ThreatPipes Logo

Case Studies

See how ThreatPipes is used to expose, detect and protect from cyber threats

About ThreatPipes

ThreatPipes is a reconnaissance tool that automatically queries 100's of data sources to gather intelligence on IP addresses, domain names, e-mail addresses, names and more.

You simply specify the target you want to investigate, pick which modules to enable and then ThreatPipes will collect data to build up an understanding of all the entities and how they relate to each other.

DNS, Whois, Web pages, passive DNS, spam blacklists, file meta data, threat intelligence lists as well as services like SHODAN, HaveIBeenPwned? and more are used to find out more about a target and its known affiliates.

The data returned from a ThreatPipes scan will reveal a lot of information about your target, providing insight into possible data leaks, vulnerabilities or other sensitive information that can be leveraged during a penetration test, red team exercise or for threat intelligence.

Red teams

ThreatPipes can be used offensively, i.e. as part of a black-box penetration test to gather information about a target.

The data returned from a ThreatPipes scan will reveal a lot of information about your target, providing insight into possible data leaks, vulnerabilities or other sensitive information that can be leveraged during a penetration test, and other red team exercises.

Blue teams

ThreatPipes can also be used in a defensively to identify what information your organisation is freely providing for attackers to use against you.

Try it out against your own network to see what you might have exposed...