wtfis


Namewtfis JSON
Version 0.13.0 PyPI version JSON
download
home_pageNone
SummaryPassive hostname, domain and IP lookup tool for non-robots
upload_time2025-07-27 20:37:10
maintainerNone
docs_urlNone
authorNone
requires_python>=3.8
licenseNone
keywords abuseipdb greynoise ipinfo osint passive lookup security shodan urlhaus virustotal whois
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # wtfis

[![Tests](https://github.com/pirxthepilot/wtfis/actions/workflows/tests.yml/badge.svg)](https://github.com/pirxthepilot/wtfis/actions/workflows/tests.yml)
[![PyPI](https://img.shields.io/pypi/v/wtfis?color=blue&logo=pypi&logoColor=gold)](https://pypi.org/project/wtfis/)

Passive hostname, domain and IP lookup tool for non-robots

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/demo.gif?raw=true)

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-ip.png?raw=true)


## WTF is it?

**wtfis** is a commandline tool that gathers information about a domain, FQDN or IP address using various OSINT services. Unlike other tools of its kind, it's built specifically for human consumption, providing results that are pretty (YMMV) and easy to read and understand.

This tool assumes that you are using free tier / community level accounts, and so makes as few API calls as possible to minimize hitting quotas and rate limits.

The project name is a play on "whois".


## Data Sources

| Service | Used in lookup | Required | Free Tier |
| --- | --- | --- | --- |
| [Virustotal](https://virustotal.com) | All | Yes | [Yes](https://www.virustotal.com/gui/join-us) |
| [AbuseIPDB](https://www.abuseipdb.com/)| IP address | No | [Yes](https://www.abuseipdb.com/register?plan=free)
| [Greynoise](https://greynoise.io) | IP address | No | [Yes](https://www.greynoise.io/plans/community)
| [IP2Location](https://www.ip2location.io) | IP address | No | [Yes](https://www.ip2location.io/pricing)
| [IP2Whois](https://www.ip2whois.com) | Domain/FQDN | No | [Yes](https://www.ip2location.io/pricing)
| [IPinfo](https://ipinfo.io) | IP Address | No | Yes (no signup)
| [IPWhois](https://ipwhois.io) | IP address | No | Yes (no signup) |
| [Shodan](https://shodan.io) | IP address | No | [No](https://account.shodan.io/billing) |
| [URLhaus](https://urlhaus.abuse.ch/) | All | No | [Yes](https://urlhaus-api.abuse.ch/#auth_key)

### Virustotal

The primary source of information. Retrieves:

* [Hostname (FQDN), domain or IP](https://developers.virustotal.com/reference/domains-1)
    * Latest analysis stats with vendor detail
    * Reputation score (based on VT community votes)
    * Popularity ranks (Alexa, Cisco Umbrella, etc.) (FQDN and domain only)
    * Categories (assigned by different vendors)
* [Resolutions](https://developers.virustotal.com/reference/domain-resolutions) (FQDN and domain only)
    * Last n IP addresses (default: 3, max: 10)
    * Latest analysis stats of each IP above
* [Whois](https://developers.virustotal.com/reference/whois)
    * Fallback only: if IP2Whois creds are not available
    * Various whois data about the domain itself

### AbuseIPDB

[AbuseIPDB](https://www.abuseipdb.com/) is a crowd-sourced database of reported malicious IP addresses. Through its API wtfis shows:

* Abuse confidence score (0-100)
* Number of reports

### IP2Location

Alternative Geolocation and ASN lookup source for IP addresses (default is IPWhois). Retrieves:

* Geolocation
* ASN and Org
* Proxy (True or False)

IP2Whois and IP2Location are different features from the same service, so you only need to sign up once. The API key can then be used for both lookups.

### IP2Whois

Optionally used if creds are provided. Retrieves:

* [Whois](https://www.ip2location.io/ip2whois-documentation)
    * Various whois data about the domain itself

IP2Whois is recommended over Virustotal for whois data for a couple of reasons:

* VT whois data format is less consistent
* IP2Whois whois data tends to be of better quality than VT. Also, VT's registrant data is apparently [anonymized](https://developers.virustotal.com/reference/whois).
* You can save one VT API call by offloading to IP2Whois.

### IPinfo

Another alternative Geolocation and ASN lookup source for IP addresses. Retrieves:

* Geolocation
* ASN and Org
* Hostname
* Anycast (true or false)

### IPWhois

Default Geolocation and ASN lookup source for IP addresses. Retrieves:

* Geolocation
* ASN, Org and ISP
* Domain

IPWhois should not be confused with IP2Whois, which provides domain Whois data.

### Greynoise

Using Greynoise's [community API](https://docs.greynoise.io/docs/using-the-greynoise-community-api), wtfis will show whether an IP is in one of Greynoise's datasets:

* **Noise**: IP has been seen regularly scanning the Internet
* **RIOT**: IP belongs to a common business application (e.g. Microsoft O365, Google Workspace, Slack)

More information about the datasets [here](https://docs.greynoise.io/docs/understanding-greynoise-data-sets).

In addition, the API also returns Greynoise's [classification](https://docs.greynoise.io/docs/understanding-greynoise-classifications) of an IP (if available). Possible values are **benign**, **malicious**, and **unknown**.

### Shodan

GETs data from the `/shodan/host/{ip}` endpoint (see [doc](https://developer.shodan.io/api)). For each IP, retrieves:

* List of open ports and services
* Operating system (if available)
* Tags (assigned by Shodan)

### URLhaus

[URLhaus](https://urlhaus.abuse.ch/) is a crowd-sourced database of reported malicious URLs. This enrichment provides insight on whether the queried hostname or IP is being or was used for malware distribution via HTTP or HTTPS. Data that is provided include:

* Count of currently online and total malware URLs
* Whether the hostname or IP is currently in the [DNSBL](https://www.dnsbl.info/) and [SURBL](https://www.surbl.org/) public blocklists
* All tags that have been assigned to the URL throughout its history in the URLhaus database


## Install

```
$ pip install wtfis
```

To install via `conda` (from conda-forge), see [wtfis-feedstock](https://github.com/conda-forge/wtfis-feedstock).

To install via [`brew`](https://brew.sh):

```
brew install wtfis
```


## Setup

wtfis uses these environment variables:

* `VT_API_KEY` (required) - Virustotal API key
* `ABUSEIPDB_API_KEY` (optional) - AbuseIPDB API key
* `IP2LOCATION_API_KEY` (optional) - IP2Location API key
* `IP2WHOIS_API_KEY` (optional) - IP2Whois API key
* `GREYNOISE_API_KEY` (optional) - Greynoise API key
* `SHODAN_API_KEY` (optional) - Shodan API key
* `URLHAUS_API_KEY` (optional) - URLhaus API key
* `WTFIS_DEFAULTS` (optional) - Default boolean arguments
* `GEOLOCATION_SERVICE` (optional) - Geolocation / ASN lookup service to use

Set these using your own method.

Alternatively, create a file in your home directory `~/.env.wtfis` with the above options. See [.env.wtfis.example](./.env.wtfis.example) for a template. **NOTE: Don't forget to `chmod 400` the file!**


## Usage

```
usage: wtfis [-h] [-A] [-s] [-g] [-a] [-u] [-m N] [-n] [-1] [-V] [--geolocation-service {ip2location,ipinfo,ipwhois}] entity

positional arguments:
  entity                Hostname, domain or IP

options:
  -h, --help            show this help message and exit
  -A, --all             Enable all possible enrichments
  -s, --use-shodan      Use Shodan to enrich IPs
  -g, --use-greynoise   Enable Greynoise for IPs
  -a, --use-abuseipdb   Enable AbuseIPDB for IPs
  -u, --use-urlhaus     Enable URLhaus for IPs and domains
  -m N, --max-resolutions N
                        Maximum number of resolutions to show (default: 3)
  -n, --no-color        Show output without colors
  -1, --one-column      Display results in one column
  -V, --version         Print version number
  --geolocation-service {ip2location,ipinfo,ipwhois}
                        Geolocation service to use (default: ipwhois)
```

Basically:

```
$ wtfis FQDN_OR_DOMAIN_OR_IP
```

and you will get results organized by panel, similar to the image above.

Defanged input is accepted (e.g. `api[.]google[.]com`).

If the terminal supports it, certain fields and headings are clickable hyperlinks that point to the respective services' websites.

### All enrichments

Instead of specifying each enrichment flag individually, you can use the `-A` / `--all` flag to enable all of them, where possible. This flag is mutually exclusive with the `--use-*` flags.

### AbuseIPDB

Use the `-a` or `--use-abuseipdb` flag to enable AbuseIPDB enrichment for hostnames, domains and IPs.

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-abuseipdb.png?raw=true)

The `AbuseIPDB` field name is a hyperlink (if terminal-supported) that takes you to the specific AbuseIPDB database page for your query.

### Greynoise

To enable Greynoise, invoke with the `-g` or `--use-greynoise` flag. Because the API quota is quite low (50 requests per week as of March 2023), this lookup is off by default.

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-greynoise.png?raw=true)

The `GreyNoise` field name is also a hyperlink (if terminal-supported) that points to the IP entry in the Greynoise web interface, where more context is shown.

### Shodan

Shodan can be used to show an IP's open ports or services, and OS in some results. Invoke with the `-s` or `--use-shodan` flag.

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-shodan.png?raw=true)

If supported by the terminal, the `Services` field is a clickable hyperlink that takes you to the Shodan web interface.

### URLhaus

Use the `-u` or `--use-urlhaus` flag to enable URLhaus enrichment for hostnames, domains and IPs.

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-urlhaus.png?raw=true)

The `Malware URLs` field name is a hyperlink (if terminal-supported) that takes you to the specific URLhaus database page for your query.

### Display options

For FQDN and domain lookups, you can increase or decrease the maximum number of displayed IP resolutions with `-m NUMBER` or `--max-resolutions=NUMBER`. The upper limit is 10. If you don't need resolutions at all, set the number to `0`.

To show all panels in one column, use the `-1` or `--one-column` flag.

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-one-column.png?raw=true)

Panels can be displayed with no color with `-n` or `--no-color`. 

![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-no-color.png?raw=true)

### Defaults

Default arguments can be defined by setting the `WTFIS_DEFAULTS` environment variable. For example, to use shodan and display results in one column by default:

```
WTFIS_DEFAULTS=-s -1
```

If an argument is in `WTFIS_DEFAULTS`, then specifying the same argument during command invocation **negates** that argument. So in the example above, if you then run:

```
$ wtfis example.com -s
```

then Shodan will NOT be used.

Note that maximum resolutions (`-m N, --max-resolutions N`) cannot be defined in defaults at the moment.


### Changing the IP geolocation and ASN provider

The recommended way to change this is by setting the `GEOLOCATION_SERVICE` variable. For example, to use IPinfo:

```
GEOLOCATION_SERVICE=ipinfo
```

Alternatively, set the `--geolocation-service` at command invocation:

```
$ wtfis --geolocation-service=ipinfo 1.1.1.1
```

If both of the above are set, the commandline flag takes precedence.


## Docker

wtfis can be run from a Docker image. First, build the image (using the included [Dockerfile](./Dockerfile)) by running:

```
$ make docker-image
```

The image will have the latest _tagged_ version (not necessarily from the latest commit) wtfis. This ensures that you are getting a stable release.

Two ways you can run the image:

Ensure `.env.wtfis` is in your home directory and set with the necessary envvars. Then simply run:

```
$ make docker-run
```

This is an alias to

```
$ docker run --env-file=${HOME}/.env.wtfis -it wtfis
```

Note that each definition must NOT have any spaces before and after the equal sign (`FOO=bar`, not `FOO = bar`).

Altenatively, you can set the environment variables yourself, then run, e.g.:

```
$ docker run -e VT_API_KEY -e SHODAN_API_KEY -it wtfis
```

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "wtfis",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": "abuseipdb, greynoise, ipinfo, osint, passive lookup, security, shodan, urlhaus, virustotal, whois",
    "author": null,
    "author_email": "pirxthepilot <pirxthepilot@users.noreply.github.com>",
    "download_url": "https://files.pythonhosted.org/packages/52/ca/d0d14844dbb54444318843b8e346ba3b8aa3fc6f8d2f4fcd474e7d5f3291/wtfis-0.13.0.tar.gz",
    "platform": null,
    "description": "# wtfis\n\n[![Tests](https://github.com/pirxthepilot/wtfis/actions/workflows/tests.yml/badge.svg)](https://github.com/pirxthepilot/wtfis/actions/workflows/tests.yml)\n[![PyPI](https://img.shields.io/pypi/v/wtfis?color=blue&logo=pypi&logoColor=gold)](https://pypi.org/project/wtfis/)\n\nPassive hostname, domain and IP lookup tool for non-robots\n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/demo.gif?raw=true)\n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-ip.png?raw=true)\n\n\n## WTF is it?\n\n**wtfis** is a commandline tool that gathers information about a domain, FQDN or IP address using various OSINT services. Unlike other tools of its kind, it's built specifically for human consumption, providing results that are pretty (YMMV) and easy to read and understand.\n\nThis tool assumes that you are using free tier / community level accounts, and so makes as few API calls as possible to minimize hitting quotas and rate limits.\n\nThe project name is a play on \"whois\".\n\n\n## Data Sources\n\n| Service | Used in lookup | Required | Free Tier |\n| --- | --- | --- | --- |\n| [Virustotal](https://virustotal.com) | All | Yes | [Yes](https://www.virustotal.com/gui/join-us) |\n| [AbuseIPDB](https://www.abuseipdb.com/)| IP address | No | [Yes](https://www.abuseipdb.com/register?plan=free)\n| [Greynoise](https://greynoise.io) | IP address | No | [Yes](https://www.greynoise.io/plans/community)\n| [IP2Location](https://www.ip2location.io) | IP address | No | [Yes](https://www.ip2location.io/pricing)\n| [IP2Whois](https://www.ip2whois.com) | Domain/FQDN | No | [Yes](https://www.ip2location.io/pricing)\n| [IPinfo](https://ipinfo.io) | IP Address | No | Yes (no signup)\n| [IPWhois](https://ipwhois.io) | IP address | No | Yes (no signup) |\n| [Shodan](https://shodan.io) | IP address | No | [No](https://account.shodan.io/billing) |\n| [URLhaus](https://urlhaus.abuse.ch/) | All | No | [Yes](https://urlhaus-api.abuse.ch/#auth_key)\n\n### Virustotal\n\nThe primary source of information. Retrieves:\n\n* [Hostname (FQDN), domain or IP](https://developers.virustotal.com/reference/domains-1)\n    * Latest analysis stats with vendor detail\n    * Reputation score (based on VT community votes)\n    * Popularity ranks (Alexa, Cisco Umbrella, etc.) (FQDN and domain only)\n    * Categories (assigned by different vendors)\n* [Resolutions](https://developers.virustotal.com/reference/domain-resolutions) (FQDN and domain only)\n    * Last n IP addresses (default: 3, max: 10)\n    * Latest analysis stats of each IP above\n* [Whois](https://developers.virustotal.com/reference/whois)\n    * Fallback only: if IP2Whois creds are not available\n    * Various whois data about the domain itself\n\n### AbuseIPDB\n\n[AbuseIPDB](https://www.abuseipdb.com/) is a crowd-sourced database of reported malicious IP addresses. Through its API wtfis shows:\n\n* Abuse confidence score (0-100)\n* Number of reports\n\n### IP2Location\n\nAlternative Geolocation and ASN lookup source for IP addresses (default is IPWhois). Retrieves:\n\n* Geolocation\n* ASN and Org\n* Proxy (True or False)\n\nIP2Whois and IP2Location are different features from the same service, so you only need to sign up once. The API key can then be used for both lookups.\n\n### IP2Whois\n\nOptionally used if creds are provided. Retrieves:\n\n* [Whois](https://www.ip2location.io/ip2whois-documentation)\n    * Various whois data about the domain itself\n\nIP2Whois is recommended over Virustotal for whois data for a couple of reasons:\n\n* VT whois data format is less consistent\n* IP2Whois whois data tends to be of better quality than VT. Also, VT's registrant data is apparently [anonymized](https://developers.virustotal.com/reference/whois).\n* You can save one VT API call by offloading to IP2Whois.\n\n### IPinfo\n\nAnother alternative Geolocation and ASN lookup source for IP addresses. Retrieves:\n\n* Geolocation\n* ASN and Org\n* Hostname\n* Anycast (true or false)\n\n### IPWhois\n\nDefault Geolocation and ASN lookup source for IP addresses. Retrieves:\n\n* Geolocation\n* ASN, Org and ISP\n* Domain\n\nIPWhois should not be confused with IP2Whois, which provides domain Whois data.\n\n### Greynoise\n\nUsing Greynoise's [community API](https://docs.greynoise.io/docs/using-the-greynoise-community-api), wtfis will show whether an IP is in one of Greynoise's datasets:\n\n* **Noise**: IP has been seen regularly scanning the Internet\n* **RIOT**: IP belongs to a common business application (e.g. Microsoft O365, Google Workspace, Slack)\n\nMore information about the datasets [here](https://docs.greynoise.io/docs/understanding-greynoise-data-sets).\n\nIn addition, the API also returns Greynoise's [classification](https://docs.greynoise.io/docs/understanding-greynoise-classifications) of an IP (if available). Possible values are **benign**, **malicious**, and **unknown**.\n\n### Shodan\n\nGETs data from the `/shodan/host/{ip}` endpoint (see [doc](https://developer.shodan.io/api)). For each IP, retrieves:\n\n* List of open ports and services\n* Operating system (if available)\n* Tags (assigned by Shodan)\n\n### URLhaus\n\n[URLhaus](https://urlhaus.abuse.ch/) is a crowd-sourced database of reported malicious URLs. This enrichment provides insight on whether the queried hostname or IP is being or was used for malware distribution via HTTP or HTTPS. Data that is provided include:\n\n* Count of currently online and total malware URLs\n* Whether the hostname or IP is currently in the [DNSBL](https://www.dnsbl.info/) and [SURBL](https://www.surbl.org/) public blocklists\n* All tags that have been assigned to the URL throughout its history in the URLhaus database\n\n\n## Install\n\n```\n$ pip install wtfis\n```\n\nTo install via `conda` (from conda-forge), see [wtfis-feedstock](https://github.com/conda-forge/wtfis-feedstock).\n\nTo install via [`brew`](https://brew.sh):\n\n```\nbrew install wtfis\n```\n\n\n## Setup\n\nwtfis uses these environment variables:\n\n* `VT_API_KEY` (required) - Virustotal API key\n* `ABUSEIPDB_API_KEY` (optional) - AbuseIPDB API key\n* `IP2LOCATION_API_KEY` (optional) - IP2Location API key\n* `IP2WHOIS_API_KEY` (optional) - IP2Whois API key\n* `GREYNOISE_API_KEY` (optional) - Greynoise API key\n* `SHODAN_API_KEY` (optional) - Shodan API key\n* `URLHAUS_API_KEY` (optional) - URLhaus API key\n* `WTFIS_DEFAULTS` (optional) - Default boolean arguments\n* `GEOLOCATION_SERVICE` (optional) - Geolocation / ASN lookup service to use\n\nSet these using your own method.\n\nAlternatively, create a file in your home directory `~/.env.wtfis` with the above options. See [.env.wtfis.example](./.env.wtfis.example) for a template. **NOTE: Don't forget to `chmod 400` the file!**\n\n\n## Usage\n\n```\nusage: wtfis [-h] [-A] [-s] [-g] [-a] [-u] [-m N] [-n] [-1] [-V] [--geolocation-service {ip2location,ipinfo,ipwhois}] entity\n\npositional arguments:\n  entity                Hostname, domain or IP\n\noptions:\n  -h, --help            show this help message and exit\n  -A, --all             Enable all possible enrichments\n  -s, --use-shodan      Use Shodan to enrich IPs\n  -g, --use-greynoise   Enable Greynoise for IPs\n  -a, --use-abuseipdb   Enable AbuseIPDB for IPs\n  -u, --use-urlhaus     Enable URLhaus for IPs and domains\n  -m N, --max-resolutions N\n                        Maximum number of resolutions to show (default: 3)\n  -n, --no-color        Show output without colors\n  -1, --one-column      Display results in one column\n  -V, --version         Print version number\n  --geolocation-service {ip2location,ipinfo,ipwhois}\n                        Geolocation service to use (default: ipwhois)\n```\n\nBasically:\n\n```\n$ wtfis FQDN_OR_DOMAIN_OR_IP\n```\n\nand you will get results organized by panel, similar to the image above.\n\nDefanged input is accepted (e.g. `api[.]google[.]com`).\n\nIf the terminal supports it, certain fields and headings are clickable hyperlinks that point to the respective services' websites.\n\n### All enrichments\n\nInstead of specifying each enrichment flag individually, you can use the `-A` / `--all` flag to enable all of them, where possible. This flag is mutually exclusive with the `--use-*` flags.\n\n### AbuseIPDB\n\nUse the `-a` or `--use-abuseipdb` flag to enable AbuseIPDB enrichment for hostnames, domains and IPs.\n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-abuseipdb.png?raw=true)\n\nThe `AbuseIPDB` field name is a hyperlink (if terminal-supported) that takes you to the specific AbuseIPDB database page for your query.\n\n### Greynoise\n\nTo enable Greynoise, invoke with the `-g` or `--use-greynoise` flag. Because the API quota is quite low (50 requests per week as of March 2023), this lookup is off by default.\n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-greynoise.png?raw=true)\n\nThe `GreyNoise` field name is also a hyperlink (if terminal-supported) that points to the IP entry in the Greynoise web interface, where more context is shown.\n\n### Shodan\n\nShodan can be used to show an IP's open ports or services, and OS in some results. Invoke with the `-s` or `--use-shodan` flag.\n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-shodan.png?raw=true)\n\nIf supported by the terminal, the `Services` field is a clickable hyperlink that takes you to the Shodan web interface.\n\n### URLhaus\n\nUse the `-u` or `--use-urlhaus` flag to enable URLhaus enrichment for hostnames, domains and IPs.\n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-urlhaus.png?raw=true)\n\nThe `Malware URLs` field name is a hyperlink (if terminal-supported) that takes you to the specific URLhaus database page for your query.\n\n### Display options\n\nFor FQDN and domain lookups, you can increase or decrease the maximum number of displayed IP resolutions with `-m NUMBER` or `--max-resolutions=NUMBER`. The upper limit is 10. If you don't need resolutions at all, set the number to `0`.\n\nTo show all panels in one column, use the `-1` or `--one-column` flag.\n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-one-column.png?raw=true)\n\nPanels can be displayed with no color with `-n` or `--no-color`. \n\n![](https://github.com/pirxthepilot/wtfis/blob/main/imgs/example-no-color.png?raw=true)\n\n### Defaults\n\nDefault arguments can be defined by setting the `WTFIS_DEFAULTS` environment variable. For example, to use shodan and display results in one column by default:\n\n```\nWTFIS_DEFAULTS=-s -1\n```\n\nIf an argument is in `WTFIS_DEFAULTS`, then specifying the same argument during command invocation **negates** that argument. So in the example above, if you then run:\n\n```\n$ wtfis example.com -s\n```\n\nthen Shodan will NOT be used.\n\nNote that maximum resolutions (`-m N, --max-resolutions N`) cannot be defined in defaults at the moment.\n\n\n### Changing the IP geolocation and ASN provider\n\nThe recommended way to change this is by setting the `GEOLOCATION_SERVICE` variable. For example, to use IPinfo:\n\n```\nGEOLOCATION_SERVICE=ipinfo\n```\n\nAlternatively, set the `--geolocation-service` at command invocation:\n\n```\n$ wtfis --geolocation-service=ipinfo 1.1.1.1\n```\n\nIf both of the above are set, the commandline flag takes precedence.\n\n\n## Docker\n\nwtfis can be run from a Docker image. First, build the image (using the included [Dockerfile](./Dockerfile)) by running:\n\n```\n$ make docker-image\n```\n\nThe image will have the latest _tagged_ version (not necessarily from the latest commit) wtfis. This ensures that you are getting a stable release.\n\nTwo ways you can run the image:\n\nEnsure `.env.wtfis` is in your home directory and set with the necessary envvars. Then simply run:\n\n```\n$ make docker-run\n```\n\nThis is an alias to\n\n```\n$ docker run --env-file=${HOME}/.env.wtfis -it wtfis\n```\n\nNote that each definition must NOT have any spaces before and after the equal sign (`FOO=bar`, not `FOO = bar`).\n\nAltenatively, you can set the environment variables yourself, then run, e.g.:\n\n```\n$ docker run -e VT_API_KEY -e SHODAN_API_KEY -it wtfis\n```\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Passive hostname, domain and IP lookup tool for non-robots",
    "version": "0.13.0",
    "project_urls": {
        "Homepage": "https://github.com/pirxthepilot/wtfis"
    },
    "split_keywords": [
        "abuseipdb",
        " greynoise",
        " ipinfo",
        " osint",
        " passive lookup",
        " security",
        " shodan",
        " urlhaus",
        " virustotal",
        " whois"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "dcce268db193238e2b67437497f4ecd3be17966635d9abe5b7794a9aa2fcfa06",
                "md5": "2f7d196fa416899a5ebd88137d93c5ef",
                "sha256": "ad14486b8315000276fe495d2a7182933c0eaaba4e379d4801270c1038382e1d"
            },
            "downloads": -1,
            "filename": "wtfis-0.13.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "2f7d196fa416899a5ebd88137d93c5ef",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 38711,
            "upload_time": "2025-07-27T20:37:09",
            "upload_time_iso_8601": "2025-07-27T20:37:09.767899Z",
            "url": "https://files.pythonhosted.org/packages/dc/ce/268db193238e2b67437497f4ecd3be17966635d9abe5b7794a9aa2fcfa06/wtfis-0.13.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "52cad0d14844dbb54444318843b8e346ba3b8aa3fc6f8d2f4fcd474e7d5f3291",
                "md5": "2945d167d44ed1b5a53baea0181e5a02",
                "sha256": "44169d937373e8f34d919c86c3ad71c1fc08b5e06a02a853f6fe5990aba99cff"
            },
            "downloads": -1,
            "filename": "wtfis-0.13.0.tar.gz",
            "has_sig": false,
            "md5_digest": "2945d167d44ed1b5a53baea0181e5a02",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 588628,
            "upload_time": "2025-07-27T20:37:10",
            "upload_time_iso_8601": "2025-07-27T20:37:10.973354Z",
            "url": "https://files.pythonhosted.org/packages/52/ca/d0d14844dbb54444318843b8e346ba3b8aa3fc6f8d2f4fcd474e7d5f3291/wtfis-0.13.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-07-27 20:37:10",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "pirxthepilot",
    "github_project": "wtfis",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "wtfis"
}
        
Elapsed time: 1.03128s