Wpisy

serviceobjects.com/reverse-phone-lookup-service

Service Objects. Real-time, reverse phone lookup API that returns carrier and contact information based on the phone number provided. Caller contact information includes name, mailing address, address geocoordinates, phone type, line type and date ported. Wireless numbers also return associated SMS and MMS addresses. For business numbers, the SIC code is returned. The reverse phone lookup also identifies high risk phone number types like portable VOIP and prepaid phones that are commonly used for fraud.

LINK: https://serviceobjects.com/products/phone/reverse-phone-lookup-service

virustotal.com

Virus Total is a tool that analyzes suspicious files and URLs to detect types of malware. It also automatically shares them with the security community. The tool can be used by:
– submitting a file,
– entering an URL,
– searching by URL, IP address, domain or file hash.

LINK: https://virustotal.com

threatintelligenceplatform.com

Threat Intelligence Platform. In-depth security analysis. Threat Intelligence Platform combines several threat intelligence sources to provide in-depth insights on threat hosts and attack infrastructure. Analysis based on the provided domain or IPv4 address.

LINK: https://threatintelligenceplatform.com

pentest-tools.com

Pentest-Tools.com provides over 25 deeply integrated security testing tools and reliable automation features that eliminate 80% of manual work. Pentest-Tools.com enables quick detection and reporting of vulnerabilities in websites and network infrastructures. The available tools enable you to scan your website, scan your network, discover the attack surface and many more. Find Subdomains is a free tool that discovers subdomains and determine the attack surface of an organization.

LINK: https://pentest-tools.com/reconnaissance/find-subdomains-of-domain

securitytrails.com/dns-trails

SecurityTrails – repository of historical DNS data. Data for security companies, researchers and teams. The tool helps to drill down, find suspicious changes to DNS records and prevent future fraudulent or criminal activity.

LINK: https://securitytrails.com/dns-trails

emailrep.io

EmailRep uses hundreds of factors like domain age, traffic rankings, presence on social media sites, professional networking sites, personal connections, public records, deliverability, data breaches, dark web credential leaks, phishing emails, threat actor emails, and more to answer these types of questions:
– Is this email risky?
– Is this a throwaway account?
– What kind of online presence does this email have?
– Is this a trustworthy sender?

LINK: https://emailrep.io

dehashed.com

DeHashed functions help prevent account compromise, aid in identity fraud investigations, provides affordability, private datasets, integrity and powerful integrations. Searching in all fields or a chosen one from: Email, Username, IP, Name, Address, Phone, VIN, Domain scan.

LINK: https://www.dehashed.com

whonix.org

Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacy.

LINK: https://www.whonix.org/wiki/Main_Page