Define the input
Domain, IP, URL, hash, CVE, archive, or public claim.
Free web tools
This English page mirrors the Turkish free-tools shelf. It lists sources that can be opened from the browser and used as first signals, not as final proof.
20
tools
17
beginner-friendly
passive
default use
Domain, IP, URL, hash, CVE, archive, or public claim.
Use the source family that fits the question.
Write the date, source, and what the result actually shows.
Compare with at least one second source before reporting.
Threat maps
Treat vendor telemetry as situational awareness, not attribution proof.
Threat maps
Treat vendor telemetry as situational awareness, not attribution proof.
Threat maps
Treat vendor telemetry as situational awareness, not attribution proof.
Threat maps
Treat vendor telemetry as situational awareness, not attribution proof.
Threat maps
Use this as an initial signal. Check date, source context, and a second source before reporting.
IOC and threat intelligence
Use this as an initial signal. Check date, source context, and a second source before reporting.
OSINT directories
Use this as an initial signal. Check date, source context, and a second source before reporting.
Threat context
Use this as an initial signal. Check date, source context, and a second source before reporting.
Malware URL feeds
Use this as an initial signal. Check date, source context, and a second source before reporting.
Malware intelligence
Use this as an initial signal. Check date, source context, and a second source before reporting.
Botnet feeds
Use this as an initial signal. Check date, source context, and a second source before reporting.
Vulnerability tracking
Use this as an initial signal. Check date, source context, and a second source before reporting.
Vulnerability tracking
Compare CVE records with vendor advisories before prioritizing.
Vulnerability tracking
Compare CVE records with vendor advisories before prioritizing.
URL, hash, domain, and IP checks
Do not upload private or sensitive files to public scanning services.
Passive internet visibility
Use only as a passive visibility source for owned or authorized assets.
IP context
Use this as an initial signal. Check date, source context, and a second source before reporting.
Domain and DNS history
Use this as an initial signal. Check date, source context, and a second source before reporting.
Certificate transparency
Certificate records can show historical or inactive assets.
Web archives
Archive time is not always the original publication time.
Careful-use note
Free tools change terms, limits, and data quality over time. Use them as starting points. Do not upload sensitive material to public scanning services.
Move checked notes into a report