Overview One Platform. | |
Each scan produces a structured record across the following data layers. Private scan mode is available for sensitive investigations.
📋 Summary- Input URL & resolved URL | 🌐 HTTP- Input URL & final URL | 🔍 DNS- A, AAAA, NS, MX records |
📍 Geolocation- IP address | 🔐 TLS- Issuer & validity window | 📁 HAR- Per-request breakdown |
Every scan record is indexed and fully searchable. Build single-field lookups or construct compound rules with AND/OR logic across any combination of fields. Export results for use in your own workflow or SIEM.
🔎 Image SearchFind visually similar pages across all scans. Our platform captures screenshots and uses two clustering algorithms (P-Hash and C-Hash) to find pages that look the same, even on different domains. This is extremely effective for identifying phishing kit reuse. | |
🌐 Dig InterfaceFull web-based dig command-line interface. Query any domain's DNS records directly through the platform. | 📅 Daily DomainsFresh domain registration data, updated daily. Browse newly registered domains by date and TLD to detect typosquatting and infrastructure prep early. |
🎯 Domain HuntingFind related malicious domains registered by the same actor. Two modes: SimilarityX (finds typosquatting) and Startswith (finds domains with a consistent prefix). | 📖 WHOIS (Live)Real-time WHOIS lookup for both domains and IP addresses. Get registrar details, dates, nameservers, ASN, network range, and more. |
Access to the Karen IT CTI platform is provided to vetted organizations and individuals operating in a security capacity.
Our CTI platform is built around one principle: give analysts the full picture, fast, in a format they can use. Whether you are triaging a phishing report or hunting a threat actor's infrastructure, the platform is designed to support that work.