DOM analysis
JavaScript behavior monitoring and redirect chain tracking
Form detection for credential harvesting identification
Full-page content extraction for evidence preservation

Browser research is available on OSINT Pro plans only. All requests are executed in ephemeral containers with no persistent state.

7Governance & Safety

Investigations operate within a strict governance framework:

All investigation actions are logged to an immutable audit trail per organization
Browser research runs in sandboxed ephemeral containers — no data persists
Enrichment API keys are stored encrypted; user-provided keys never leave the backend
Investigation data is isolated per tenant with Firestore security rules
Phishing URL analysis includes automatic defanging and warning prompts