Workflow Guide

Research a Domain

Investigate domains, DNS, infrastructure, and ownership signals.

Begin with WHOIS and DNS visibility, then pivot into infrastructure, hosting history, and reputation signals.

18 direct workflow tools
1 supporting tools
5 related categories

Investigation Framework

Use this page as a working sequence, not just a list. Start broad, preserve volatile evidence, and corroborate before reporting.

Collect Leads

Record target values, search terms, timestamps, and the first source that produced each lead.

Pivot Carefully

Move from identifiers to related accounts, infrastructure, images, archives, or records only when the link is explainable.

Preserve Findings

Save screenshots, archive URLs, and keep original source links before pages change or accounts disappear.

Corroborate

Avoid single-source conclusions. Confirm important claims with independent tools, dates, and source types.

1

Start Here

Open with the strongest domain intelligence sources to establish ownership, records, and core infrastructure quickly.

#1
Web & URL OSINT Free Verified May 16, 2026

ArchiveBox

Open-source self-hosted web archiving platform that preserves URLs, pages, media, and evidence in durable formats such as HTML, PDF, PNG, WARC, and JSON.

Open Tool
#2
IP Address OSINT Free Verified May 16, 2026

Censys Search

Internet-wide search interface for hosts and certificates with large-scale host, service, and virtual host coverage plus API access.

Open Tool
#3
Web & URL OSINT Paid Verified May 16, 2026

Hunchly

Investigation tool that captures visited pages, URLs, timestamps, hashes, screenshots, and evidence packages during online research.

Open Tool
2

Core Tools

Then widen into IP, hosting, and URL analysis tools to trace relationships, changes, and technical dependencies.

4
IP Address OSINT Free Verified May 16, 2026

IP Void

IP Void provides capabilities for IP attribution, network reconnaissance, and infrastructure analysis. We offer a vast range of IP address tools to discover details about IP addresses.

Open Tool
5
Domain OSINT Paid Verified May 16, 2026

Security Trails

SecurityTrails provides domain and DNS intelligence, including historical records and infrastructure correlations for online investigations. This resource supports WHOIS research, DNS history analysis, and infrastructure mapping.

Open Tool
6
Domain OSINT Free Verified May 16, 2026

Whoxy

Whoxy is a powerful WHOIS lookup API and domain ownership search tool. Access parsed WHOIS data in JSON/XML for over 2,000 domain extensions at the lowest prices

Open Tool
7
Domain OSINT Free Verified May 16, 2026

Whoisology

Whoisology provides capabilities for WHOIS research, DNS history analysis, and infrastructure mapping. A searchable cross referenced database of current and historic domain name ownership records.

Open Tool
8
Domain OSINT Free Verified May 16, 2026

Domainiq

Domainiq provides capabilities for WHOIS research, DNS history analysis, and infrastructure mapping. domainIQ provides a comprehensive set of tools for whois and domain name research, specifically tools that assist in brand.

Open Tool
9
IP Address OSINT Free Verified May 16, 2026

Viewdns Tools

ViewDNS.info offers DNS, IP, and domain lookup tools for pivoting across infrastructure during OSINT investigations. This resource supports IP attribution, network reconnaissance, and infrastructure analysis.

Open Tool
10
Domain OSINT Free Verified May 16, 2026

DNS History

DNS History is an OSINT resource for domain and infrastructure intelligence. It supports WHOIS research, DNS history analysis, and infrastructure mapping.

Open Tool
11
Domain OSINT Free Verified May 16, 2026

ARIN

ARIN provides capabilities for WHOIS research, DNS history analysis, and infrastructure mapping. ARIN is a nonprofit, member-based organization that administers IP addresses & ASNs in support of the operation and growth of the.

Open Tool
12
Domain OSINT Free Verified May 16, 2026

Central Ops

Central Ops provides capabilities for WHOIS research, DNS history analysis, and infrastructure mapping. Free online network tools, including traceroute, nslookup, dig, whois, ping, and our own Domain Dossier and Email Dossier.

Open Tool
13
Domain OSINT Free Verified May 16, 2026

Who Is

Who Is provides capabilities for WHOIS research, DNS history analysis, and infrastructure mapping. Find information on any domain name or website.

Open Tool
14
IP Address OSINT Free Verified May 16, 2026

Domain/IP lookup

Domain/IP lookup is an OSINT resource for domain and infrastructure intelligence. It supports IP attribution, network reconnaissance, and infrastructure analysis.

Open Tool
15
Web & URL OSINT Free Verified May 16, 2026

Builtwith

BuiltWith profiles website technology stacks, tracking frameworks, hosting signals, and third-party services for web reconnaissance. This resource supports URL analysis, website intelligence, and online risk assessment.

Open Tool
16
Web & URL OSINT Free Verified May 16, 2026

URL Query

URL Query provides capabilities for URL analysis, website intelligence, and online risk assessment. urlquery is an online service that scans webpages for malware, suspicious elements and reputation.

Open Tool
17
Cyber Threat OSINT Free Verified May 16, 2026

Spamhaus

Spamhaus provides capabilities for threat intelligence, vulnerability research, and IOC investigation. Strengthening trust and safety online through IP and domain reputation intelligence, expertise, education, and community.

Open Tool
18
Archive & Capture Free Verified May 16, 2026

SingleFile

SingleFile helps you to save a complete web page into a single HTML file. SingleFile is a Web Extension (and a CLI tool) compatible with Chrome, Firefox (Desktop and Mobile), Microsoft Edge, Safari, Vivaldi, Brave, Waterfox, Yandex browser, and Opera.

Open Tool
3

Also Useful

Use supporting tools for supplementary evidence such as reputation, snapshots, and deeper technical context.

Cyber Threat OSINT Free Verified May 16, 2026

VirusTotal

File, URL, domain, and IP analysis platform that aggregates antivirus engines and other signals for malware and infrastructure investigation.

Try this tool

Reporting Checkpoints

Before turning this workflow into a finding, make the chain of reasoning easy to audit.

What was observed?

Quote or summarize the source output and keep the original URL.

When was it observed?

Record collection time, page timestamps, and archive timestamps separately.

Why does it matter?

State the investigative relevance and whether it is direct evidence or a lead.

How was it confirmed?

List independent corroboration and note any uncertainty or gaps.