We have now added another darknet to our index: I2P. It is substantially smaller in terms of hosted sites than its bigger fellow, Tor. To connect via I2P, you’d normally have to download the I2P router which provides an HTTP proxy in order to visit “.i2p” domains (called “eepsites”) from the browser. The I2P software is unfortunately written in Java – a big no-no when it comes to security (and also performance).
To search only within the I2P darknet on Intelligence X, select “Darknet: I2P” in the Advanced menu:
To view the latest I2P indexed content, click on this link: https://intelx.io/?s=*&b=darknet.i2p&so=4
There are not many existing search engines for Tor or I2P. One of them is Ahmia.fi, however no matter what search terms we used, we ended up with no results:
When using Intelligence X you’ll immediately find content that matches your query:
The first benefit of making I2P sites searchable is simply discovery; the second is archiving I2P sites long-term.
As mentioned, you either have to download the I2P router and run it locally, or use an I2P web proxy in order to access “.i2p” websites. Upon opening the detailed view in Intelligence X for a result (by clicking in the result’s title, or on “Full data”), you can immediately see how the original website looks like. Any dangerous HTML tags (and others) are removed, so it is always safe to view.
We launched a new product: “Identity Portal”! It allows users to find all lines in a text where a search term appears, and to download a list of leaked accounts under a specific domain or email address. This product is exclusively available on request to companies and governments. If you are interested, please contact us!
June 2020: New Phonebook service! 🎉 We just launched a free new service: https://phonebook.cz It lists all email addresses, subdomains, and URLs for the input domain. Try it out – it’s free! It uses the same dataset as intelx.io – which is 20 billion records. There is an existing phonebook feature at intelx.io since its
May 2020: New dorks website, Tor, DDoS test and a Europol takedown Our dataset continues to grow significantly: 17,660,962,195 selectors In the past few months, we have invested in 200+ TB of enterprise storage which allows us to scale up data collection even more. As for the public web, we are currently crawling these TLDs: