We have updated our free OSINT tools: https://intelx.io/tools
✅ New YouTube DataViewer: Shows metadata and thumbnails
✅ New Vehicle Identification Number (VIN) tab
✅ Added 4 sites to Domain search, including crt.sh, Robtex, and Hurricane Electric
✅ Added 3 sites to IP search
The YouTube DataViewer is forked from Amnesty International’s version. You can access it here: https://intelx.io/tools?tab=youtube
As announced in our last newsletter from October, we are now indexing the public web. We started to crawl domains from certain TLDs (top-level domains). There are new search categories for the public web, including “Web: Germany”, which covers DE, AT, CH, and LU and “Web: Russia”, which covers RU, KZ, and UA.
More TLDs are to follow – we are optimizing our algorithms and storage handling before scaling up. Even though we’re crawling only a handful of TLDs, and currently have set a crawling depth of just 10 sub-pages per domain, it takes up 2 TB of space already.
This new data category contains already more than 824 million selectors. Click here for an example of a search result, that shows historical copies of spiegel.de: https://intelx.io/?s=spiegel.de&m=30
We open-sourced our Go “fileconversion” library: https://github.com/IntelligenceX/fileconversion
It supports the conversion of many files to plaintext and provides other file format related functions. It was tested on 184+ million files and is used by our search engine. We are happy to give back to the open source community.
Kleissner Investments s.r.o., Na Strzi 1702/65, 14000 Prague, Czech Republic
If you don’t want to receive this email anymore, click here to unsubscribe.
November 2019: Academia Program and Inline Filters 🎓 Academia Program We are now offering free access to members of schools and universities. Accounts that register on intelx.io with an email address from a school or university get upgraded automatically. We have published a list of supported domains and add new ones on request. You can
Minutes ago (evening of November 21, 2019) we just stopped an unsuccessful login bruteforce attack. The attacker’s email address is email@example.com and the IPs used in the attack are 22.214.171.124 (a NordVPN IP), 126.96.36.199 and 188.8.131.52. There were 27,601 login attempts from those IPs before stopped by Intelligence X staff. As clearly stated in our
We have added inline statistics & filters. After searching, you can filter by data source, file type or date. Click on the summary line to expand the full statistics view and then click on either the data source, file type or the date heatmap.