Skip to content
Merged

BBOT #34

Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions docs/IntelOwl/usage.md
Original file line number Diff line number Diff line change
Expand Up @@ -259,6 +259,9 @@ The following is the list of the available analyzers you can run out-of-the-box.
- `UltraDNS_Malicious_Detector`: Scan if a DNS is marked malicious by [UltraDNS](https://vercara.com/ultra-dns-public).
- `IPQuery`: [IPQuery](https://ipquery.io/) aims to provide a straightforward and simplistic API for working with IP addresses.
- `Mullvad_DNS`: [Mullvad_DNS](https://github.com/mullvad/dns-blocklists) is an analyzer that queries Mullvad's DNS-over-HTTPS service (using the "base" endpoint) to check a domain's DNS records. It supports two modes: `query`: returns raw DNS answer data. `malicious`: interprets an NXDOMAIN (rcode==3) as the domain being blocked (i.e., malicious).

_Available from version > 6.3.1_
- `BBOT`: [BBOT](https://github.com/blacklanternsecurity/bbot) (Bighuge BLS Open Threat) domain/URL scanner that leverages BBOT's Python library to perform scans with configurable modules and presets.

##### Generic analyzers (email, phone number, etc.; anything really)

Expand Down