Case Studies
Read how some of our existing customers use ThreatPipes
About ThreatPipes
Stay two steps ahead of your adversaries. Get a complete picture of how they will exploit you.
ThreatPipes is a reconnaissance tool that automatically queries 100’s of data sources to gather intelligence on IP addresses, domain names, e-mail addresses, names and more.
You simply specify the target you want to investigate, pick which modules to enable and then ThreatPipes will collect data to build up an understanding of all the entities and how they relate to each other.
DNS, Whois, Web pages, passive DNS, spam blacklists, file meta data, threat intelligence lists as well as services like SHODAN, HaveIBeenPwned? and many others are used to discover intelligence on a target.
By following chains of intelligence, ThreatPipes also uncovers other affiliated targets that have a relationship to your original target. For example, a domain entered in a scan might resolve to SSL certificates, to known malicious domains, to IP addresses, and so on.
The data returned from a ThreatPipes scan will reveal a lot of information about your target, providing insight into possible data leaks, vulnerabilities or other sensitive information that can be leveraged during a penetration test, red team exercise, blue team activities, or for threat intelligence.
Use-Cases
Below are just a handful of example use-cases of how our customers use ThreatPipes.
- Crafting a Phishing Domain
- The danger of random LinkedIn connections
- Hacked By Iran Cyber Security Group HackerS
- How a missed delivery ruined Christmas
- I put my credit card on the Darkweb
- We built a Splunk App... and it found Splunk.
- A Tweet is for life
- Stop signing up for porn sites using your work email
- All your networks. Found by everyone
- Email addresses are boring
- Getting down in the dumps
- Tracking the trackers
- How not to name a file or directory
We’d love to hear your stories too!