SecurityTrails Integrations and SDKs

Fetch our domain, IP and WHOIS data from your own applications. Integrations help you to get started.

Third-party Integrations

Haktrails

Haktrails

Haktrails is the official CLI client for querying SecurityTrails API data, written by hakluke.

Spiderfoot

SpiderFoot

SpiderFoot automates OSINT to find out everything about your target.

Splunk

Splunk Add-On

Provides a method to use Splunk Adaptive Response to automate lookup of a Domain or IP address against the SecurityTrails API.

Intrigue.io

Intrigue.io

Intrigue makes it easy to discover information about your attack surface connected to the Internet.

Cortex XSOAR

Cortex XSOAR

This integration brings SecurityTrails API access to the XSOAR platform.

Cisco SecureX

Cisco SecureX

Cisco SecureX is a cloud platform that integrates the SecurityTrails API to enrich its threat response ecosystem.

AMASS

AMASS

This project uses the SecurityTrails API to perform advanced network mapping and attack surface analysis.

theHarvester

theHarvester

An effective theHarvester + SecurityTrails API integration for information gathering tasks.

MISP

MISP - Open Source Threat Intelligence

An expansion module that queries SecurityTrails API services.

Cortex Analyzer

Cortex Analyzer (Beta)

Cortex Analyzer for SecurityTrails.

ExTrails

ExTrails

This API client for SecurityTrails works as both a standalone CLI or as an Elixir application client.

PhantomSecurity.js

Phantom Cyber (Beta)

Phantom Cyber app for Security Trails.

Subfinder

Subfinder

Terminal-based infosec tool that uses the SecurityTrails API to find subdomains.

Ukemi

Ukemi

CLI-based tool to query the SecurityTrails passive DNS services.

Mihari

Mihari

OSINT tool that uses the SecurityTrails API to run information gathering queries & manage results continuously.

R language

R language

SecurityTrails API integration with R programming language.

Subdomain Enumerator

Subdomain Enumerator

A python-based tool to enumerate subdomains, check for CNAME records inside them, and find stale DNS records.

harpoon

harpoon

OSINT Threat Intelligence CLI tool that integrates the SecurityTrails API™

Pown Recon

Pown Recon

Reconnaissance framework that uses the SecurityTrails domain intelligence to enrich its results.

IntelOwl

IntelOwl

IntelOwl integrates the SecurityTrails API™ to boost domain and IP recon.

Findomain

Findomain

The perfect solution for domain recon, integrated with the SecurityTrails API™.

ReconPi

ReconPi

A fast recon tool that integrates the SecurityTrails API™ to helps researchers with intelligence gathering using a Raspberry Pi.

"SecurityTrails solves the headache of accurately mapping a company's footprint with data you can't find anywhere else. If you are a security analyst or developer, you will get tremendous value from the most current domain intel through their API."

Bill Ladd | Recorded Future

"The SecurityTrails API was not only easy to integrate but the richness of the data really elevated the capabilities of SpiderFoot."

Steve Micallef | Spiderfoot

"We spent a ton of time and effort building out our own domain lists, but we gave up when we found SecurityTrails – the data was better than anything else we've seen, and allowed us to focus on our core product."

Ben Dowling | IPinfo.IO

"We were dreading parsing and storing WHOIS and DNS data until we found SecurityTrailsAPI. We integrated in just a day."

Jonathan Weber | AbuseIPDB

"The wealth of information really is incredible and available through a great API."

Todd Robinson | InMotionHosting

"SecurityTrails is my source of truth when it comes to threat hunting and research. The speed of the API is crazy and the integrations with automation tools and SIEM tools makes it an easy choice."

Mickey Perre | Splunk

Supported programming languages

c c++ Ruby java javasript Perl php node JS Python Go

And any other programming language that can perform HTTPS requests

Service Disruption

API, SurfaceBrowser
Feb 4th, 04:22 PM

Test status - UPDATED

“ Identifying the issue ”
impact: none | status: identified
API, Feeds
Feb 4th, 04:19 PM

Api and Feeds pages effected

“ Investigating the issue with the Api ”
impact: minor | status: investigating
Corporate Website
Jan 27th, 12:01 PM

Main site minor issue

“ Site test issue that was identified and in the process of resolution. Our staff is working to mitigate the issue. ”
impact: minor | status: identified