Run a one-shot OSINT report on an IP you control during incident response
Watch a domain with the cron worker and post a webhook diff when it changes
Self-host a free OSINT dashboard on the Cloudflare free tier
Enrich a threat feed with RDAP, passive DNS, and certificate transparency data
Needs a Cloudflare account with D1 and KV plus secrets for every OSINT source you want enabled.
SeekYou is a web tool for what the security industry calls OSINT, or open-source intelligence. You give it an IP address, a domain name, or an ASN, which is the identifier for a network operator on the internet, and it gathers a single report by querying fifteen public data sources at once. The README pitches it as a way to quickly see who owns a piece of internet infrastructure, what ports are open, what certificates it has used, and whether it appears in any threat feeds. The report bundles several categories. Network details include open ports, BGP routing prefixes, and upstream and peer networks. Identity covers RDAP registration data, contacts, and registrar information. Geo shows country, city, ISP, and flags for proxy, hosting, or mobile networks. Certificates pull from crt.sh, DNS information comes from passive DNS and Robtex, and threat intelligence is checked against URLhaus, ThreatFox, MalwareBazaar, Feodo Tracker, and SSLBL. It also enriches any vulnerability identifier from InternetDB with details from the NVD and CIRCL databases, and lists exposed cloud storage buckets and archived web snapshots. The whole thing runs on the Cloudflare free tier, with no traditional server behind it. The README describes an edge-first architecture using Cloudflare Workers, with no Node.js dependency, layered parallel execution, and graceful degradation so that a single failing source shows an unavailable badge rather than breaking the whole page. Storage is split between Cloudflare D1, which is a SQL database, and KV, which is a key-value store, and there is a fire-and-forget pattern for writing history so user requests stay fast. The README also describes a separate cron worker that polls hosts on a schedule and emits a typed diff to a webhook when something changes. A large section on lawful use spells out what the author considers permitted and prohibited. Permitted uses cover security operations on networks you own or are authorised to monitor, threat intelligence research, penetration testing with written permission, academic study, and compliance work. Prohibited uses include any unauthorised reconnaissance, harassment or stalking, and anything that would breach laws like the US Computer Fraud and Abuse Act, the UK Computer Misuse Act, or the GDPR. The author also notes that querying a host through SeekYou does not give permission to access it. The rest of the README covers project structure, caching, rate limiting, circuit breakers, an API key rotation scheme for one source called GrayHatWarfare, D1 schema setup, deployment with Wrangler, and a list of required secrets. A donation address and links to related tools by the same author round it out.
Generated 2026-05-22 · Model: sonnet-4-6 · Verify against the repo before relying on details.