Khoj provides a robust suite of investigation tools for IP Address and Domain/Website analysis, designed to empower law enforcement and cybersecurity professionals. The IP Investigation Tools include IP Intelligence for detailed IP profiling, VPN Identification and Detection to uncover anonymized connections, Application Detection from IP to identify associated services, and Reverse IP Lookup to trace hosted domains. For Domain/Website Investigation, Khoj offers Whois and Whois History for ownership tracking, DNS and DNS History for resolving domain activities, Subdomain Lookup for uncovering related domains, Technology Identification to analyze website frameworks, and Phishing/Abuse Check to detect malicious activities. These tools deliver actionable insights in a clear, structured format, enhancing digital investigations.
Description: IP Intelligence offers a detailed profile of an IP address, including geolocation, ISP details, network type, VPN identification and detection, entry and exit IP addresses, and applications used by the IP.
Investigative Benefit: Enables law enforcement to pinpoint a suspect’s location, detect VPN usage to uncover anonymized activities, trace entry/exit IPs for network path analysis, and identify applications to link specific online behaviors to criminal activities.
Command: IP ip_address
Command: IP ip_address
Navigation Menu: Menu > Start > IP & Domain > IP Intelligence
Description: Reverse IP Lookup identifies all domains and websites hosted on a specific IP address, revealing shared hosting connections.
Investigative Benefit: Helps investigators uncover related websites or services linked to a suspect’s IP, exposing hidden online activities, such as illicit servers or fraudulent domains, for deeper investigation.
Command: REVIP ip_address
Command: REVIP ip_address
Navigation Menu: Menu > Start > IP & Domain > Reverse IP Lookup
Description: Whois provides current domain ownership details, while Whois History tracks past ownership changes, including registrant names, contact details, and registration dates.
Investigative Benefit: Allows officials to trace domain ownership, detect suspicious changes in registrants, and identify individuals or entities behind potentially malicious websites, supporting fraud and cybercrime investigations.
Name Server: Identifies the servers managing the domain’s DNS records, aiding in tracking hosting infrastructure.
Registrar: Specifies the organization responsible for registering the domain, providing a point of contact for investigations.
Registrant: Details the individual or entity owning the domain, crucial for identifying responsible parties.
Admin Detail: Provides administrative contact information for the domain, useful for direct communication or verification.
Abuse Details: Lists contact points for reporting domain misuse, facilitating action against malicious activities.
Developer Details: Reveals technical contacts managing the domain, helping trace those maintaining illicit websites.
WHOIS: WHOIS example.com
WHOIS History: WHOISHISTORY example.com
WHOIS: WHOIS example.com
WHOIS History: WHOISHISTORY example.com
Navigation Menu: Menu > Start > IP & Domain > WHOIS | WHOIS History
Description: DNS resolves domain names to IP addresses, and DNS History tracks changes in DNS records, such as A, MX, or CNAME records, over time.
Investigative Benefit: Enables tracking of a domain’s infrastructure changes, helping law enforcement identify attempts to obscure malicious activities or trace servers used in cyberattacks.
A Record: Maps a domain to its IPv4 address, pinpointing the server hosting the website.
AAAA Record: Links a domain to its IPv6 address, identifying modern server infrastructure.
MX Record: Specifies mail servers for the domain, useful for tracking email-related activities.
CNAME Record: Aliases one domain to another, revealing redirects or alternate domain names.
NS Record: Identifies authoritative name servers, indicating who controls the domain’s DNS.
TXT Record: Stores text-based data, often used for verification or security (e.g., SPF, DKIM).
SOA Record: Provides administrative details about the domain’s DNS zone, including update history.
DNS: DNS example.com
DNS History: DNSHISTORY example.com
DNS: DNS example.com
DNS History: DNSHISTORY example.com
Navigation Menu: Menu > Start > IP & Domain > DNS | DNS History
Description: Subdomain Lookup identifies related subdomains of a target domain, Technology Identification reveals the website’s technical stack (e.g., CMS, frameworks), and Phishing Check detects signs of malicious or fraudulent activity.
Investigative Benefit: Uncovers hidden subdomains used for illegal purposes, identifies technologies to assess vulnerabilities, and flags phishing or abusive websites, aiding in the prevention and investigation of cybercrimes.
Subdomain: SUBDOMAIN example.com
Technology Detection: TECH example.com
Phishing Check: PHISH example.com
Subdomain: SUBDOMAIN example.com
Technology Detection: TECH example.com
Phishing Check: PHISH example.com
Navigation Menu: Menu > Start > IP & Domai
The data included herein has been obtained entirely from publicly available sources and verified legal digital tools. Khoj strictly avoid use of unauthorized or unlawfully obtained data. This report is created dynamically and does not involve any long-term data storage by Khoj; no user data is retained post-transmission. Law enforcement officers must ensure that any use of this information complies with all relevant provisions of Indian law, including but not limited to the Information Technology Act, 2000, the Bharatiya Nyaya Sanhita (BNS), the Bharatiya Nagarik Suraksha Sanhita (BNSS), the Bharatiya Sakshya Adhiniyam (BSA), and, upon enforcement, the Digital Personal Data Protection Act, 2023. Officers must also adhere to principles outlined under Article 21 of the Constitution of India, which guarantees the Right to Privacy.
These data is strictly confidential and must not be circulated beyond its intended purpose. Sharing it on public platforms- including but not limited to WhatsApp, Telegram, Signal, or social media- is strictly prohibited. The requesting law enforcement agency is fully responsible for the secure handling, ethical use, and lawful processing of this report. Explicit consent from the data subject or valid legal authorization must be obtained before taking any further action based on this data.
Khoj acts solely as a technological intermediary and shall not be held liable for the accuracy, completeness, or consequences of reliance upon this report. It does not offer legal advice, nor does it control or influence the source data. The report must be used ethically and responsibly, respecting individual rights without compromising legitimate investigative goals.
Copyright © 2025 | Intelkit Solutions | All Rights Reserved