SYSTEM
NETWORK
DATABASE
2023-11-15 14:37:22 UTC
USER: AGENT_47
Tools

OSINT Modules

  • > IP Analysis
  • > Social Media
  • > Dark Web
  • > Image Analysis
  • > Domain Intel
  • > Financial Records

Quick Actions

  • > New Investigation
  • > Save Session
  • > Export Report
  • > System Scan

Recent Targets

  • > 192.168.1.105
  • > @suspect_01
  • > example.com
  • > image_023.jpg
System Monitor
CPU 47%
MEM 68%
NET 1.2 MB/s
Investigation #4729
Network Scan
Social Graph
Data Analysis
Target Information

TARGET: 192.168.1.105

Status: ACTIVE

First Seen: 2023-11-12 08:23:45

Last Activity: 2 minutes ago

Location: 34.0522° N, 118.2437° W

ISP: NeonNet Communications

ASN: AS61742

ASSOCIATED ENTITIES

Type Identifier Confidence
Email user@target.com 85%
Username target_user 92%
Domain target.com 78%
Phone +1 (555) 123-4567 65%

RECENT ACTIVITY

> [14:32:01] Connected to VPN server (Singapore)

> [14:32:45] Accessed dark web marketplace

> [14:33:12] Attempted SQL injection (blocked)

> [14:33:30] Downloaded 2.4MB file (encrypted)

> [14:34:01] Created new email account

Network Map
TARGET NETWORK

3 active nodes | 2 anomalies detected

Live Data Feed

> [14:35:01] Scanning ports on 192.168.1.105...

> [14:35:02] Port 22 (SSH) - Open

> [14:35:03] Port 80 (HTTP) - Open

> [14:35:04] Port 443 (HTTPS) - Open

> [14:35:05] WARNING: Unusual traffic pattern detected

> [14:35:06] Analyzing HTTP headers...

> [14:35:07] Server: Apache/2.4.41 (Ubuntu)

> [14:35:08] X-Powered-By: PHP/7.4.3

> [14:35:09] ALERT: Outdated software detected (CVE-2021-3129)

> [14:35:10] Checking for known vulnerabilities...

> [14:35:11] 3 critical vulnerabilities found

> [14:35:12] Cross-referencing with threat database...

> [14:35:13] Match found: Exploit kit "NeonPhantom"

> [14:35:14] TARGET COMPROMISED - Confidence 89%

neon-osint>

Made with DeepSite LogoDeepSite - 🧬 Remix