72%
Of threat intel teams use at least three OSINT platforms concurrently, per SANS CTI Survey 2025
15 min
Average time a new exploit PoC is indexed by Shodan after public disclosure
600M+
Internet-exposed devices indexed by Shodan as of 2026
43%
Of initial access techniques in enterprise intrusions leveraged internet exposure data attackers gathered via OSINT

Open source intelligence is not just recon — for threat intelligence teams it is the primary signal layer for tracking adversary infrastructure, correlating IOCs, and understanding your organization's external exposure from the same perspective attackers use. The problem is that the OSINT tooling market is fragmented across free community tools, SaaS platforms, and API-first data providers that each cover a different slice of the attack surface.

This guide is written for CTI analysts, SOC leads, and red teamers who already understand what OSINT is and need a rigorous framework for choosing among the real contenders. We evaluate each tool on the criteria that actually matter in production: data freshness, source breadth, API accessibility, operational security for the analyst, and realistic cost per seat.

How to Evaluate OSINT Tools for Threat Intelligence Work

The core evaluation criteria for CTI-focused OSINT differ from general recon use cases. Attackers optimize for speed and breadth; defenders optimize for context, attribution confidence, and the ability to integrate findings into SIEM and TIP workflows without exposing analyst identity.

Five criteria should drive your selection: data freshness (how recently was the target indexed, and does staleness undermine the intelligence value); source breadth (does the tool cover passive DNS, certificate transparency, BGP routing, banner data, and darknet mentions, or only one layer); API accessibility (can findings flow into your TIP or SOAR automatically, or is every pivot manual); OPSEC posture (does querying leave a trace visible to the target, particularly for Maltego transforms and active scanning modules); and cost modeling per analyst seat versus per-query pricing that makes high-volume work prohibitive.

For most CTI programs, the answer is not one tool but a deliberate stack: a passive indexing platform for exposure queries, a graph tool for relationship pivoting, a noise-context provider to suppress scanner traffic from alerts, and a free-tier community framework for ad hoc lookups.

Data freshness and indexing cadence

Stale exposure data produces false confidence. Shodan re-scans the entire internet every 30 days on average; Censys runs continuous scans with higher per-target frequency on critical ports.

API depth and TIP integration

Manual pivot workflows do not scale. Prioritize platforms with documented REST APIs and pre-built connectors for MISP, OpenCTI, Anomali, or your SOAR.

OPSEC for the analyst

Active transforms in Maltego and direct Shodan queries can trigger server-side logging that reveals investigator IP addresses. Use VPN or Tor-routed API calls for sensitive target queries.

Source coverage across layers

No single platform covers all intelligence layers. Map your coverage gaps: passive DNS, cert transparency, BGP, dark web, paste sites, and code repositories each require different tools.

Cost at production query volumes

Per-query pricing models become expensive at scale. Model costs at 10x your current query volume to account for automation and junior analyst usage.

Shodan vs. Censys: Internet Exposure Intelligence

Shodan and Censys both index internet-exposed services, but they diverge meaningfully in scan methodology, data model, and use case fit.

Shodan is the default choice for most CTI teams. Its interface is the most widely understood, its query syntax is intuitive, and its coverage extends beyond traditional IT infrastructure to include ICS/SCADA devices, webcams, and industrial control systems. Shodan alerts let analysts monitor when specific banners, certificates, or hostnames appear or change, which is directly applicable to tracking adversary infrastructure. The Shodan Honeyscore and Malware Hunter modules add threat context unavailable in Censys. API access on the Membership plan ($69/month) supports automation up to 10,000 results per query.

Censys has a structural advantage in certificate data. Its certificate transparency log integration is more comprehensive than Shodan's, making it the stronger choice for discovering phishing infrastructure and typosquat domains before they are weaponized. Censys Attack Surface Management (ASM) adds organizational asset discovery context that helps map your own external footprint from the adversary perspective. For enterprise programs running both offensive exposure assessment and defensive CTI, Censys ASM justifies its higher price point. The free tier is more limited than Shodan's for API access.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

GreyNoise: Filtering Scanner Noise from Actionable Threats

GreyNoise occupies a distinct niche that every SOC and CTI team should understand: it tells you which IP addresses are conducting mass internet scanning, which means it tells you which alerts in your SIEM are noise versus targeted activity.

When an IP appears in your logs, GreyNoise classifies it as benign (known research scanners like Shodan, Censys, and security vendors), malicious (known attack infrastructure), or unclassified. For SOC analysts drowning in scanner-generated alerts, GreyNoise integration with SIEM platforms reduces alert volume by 20 to 40 percent in environments where internet exposure is broad. For CTI analysts, GreyNoise's RIOT dataset identifies benign business services (Google, Microsoft, AWS) that generate high alert volumes but represent no threat.

GreyNoise is not a replacement for Shodan or Censys — it does not index the full internet. Its value is specifically in enriching IP-based indicators with behavioral context. The Community tier is free with rate limits adequate for individual analyst use. The Enterprise tier adds bulk enrichment APIs critical for SOAR playbook automation.

Maltego: Graph-Based Relationship Intelligence

Maltego is the standard tool for relationship-based intelligence work: building entity graphs that connect IP addresses, domains, email addresses, individuals, organizations, and malware samples through automated data transforms.

Its core strength is the transform ecosystem. Over 300 data sources — including Shodan, VirusTotal, Have I Been Pwned, PassiveTotal, Recorded Future, and dozens of OSINT APIs — can be queried through a single graph interface. An analyst investigating a phishing domain can pivot from domain to registrar to registrant email to associated domains to IP history to ASN to peer infrastructure, all within the same canvas without manually querying each source.

The OPSEC caution: Maltego transforms that query third-party services send the query target as a parameter. If you are pivoting on an adversary-controlled infrastructure domain, the transform query may appear in that domain's server logs, alerting a sophisticated threat actor that they are under investigation. Analysts working sensitive attribution cases should use API-based queries through anonymizing infrastructure rather than running transforms directly from analyst workstations.

Cost is the primary barrier. Maltego One (formerly Pro) is $999/year per analyst. For large SOC teams, the per-seat cost requires budget justification. Free Community Edition is adequate for training and low-volume investigations but imposes result limits that make it impractical for production CTI work.

SpiderFoot and theHarvester: Automated Recon for CTI Teams

SpiderFoot and theHarvester are the primary open-source automated recon tools used by CTI teams that need broad reconnaissance without per-query commercial licensing costs.

SpiderFoot aggregates data from 200-plus sources — WHOIS, DNS, certificate transparency, breach databases, social media, dark web, and paste sites — into a single automated scan. Its module architecture lets analysts enable only the data sources relevant to their investigation. SpiderFoot HX is the hosted version with a collaborative web interface; the open-source version requires self-hosting. For teams with engineering resources, SpiderFoot's API can be integrated into custom CTI workflows and threat hunting automation pipelines.

theHarvester is the more focused tool: it extracts email addresses, hostnames, and employee names associated with a target domain from public sources including Google, Bing, LinkedIn, Shodan, and certificate transparency logs. It is most useful as a phishing and social engineering risk assessment tool — understanding what attacker-accessible information exists about your organization before a vishing or spear-phishing campaign does.

Both tools are appropriate for internal asset discovery and external exposure assessment. Neither provides the real-time data freshness of commercial platforms like Shodan or Censys, but for budget-constrained programs they cover the majority of OSINT collection tasks at zero licensing cost.

Building a Practical OSINT Stack by Role

No single tool covers all CTI requirements. The right stack depends on your role and primary intelligence objectives.

For SOC analysts performing alert triage and IOC enrichment: GreyNoise (noise suppression), Shodan (IP context), VirusTotal (file and URL context), and OSINT Framework (ad hoc community resource lookups). Total cost: under $200/month per analyst using commercial tiers.

For CTI analysts performing adversary tracking and infrastructure attribution: Shodan or Censys (exposure indexing), Maltego with Recorded Future or PassiveTotal transforms (relationship pivoting), SpiderFoot (automated collection), and a TIP (MISP or OpenCTI) for indicator management. Budget $1,500 to $3,000 per analyst annually.

For red teamers performing external attack surface assessment: Censys ASM (organizational asset discovery), Shodan (service enumeration and historical data), theHarvester (email and employee harvesting), and Recon-ng (modular recon framework for custom data source integration). Most of these tools are free or low-cost; budget is primarily analyst time.

The bottom line

Shodan is the baseline for any CTI program and should be the first commercial OSINT investment. Add GreyNoise immediately to reduce alert fatigue from mass scanner traffic. Layer Maltego for relationship-based attribution work if your budget and analyst maturity support it. SpiderFoot and theHarvester cover the automation gap for teams with engineering resources and limited commercial budgets. The goal is not tool breadth but coverage depth across the intelligence layers that matter for your specific threat model: prioritize passive DNS and certificate intelligence if phishing infrastructure tracking is your primary need; prioritize industrial exposure data if OT/ICS is in scope.

Frequently asked questions

What is the difference between OSINT tools and threat intelligence platforms?

OSINT tools collect raw data from public sources: internet scans, certificate logs, WHOIS records, social media, and dark web. Threat intelligence platforms (TIPs) like MISP, OpenCTI, Anomali, and Recorded Future aggregate, normalize, and correlate that data into actionable intelligence with confidence scores, MITRE ATT&CK mappings, and sharing workflows. A mature CTI program uses OSINT tools to collect signals and a TIP to manage and operationalize them. They are complementary, not interchangeable.

Is Shodan legal to use for security research?

Shodan indexes publicly exposed services passively — it does not exploit systems or bypass access controls. Querying Shodan for information about internet-exposed hosts is legal in most jurisdictions. The legal gray area arises when using Shodan data to actively probe third-party systems without authorization. Using Shodan to assess your own organization's external exposure is unambiguously legal. Using findings to probe competitor or adversary infrastructure without a legal mandate is not. Consult legal counsel before conducting OSINT-based investigations that might cross into active reconnaissance of third parties.

How is Shodan different from Censys?

Both index internet-exposed services, but Shodan has broader device coverage including ICS/SCADA and IoT, a larger community, and more intuitive query syntax for general threat intel use. Censys has superior certificate transparency log coverage, making it better for discovering phishing and typosquat infrastructure. Censys ASM adds organizational asset discovery that maps your own external footprint. Most enterprise CTI programs use both: Shodan for exposure intelligence and threat actor infrastructure tracking, Censys for external attack surface management and certificate-based discovery.

What OPSEC precautions should analysts take when using OSINT tools?

Never query adversary-controlled infrastructure directly from analyst workstations. Maltego transforms, direct browser visits to suspicious domains, and API queries to threat actor services can all leave identifiable artifacts. Route sensitive queries through VPN or Tor exits. Use dedicated analyst VMs with separate browser profiles. For Shodan and Censys queries, the query itself does not alert targets — but clicking through to live URLs in results does. Maintain a separate investigation network segment for active OSINT work.

Can OSINT tools replace a commercial threat intelligence feed?

No. OSINT tools collect public signals, but commercial threat intelligence feeds (CrowdStrike, Recorded Future, Mandiant, Intel 471) add closed-source data: dark web monitoring, human intelligence from threat actor communities, proprietary malware analysis, and attribution data that cannot be derived from public sources alone. OSINT tools are the free or low-cost foundation; commercial feeds add the high-confidence, high-context intelligence layer. Budget for both: OSINT tooling for broad collection, commercial feeds for the targeted intelligence that justifies prioritization decisions.

What is the OSINT Framework and how do CTI teams use it?

The OSINT Framework (osintframework.com) is a free, community-maintained directory of OSINT resources organized by intelligence category: usernames, email addresses, domain names, IP addresses, social media, dark web, images, and more. It does not query data itself — it links to the tools and services that do. CTI teams use it as a reference for locating specialized data sources outside their standard stack, particularly for investigations involving unfamiliar jurisdictions, platforms, or data types. It is the starting point for finding purpose-built resources when your standard toolset does not cover the target.

Sources & references

  1. MITRE ATT&CK — Gather Victim Network Information (T1590)
  2. Shodan — Internet Intelligence Platform
  3. Censys — Attack Surface Management
  4. GreyNoise — Mass Internet Scanner Context
  5. OSINT Framework — Free Resource Directory

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.