Want to investigate the Russian government? We are helping.

Published on October 5, 2019 by

We just released a new search category “Government: Russia”. It indexes data from Russian governmental domains, including:

  • *.gov.ru – Russian Government
  • *.mil.ru – Ministry of Defence of the Russian Federation
  • kremlin.ru – Official website of the President of Russia
  • fsb.ru – Federal Security Service
  • government.ru – Russian Government
  • supcourt.ru – Supreme Court of Russia
  • cikrf.ru – Central Election Commission of Russia
  • ombudsmanrf.org – High Commissioner for Human Rights in the Russian Federation

The historical data goes back until December 2017. That means you can go back in time and get the content of Russian governmental websites up to that point using Intelligence X.

The index contains websites, office documents such as Word files and PDF files, pictures and others. The entire dataset is 3.4 TB big and increases every day, as the crawler make daily copies. It contains 451,172,519 selectors (such as URLs, domains, email addresses, IPs, etc.) and 17,934,098 items (= unique search results).

The data is available for free on https://intelx.io – you do not even need an account.

How to search the data

You can select the data category in the Advanced menu, to only search the Russian government data.

Here are real-life examples:

  • You can click through and see the websites at the time and use the “History” tab to visit historical versions:

Note: There are even more fsb.ru email addresses known if you search all data across Intelligence X.

Related articles

Newsletter 2019-11-27

Published on November 27, 2019 by

November 2019: Academia Program and Inline Filters 🎓 Academia Program We are now offering free access to members of schools and universities. Accounts that register on intelx.io with an email address from a school or university get upgraded automatically. We have published a list of supported domains and add new ones on request. You can


Login Bruteforce attempts against intelx.io

Published on November 21, 2019 by

Minutes ago (evening of November 21, 2019) we just stopped an unsuccessful login bruteforce attack. The attacker’s email address is primeday@protonmail.com and the IPs used in the attack are 163.172.225.39 (a NordVPN IP), 94.36.97.33 and 87.0.205.119. There were 27,601 login attempts from those IPs before stopped by Intelligence X staff. As clearly stated in our


Inline Filters

Published on November 18, 2019 by

We have added inline statistics & filters. After searching, you can filter by data source, file type or date. Click on the summary line to expand the full statistics view and then click on either the data source, file type or the date heatmap.


Search the blog: