OSINT

Public data collection and correlation: WHOIS, DNS, historical data, and more.

Overview

Diverg's OSINT (open-source intelligence) skills gather public data about domains, infrastructure, and historical activity. This is used both standalone and to enrich web and blockchain investigations, for example linking a wallet to a domain or past hosting.

What we collect

  • WHOIS: Domain registration details and history, registrant and nameserver data
  • DNS: Enumerating records (A, AAAA, MX, TXT, etc.) and subdomains to map infrastructure
  • Email patterns: Discovery of contact and notification addresses tied to the target
  • Historical data: Integration with Wayback Machine and similar archives to see how a site or domain changed over time
  • Correlation: Cross-referencing across web, DNS, and (where applicable) blockchain to surface connections

Data sources

We use public APIs and, where configured, services like Shodan and Censys for broader internet visibility. Historical and archival data comes from partners such as Common Crawl and the Internet Archive. Results are presented in the same report as web and chain findings so you get one correlated view.

Use cases

OSINT is useful for due diligence (who owns this domain?), incident response (what else is on this infrastructure?), and attribution (linking personas or wallets to real-world entities). Combined with Web Security and Blockchain, it helps build a complete picture of a target.