✓ 100% PASSIVE OSINT — NO ACTIVE SCANNING — NO PACKETS SENT TO TARGET
QUICK TEST:
8.8.8.8
1.1.1.1
185.220.101.1
45.33.32.156
104.16.0.1
192.168.1.1
0.0.0.0
INITIALIZING SCAN...
⚠
Analysis failed.
—
—
CLEANLINESS SCORE
—
/ 100
—
Awaiting analysis...
🛡Threat Indicators
IP Identification
🌍Geolocation
🌐Network / ASN
⚙IP Properties
📍Location Map
LAT: — / LON: —
🔍Reverse DNS / PTR
🏢ISP / Organization
Privacy & Anonymization Detection
🔒VPN / Proxy Detection
🧅Tor / Dark Web
☁Datacenter / Hosting
Reputation & Fraud Analysis
🚨Abuse Score
🍯Honeypot
📋Blocklists
🔐Fraud Risk
⚡Abuse Categories
📊Risk Category Scores
DNS Intelligence
📡DNS Records
🔗Associated Domains
🛡DNSBL Checks
Network Security Analysis
🔌Known Open Ports (Shodan Passive)
🗺BGP / Routing
Analysis Sources (25+)
📦API Sources Status
SOURCE
CATEGORY
STATUS
DATA RETRIEVED
CONFIDENCE
WHOIS / Registry Data
📃WHOIS Data
Loading...
🔖Registration Details
Historical Intelligence
🕐Incident Timeline
📈Threat History
⚠ IPSENTINEL uses exclusively passive, public OSINT sources. No active port scanning, no active probing, no packets sent to the target IP.
All data is retrieved from third-party APIs that have already indexed or recorded the information independently.
Port/service data comes solely from the Shodan InternetDB passive index.
Sources: ip-api.com · ipinfo.io · ipwho.is · freeipapi.com · iplocate.io · country.is · geoplugin.net · ipapi.is ·
bgpview.io · HackerTarget (rDNS, ASN, GeoIP, DNS, Subnet — passive lookups only) ·
RDAP ARIN/RIPE/LACNIC/APNIC · Shodan InternetDB (passive index) · GreyNoise Community ·
URLhaus Abuse.ch · AbuseIPDB (public) · ProxyCheck.io (free) · Tor Project exit list ·
DNSBL multi-check · ipify — Results for informational / research purposes only.