Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»The OSINT Newsletter – Issue #93
    News

    The OSINT Newsletter – Issue #93

    adminBy adminMarch 26, 2026No Comments8 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    👋 Welcome to the 93rd issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator. Here’s an overview of what’s in this issue:

    • Introduction to Domain OSINT

    • Beginner tools for Domain OSINT

    • Case study in Domain OSINT

    🪃 If you missed the last newsletter, here’s a link to catch up.

    ⚡ How I Discover New OSINT Methods

    The OSINT Newsletter - Issue #92

    The OSINT Newsletter – Issue #92

    🎙️ If you prefer to listen, here’s a link to the podcast instead.

    Episode 11 - OSINT With AI, New Methods, and the Tools Shaping Modern Investigations

    Episode 11 – OSINT With AI, New Methods, and the Tools Shaping Modern Investigations

    Let’s get started. ⬇️

    Domains are the real estate of the internet. From the swishest company site, to the jankiest homepage, to the most self-indulgent blog, every website on the net is like a piece of land – and every piece of land has an owner. The “address” to this land is the domain name. So if you investigate that domain right, it could lead you straight to the landlord’s door.

    In this issue, we’re exploring domain OSINT; one of the most useful (and most misunderstood) starting points for investigation. We’ll cover:

    • What domains can actually tell you

    • Beginner tools for domain OSINT

    • How to pivot from domains to other intel

    • A practical example of domain OSINT in action

    By the end, you’ll know how to go from one innocent-looking URL to a whole new world of intelligence. It’s free real estate.

    Domain OSINT is pretty self explanatory; it’s the act of investigating a domain name and the infrastructure around it. It’s easy to assume that it’s just about “who owns this website?” – of course, that’s super important information to learn (and has cracked some very high-profile cases). But the intelligence value of the average address is much more than a less OSINT-savvy realtor would tell you. A domain connects to:

    • Registrant information

    • Hosting providers and IP ranges

    • Subdomains and services

    • Email infrastructure

    • Historical versions of websites

    • Other domains owned by the same entity

    Pretty much anything. Each of the above points of data you can get from a domain also have a corresponding intelligence use. After all, in super pretentious terms, a domain is a behavioural artifact: someone registered it, configured it, hosted it, maintained it, and used it for a purpose. Every one of those decisions leaks information, like layers of old wallpaper that tell you your house’s walls used to be puke-green. You can uncover:

    • Ownership: When the owner of the site got the domain, they likely had to provide the hosting provider with some identifying data: an email address, a real name, or the name of an organisation they’re connected to. You can get this data.

    • Connected Sites: Any subsidiaries, backups, or even scammy clones of the target domain. They could also be hosting the page within another site, or own other sites under the same personal ID – which shows up a clear link to other activity.

    • Email Activity: Some domains allow email hosting. A hosted email address has obvious pivot potential; you can look at MX records, plus all the other stuff we covered in our previous email issue.

    • Hosting Behaviour: Are they using a cheap hosting provider? Or maybe it’s bulletproof hosting, or even sophisticated enterprise infrastructure? The type of hosting your target domain uses can indicate the purpose (and dodginess) of the site.

      • Also consider operational maturity: a fancy term for ‘how long it’s been there.’ A newly-created site might be used like a burner phone, whilst a long-established asset domain might suggest legitimacy.

    • Geographic Location: You can use the address to find out where the domain is hosted; just look at the country code at the end. Also, the language used will tell you who wrote it, and who the intended audience is.

    Of course, it’ll still take some classic investigator’s instinct to turn this information into insights. But even the most elusive info – intent, for example – is discoverable once you’ve got this know-how. Say you find a domain built yesterday, hosted on a bargain VPS, with no history and several clones… It’s easy to see how that could become evidence.

    Now we know what domain OSINT can do, we can get into the tooling. You don’t need anything elite or expensive; our basic toolkit is all free (or freemium), fast and extremely effective.

    🌐 WHOIS Lookup

    WHOIS lookup is synonymous with domain OSINT. WHOIS search is a handy protocol that lets you search databases for information about registered users of domain names and IP addresses. That includes their contact details, the date they got the address, and more. You can also look into historical WHOIS data; ownership changes over time are often more interesting than current data.

    🧱 DNS Tools

    Tools like DNS Dumpster and SecurityTrails go through DNS records and associated infrastructure. Give them a hostname, and they’ll reveal subdomains, DNS changes, name servers, and any other associated digital assets the domain owner forgot to take down. In addition, you can also get statistics, like how many other hostnames have the same IP.

    🔁 Reverse IP Search

    Reverse IP search can show you what else is hosted on the same server as your target domain. Often, people will reuse cheap hosting servers; it’s common in networks of scammers, for example. Infrastructure reuse will betray any hidden relationships.

    📜 The Wayback Machine

    Want to know what a site used to look like? Check it out on the Wayback Machine. The Internet Archive stores captures of sites from the past, so you can see previous versions. You might find old branding, evidence of previous owners, or deleted content. Sudden pivots (e.g. from “crypto project” to “consultancy”) are classic red flags.

    📧 Email Infrastructure Checks

    MX records show how the site handles email. Usually, they’re used to check if an email address is fake without sending a humiliating (or dangerous) bounceback message. However, they can do even more for domain OSINT, too. Find out which email provider they use, and whether the email works at all. A “professional” company with no proper email setup is… suspicious.

    Let’s test our skills on an example. Imagine you’ve found a site from a company offering “international geomarketing services”. Their website is slick – full of stock photos of serious people in suits staring at maps. The domain address: red-ball-market-global.com.

    You’ve called their phone number, but you’re on hold. So while you’re waiting, you do a little domain OSINT.

    You plug the address into a WHOIS search, hoping to find registration details. The domain itself was registered 11 days ago via a budget registrar, which does seem suspicious for a legitimate “global” firm. They’ve also enabled privacy protections, so no contact details.

    You run a DNS enumeration, and turn up some results for connected subdomains: mail.red-ball-market-global.com, and portal.red-ball-market-global.com. Mail does exist – and explains the email you received. Portal redirects you to a generic login page.

    Reverse IP search shows four other domains on the same server as red-ball-market-global.com:

    None of these are older than two months, and their relevance to “international geomarketing” is… weak. Clearly, the original red-ball site’s owner has a diverse business portfolio. Too diverse to trust.

    In the Internet Archive, you uncover a previous version of red-ball-market-global.com. A year ago, it was selling cheap office furniture under the ‘Red Ball’ name; with Trustpilot reviews in the dirt. This confirms that you’re looking at the operator’s latest scam, not a legitimate global agency.

    So, red-ball-market-global.com is one big, red, spherical flag. But at least their hold music was catchy.

    Hopefully, you’ve now got your first step on the OSINT property ladder. You should know:

    • Who owns the internet? Domain registrars, that’s who. Every site has an owner, and every owner has their details stored somewhere.

    • Landlords exist: Some people have multiple sites. Connecting them is key.

    • Patterns are pivots: Even if the contacts are privacy protected, you can still analyse the target’s behaviour around a domain.

    • It’s free real estate: Domain tools are free, and good enough to get results.

    See you next issue, investigators!

    ✅ That’s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.

    By upgrading to paid, you’ll get access to the following:

    👀 All paid posts in the archive. Go back and see what you’ve missed!

    🚀 If you don’t have a paid subscription already, don’t worry. There’s a 7-day free trial. If you like what you’re reading, upgrade your subscription. If you can’t, I totally understand. Be on the lookout for promotions throughout the year.

    🚨 The OSINT Newsletter offers a free premium subscription to all members of law enforcement. To upgrade your subscription, please reach out to LEA@osint.news from your official law enforcement email address.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTwo-Factor Authentication: Strengthening Security, Building Trust, and Ensuring Compliance
    Next Article MFA Bypass in GUI
    admin
    • Website

    Related Posts

    News

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.