We just released a new search category “Government: Russia”. It indexes data from Russian governmental domains, including:
The historical data goes back until December 2017. That means you can go back in time and get the content of Russian governmental websites up to that point using Intelligence X.
The index contains websites, office documents such as Word files and PDF files, pictures and others. The entire dataset is 3.4 TB big and increases every day, as the crawler make daily copies. It contains 451,172,519 selectors (such as URLs, domains, email addresses, IPs, etc.) and 17,934,098 items (= unique search results).
The data is available for free on https://intelx.io – you do not even need an account.
You can select the data category in the Advanced menu, to only search the Russian government data.
Here are real-life examples:
Note: There are even more fsb.ru email addresses known if you search all data across Intelligence X.
At Intelligence X we categorize data sources into buckets. Buckets can be used as filters and to broadly identify the source of individual search results. For example, the bucket “Darknet Tor” indicates the result origins from some a Tor hidden service (.onion domain) and was collected by our Tor crawler. Buckets have human readable names
We just added support for an additional 152 top-level domains (TLDs), increasing the support to 511 TLDs in total. Support means that you can search for those domains across intelx.io and APIs, and internally that our backend supports processing them. While you can start searching for them immediately, it will take some time until our
Earlier today at 11:24 The Guardian Journalist Shaun Walker posted the security procedure and the security token used to pass makeshift checkpoints in Ukraine related to the Russian Ukrainian war: This is a reminder to journalists – and the public – to take OPSEC (operations security) seriously and not endanger people on the ground. Posting