Skip to content

NetSpecterOpen Source OSINT & Recon

Passive intelligence gathering in your browser. No install. No account. No configuration. Completely free.

NetSpecterNetSpecter

What is NetSpecter? โ€‹

NetSpecter is a free, open source OSINT and passive reconnaissance tool that runs entirely in your browser. Enter any domain name or IP address and run eleven intelligence modules instantly - from DNS record analysis to live TLS grading to Shodan port data.

There is nothing to install. No account to create. No API keys to manage. Everything runs client-side using free public APIs.

It was built for security researchers, IT professionals, journalists, fraud investigators, and anyone who needs to quickly understand the infrastructure behind a domain.


Why passive recon? โ€‹

Passive reconnaissance means gathering intelligence without directly interacting with the target's systems. NetSpecter only queries public data sources - DNS servers, certificate transparency logs, WHOIS databases, and third-party intelligence platforms.

This approach has two advantages. First, it leaves no trace on the target's infrastructure. Second, it is legal to perform against any domain, because you are only querying public records that anyone can access.

Active techniques like port scanning or web crawling are outside NetSpecter's scope by design.


Quick start โ€‹

  1. Open NetSpecter
  2. Enter a domain name (e.g. example.com) or IP address in the input field
  3. Select a module from the tab bar
  4. Press [ SCAN ] or hit Enter

For a complete picture of a domain, select FULL SCAN to run all eleven modules in sequence with an automated risk summary at the end.


Who is it for? โ€‹

Use caseHow NetSpecter helps
Security researchersRapid passive triage of unknown domains
IT and sysadminAudit your own infrastructure's public exposure
Fraud investigatorsIdentify suspicious domain patterns and fake infrastructure
JournalistsVerify the legitimacy of companies and online operations
StudentsLearn how DNS, TLS, and email security work in practice
Bug bounty huntersMap attack surface before engaging a target

Responsible use โ€‹

NetSpecter performs passive reconnaissance only. It queries public data sources on your behalf - DNS servers, certificate transparency logs, WHOIS databases, and third-party intelligence platforms. No credentials or API keys are required from you as a user.

No active exploitation, injection, or unauthorised access is performed at any point.

Only scan domains and IP addresses you own, or that you have explicit written permission to test. The authors accept no responsibility for misuse.


Support the project โ€‹

NetSpecter is free and always will be. If it saved you time or helped with an investigation, consider supporting development.

ko-fi

Released under the MIT License.