Explore the entire internet. See every layer.
Deepinfo's Deep Search & Insights module turns our internet-scale dataset into an investigation tool. Search 400 million domains, 2 billion subdomains, 200 billion DNS records, 30 billion SSL certificates, every CVE with EPSS and CISA KEV, dark web sources, and the historical record. Built for the investigations a generic search engine can't run.
Sometimes you need the internet itself as a search engine.
A typosquat investigation needs every domain registered with a similar name. An adversary infrastructure mapping needs every domain pointing to a given IP. An M&A due diligence needs every domain owned by the acquisition target's email addresses. A vulnerability research project needs every CVE matching specific filters with EPSS history.
Generic search engines aren't built for these queries. Generic threat-intelligence platforms surface findings on assets you've already added; they don't let you query the open internet from any angle.
DSI closes that gap. Direct queryable access to Deepinfo's internet-scale dataset, with the structure investigations actually use. No hand-built dataset to maintain. No third-party API to glue together.
Five capabilities, working as one search layer.
Each capability below is a sub-feature with its own page. They share the same internet-scale dataset that powers the rest of the platform. Click any card to go deeper.
Domain Intelligence
Aggregate domain analytics: registration trends, TLD distributions, keyword stats, registration timelines. The view above the haystack, useful for trend research, brand-monitoring planning, and threat-landscape analysis.
Learn more FEATURE 02Domain Search
Pivot across the internet's domain corpus from any angle. Reverse lookups by IP, MX server, name server, or registration email. Subdomain finder. Sametime-registered finder. Associated-domain finder. The investigative tool that finds the domains you didn't know were related.
Learn more FEATURE 03Vulnerability Intelligence
Aggregate vulnerability analytics. CVE statistics by year, CWE timeline, CISA KEV stats, EPSS history per CVE, vulnerability stats by CVSS. The view across the vulnerability landscape, with real-world exploitation signal built in.
Learn more FEATURE 04Vulnerability Search
Search the entire CVE corpus by dozens of filters. Find every CVE for a given technology, vendor, product, or version. Vulnerability finder by FQDN, IP, or URL. Per-CVE detail with EPSS, CISA KEV, CWE, and CAPEC links.
Learn more FEATURE 05Instant Lookups
Real-time single-target queries: DNS, Whois, IP-Whois, SSL certificate, port scan. Plus historical: DNS history, Whois history. The fast lookups your incident-response and analyst workflows hit constantly.
Learn moreEvery layer of the internet, queryable directly.
Most "threat intelligence search" tools surface curated findings. DSI surfaces the raw observables themselves: every domain we've discovered, every certificate we've indexed, every DNS record we've observed, every CVE published, with structured pivots and historical state.
The data, indexed for search.
400 million domains. 2 billion subdomains. 200 billion DNS records. 30 billion SSL certificates. Every CVE published, enriched with EPSS and CISA KEV. The corpus that powers EASM, CTI, BRP, and TPRM is the same corpus DSI exposes for direct search.
Pivots investigations actually use.
Reverse-IP, reverse-MX, reverse-NS, reverse-email lookups. Sametime-registered domain finder (find domains registered in the same window, pattern detection for coordinated infrastructure). Associated-domain finder. CVE finder by technology fingerprint.
Continuous freshness, full history.
The dataset refreshes continuously. New domain registrations within hours of going live, new certificates within minutes of issuance. Historical state is preserved per asset and per record type, so you can trace how something has changed over time.
Investigations a generic threat feed can't run.
DSI exists for the queries where the answer requires the internet itself, not curated findings on assets you've already added.
Adversary infrastructure mapping.
Start from one indicator (an IP, a domain, an email) and pivot outward. Find every domain pointing to that IP. Every domain registered with that email. Every domain registered the same week. Every certificate associated with the cluster. Build the picture of an actor's infrastructure without depending on someone else having mapped it for you.
M&A due diligence.
Find every domain associated with the acquisition target's executive email addresses. Discover subsidiaries, abandoned brands, shadow IT. Spot exposure that didn't make it into the data room. The technical due-diligence pass that runs in hours instead of months.
Vulnerability research.
Find every site running an EOL technology version. Search every CVE matching filters. Pull EPSS history per CVE to see how exploit-prediction has evolved. Track CWE timelines to see how a weakness category trends.
Built on data we collect responsibly.
DSI surfaces internet-observable data: domains, certificates, DNS records, public CVE catalogs. We collect from the open internet, with the same care for responsible-handling that any internet-scale data company should apply.
No personal data sold. No data scraped from authentication-required sources. Dark-web data, where included in dark web search, comes from established sourcing and is handled per industry standards. Our terms of use, privacy policy, and acceptable-use policy govern API and platform access.
Search and insights, built into your workflow.
A platform UI for analyst-led investigations.
Click pivots, structured filters, exportable result sets. Built for analysts running ad hoc queries, not for compliance reporting.
APIs for everything programmatic.
Every DSI capability is also exposed via API. Integrate domain pivots into your SOAR. Embed vulnerability finder into your patch-management workflow. Build custom investigation tools without reinventing the data layer. See the API reference.
Data feeds for bulk consumption.
Where your use case is bulk rather than query-based, the same dataset is available as Data Feeds. Daily registered domains, daily updated domains, all-domain corpus, more.
“For complex investigations, the pivots are the work: from one indicator outward across the indexed corpus until the picture closes. The dataset and query speed cut investigations that took us a day down to under an hour.”
Other modules.
See your entire attack surface. Act on what matters.
Continuous discovery and monitoring of every internet-facing asset, including subsidiaries and acquired companies.
See module CTI · CYBER THREAT INTELLIGENCESee what’s exposed. Act before it’s exploited.
Dark-web monitoring, breach corpora, infostealer logs, and threat-actor activity tied to your organization.
See module BRP · BRAND RISK PROTECTIONKeep an eye on the internet. Protect your brand.
Lookalike domains, fake apps, fraudulent listings, and brand abuse caught in hours, not weeks.
See module TPRM · THIRD-PARTY RISK MANAGEMENTEvery third party carries risk. See all of it.
Continuous external monitoring of every approved vendor with the same depth as your own surface.
See moduleSearch the internet's deepest data.
Run a sample DSI investigation against a domain of your choice. Or browse the API documentation directly to see what's queryable.