Everything you need to get up and running with ThreatPipes.

About ThreatPipes

Thanks for checking out ThreatPipes.

ThreatPipes is a reconnaissance tool that automatically queries 100’s of data sources to gather intelligence on IP addresses, domain names, e-mail addresses, names and more.

You simply specify the target you want to investigate, pick which modules to enable and then ThreatPipes will collect data to build up an understanding of all the entities and how they relate to each other.

DNS, Whois, Web pages, passive DNS, spam blacklists, file meta data, threat intelligence lists as well as services like SHODAN, HaveIBeenPwned? and more are used to find out more about a target and known affiliates.

The data returned from a ThreatPipes scan will reveal a lot of information about your target, providing insight into possible data leaks, vulnerabilities or other sensitive information that can be leveraged during a penetration test, red team exercise or for threat intelligence.

See how other security teams are using ThreatPipes here.

About this documentation

The pages in this documentation cover everything from installing to troubleshooting issues with ThreatPipes.

Table of Contents

  • Admin Guide: Start here if you need to install ThreatPipes.

  • User Guide: Familiarise yourself with ThreatPipes features and how to use them.

  • Developer Guide: Customise and extend the power of ThreatPipes.

  • Release Notes: Learn about what's new in our most recent release.