Newsletter 2019-08-20

August 19, 2019 by

August 2019: Latest Updates ๐Ÿ‘‹ The last newsletter was sent out early July 2019. Since then, we have new features and blog posts to share! Our free OSINT tool suite has been substantially upgraded. ๐Ÿ•ต๐Ÿป OSINT Tools: More tabs, more functionality Check out our free OSINT tools at The third-party search allows you to

Viruses on the Darknet

August 13, 2019 by

When talking about viruses on the darknet, the focus is usually on malware that can be purchased or rented (which gets increasingly popular with ransomware). There are also viruses that use the darknet for C&C (command & control) purposes. However, this blog post investigates viruses on the darknet websites themselves – which are usually based

WikiLeaks data in numbers

August 1, 2019 by

We have uploaded all the WikiLeaks data to Intelligence X and created a new category. You do not need an account or license to search through the WikiLeaks data using our site. Try it out here! Source & Challenges Most of the raw data is available via as well as torrents. There are

Newsletter 2019-07-08

July 8, 2019 by

Welcome to our Newsletter! ๐Ÿ‘‹ Intelligence X is excited to bring you periodic updates about our search engine and related tools. ๐Ÿ•ต๐Ÿป New OSINT Tools Recently, we developed free OSINT (Open Source Intelligence) tools! Use them here at: Intelligence X wants to support the OSINT community by providing these OSINT tools to the public.

Redesigned user interface and added statistics

June 3, 2019 by

Update 6/7/2019: We added a full-screen view (click on the new button next to “Back to result”) as well as a new search bar when clicking on a search result. If you don’t see it, make sure to refresh the website (CTRL + F5) as your browser may have cached the old version. Original 6/3/2019:

Social Security Numbers

May 22, 2019 by

We added support for US Social Security Numbers (SSNs)! You can immediately search for them here: Whis this is important Searching at Intelligence X works based on selectors (strong search terms). When you search for something, the system automatically detects suitable selectors and performs a search. Below is the list of supported selectors: Email

A comparison of darknet search engines

May 11, 2019 by

A few days ago a new search engine DarkSearch for Tor launched, adding to the mix of other existing search engines out there like Ahmia, Torch, Not Evil, and Haystack – it’s time for a feature comparison! No search engine can cover 100% of the pages due to the nature of Tor. There is no

Email verification for users

May 6, 2019 by

We have just turned on email verification for all accounts on Existing accounts receive a verification link via email upon login.

Native Support for Excel Sheets and PowerPoint Presentations ๐Ÿ—ƒ๏ธ

May 1, 2019 by

We just added native support to Intelligence X for the following data formats: Excel Sheets (.XLS, .XLSX, .ODT) PowerPoint Presentations (.PPTX) Native support means end-to-end support. This ranges from indexing and crawling files of various data sources, to processing them internally and presenting them to the end-user on the frontend Indexing is the process

“Virut” once infected a North Korean website, its injected iframe is still live

April 29, 2019 by

The North Korean website of the Korea Chonsong Trading Company (at was infected by the virus, “Virut”. Symantec [1] writes about this malware: W32.Virut is a virus that infects executable files. Some variants also infect ASP, HTML and PHP files. The virus has worm-like behavior and spreads by copying itself to fixed, removable and

A new type of HTTP client attacks is around the corner, and it’s really sneaky

April 15, 2019 by

Google is working on a new feature called “Signed HTTP Exchanges (SGX)” (note: Google also abbreviates it as “SXG”). According to their website: Signed HTTP Exchanges (SGX), part of an emerging technology called Web Packages is now available in Chrome 73. A Signed HTTP Exchange makes it possible to create โ€œportableโ€ content that can be delivered

North Korea just got a 3rd internet connection (and no one noticed)

April 11, 2019 by

Say hello to North Korea’s 3rd internet uplink! The North Korean autonomous system AS131279 just got a new uplink to AS133073 Teleglobal Communication Services Limited – which is assigned to Hong Kong, according to APNIC. According to our information, it went live a few days ago on April 3, 2019 at 16:00 UTC. North Korea

๐Ÿ Python code to use Intelligence X

April 4, 2019 by

We just added Python code to use the Intelligence X API! You can find the code in the SDK at The code comes with a default API key so you can get started right away. For details on usage please look at the readme file in the SDK. The SDK already has code implementations

How many WiFi networks does North Korea have? At least 1.

April 3, 2019 by

North Korea has at least 1 WiFi network! The above screenshot was taken from the app, WiFi Map, which shows WiFis added by users (crowd-sourced). In this case, user “Trevan Baxter” added a WiFi network on December 23, 2018. The app first connects to the WiFi before adding it to the database to make sure

NSA program FAIRVIEW: Collecting trash. ๐Ÿ—‘๏ธ

March 20, 2019 by

Fairview is a NSA program designed to collect “phone, internet, and e-mail data mainly of foreign countries’ citizens at major cable landing stations and switching stations inside the United States”. It dates back to 1985 [1]. There are various good articles on the subject [2]. As with every mass surveillance program, the basic law of

Transparency Report #1

March 14, 2019 by

We want to be transparent from the start about how we handle content removal requests and government orders. The service is governed by the Terms of Service and the Privacy Policy. Content removal requests can be filed here. These are the categories under which we remove content from the search results when reported via content

New Developer Tab

January 25, 2019 by

You can access the new developer tab after logging in. Go to: The new tab shows useful information for using the Intelligence X API: Your API key API URL The buckets (= data categories) you can access List of all API functions (endpoints) you can access as well as the amount of credits (=

Integrate Intelligence X into your project: Use the Software Development Kit

December 20, 2018 by

We are excited to announce our new Software Development Kit. It is free and can be used by anyone to integrate Intelligence X into their project. Whether it’s a website, service, or local program, you can use our versatile API to enrich your data and provide additional context. The SDK is published here: It

I2P added to the index ๐Ÿ‘€

December 2, 2018 by

We have now added another darknet to our index: I2P. It is substantially smaller in terms of hosted sites than its bigger fellow, Tor. To connect via I2P, you’d normally have to download the I2P router which provides an HTTP proxy in order to visit “.i2p” domains (called “eepsites”) from the browser. The I2P software

Free Alerts for Everyone

November 28, 2018 by

We just released an important feature: alerts via email. Now, you can automatically receive notifications daily, weekly, or monthly if there are new search results. The alert feature is free for everyone. Sign up at and then go to the “Alert” tab under “Account”. You can preview the alert and see how it looks

Analyzing the recent Dark Web hosting provider hack

November 18, 2018 by

Catalin Cimpanuย @zdnet published yesterday an article “Popular Dark Web hosting provider got hacked, 6,500 sites down”. The hosting provider “dhosting4okcs22v.onion” was hacked on November 15, 2018 and all data was apparently deleted. The creator Daniel Winzen was cited: “Unfortunately, all data is lost and per design, there are no backups”, and that 6.500+ dark web

We just launched! Intelligence X goes live ๐Ÿฅ‚

October 10, 2018 by

Press release / Vienna / October 10, 2018 Global launch of Intelligence X: First search engine for the darknet goes online Programmer and IT security analyst Peter Kleissner launches Intelligence X – the first search engine that can be used to investigate whether personal or sensitive data have been leaked on the internet. Website available

Search the blog:

Subscribe for the newsletter: