Downloads, Hacking Tools, Indicator-Intelligence, Threat Intelligence

Indicator-Intelligence – Finds Related Domains And IPv4 Addresses To Do Threat Intelligence After Indicator-Intelligence Collects Static Files

Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.


  • Related domains, IPs collect


From Source Code

You can use virtualenv for package dependencies before installation.

git clone
cd indicator-intelligence
python build
python install

From Pypi

The script is available on PyPI. To install with pip:

pip install indicatorintelligence

From Dockerfile

You can run this application on a container after build a Dockerfile.

docker build -t indicator .
docker run indicator --domains --json

From DockerHub

docker pull osmankandemir/indicator
docker run osmankandemir/indicator --domains --json

From Poetry

pip install poetry
poetry install


-d DOMAINS [DOMAINS], --domains DOMAINS [DOMAINS] Input Targets. --domains
-p PROXY, --proxy PROXY Use HTTP proxy. --proxy
-a AGENT, --agent AGENT Use agent. --agent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64)'
-o JSON, --json JSON JSON output. --json

Function Usage

Development and Contribution



Copyright (c) 2023 Osman Kandemir
Licensed under the GPL-3.0 License.


If you like Indicator-Intelligence and would like to show support, you can use Buy A Coffee or Github Sponsors feature for the developer using the button below.

You can use the github sponsored tiers feature for purchasing and other features.

Sponsor me :

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend