Knowledge is power—and perhaps the best way to acquire that knowledge is by using OSINT, or Open Source Intelligence. OSINT entails gathering information from open sources in order to gauge threats, conduct investigations, or simply become better informed about a target system.
\ Among the numerous OSINT tools out there, one that is both simple and effective is Wtfis—a command-line interface tool that makes multi-step domain and IP investigations seamless and human-readable.
\ In this post, we'll demystify what Wtfis is, how it works, and how you can begin using it to enhance your cybersecurity investigations.
\
Prefer watching instead of reading? Here’s a quick video guide
https://youtu.be/yuOoh6xqkGs?embedable=true
What is Wtfis?Wtfis is a new command-line OSINT tool that allows you to search for information on IP addresses, hostnames, and domains in an easy-to-read format. Even its name, which is a joke on "What the F* is," amusingly reveals the tool's primary purpose—determining exactly what some internet domain or IP address is, where it originates from, and what it does.
\ Unlike most tools, which spit raw JSON or junk results, Wtfis tries to give you helpful insights within a clean and readable format. It's meant for humans—rather than computers.
Why Use Wtfis?You can download Wtfis from GitHub straight away. You need Python 3.8+ and pip. Here is a quick start guide:
\ Clone the Repo
https://github.com/pirxthepilot/wtfis\ Or Install Directly
pip install wtfis\ You can now execute the tool with:
wtfis openexploit.in # Change the target\ Or to make it even more convenient, rename it or add it to your PATH for faster access.
API Keys SetupTo unlock richer results, you can link Wtfis to external data sources. You'll need API keys from services such as:
\ Once you have your keys, you can set them up with the .env file or environment variables.
\
Sample .env configuration: VT_API_KEY=openexploit_virustotal_key IPINFO_TOKEN=openexploit_ipinfo_token WHOISXML_API_KEY=openexploit_whoisxml_key ABUSEIPDB_API_KEY=openexploit_abuseipdb_key\ \ The more APIs you hook up, the richer your results will be.
How to Use WtfisInvestigating a Suspicious Domain
Let's say you get a suspicious-looking domain in a phishing email: openexploit.in (it's my domain, but for now just assume)
\ To investigate, you'd do:
wtfis openexploit.in\ Wtfis will spit out a clean report, potentially containing:
\ Checking a Suspicious IP
You see an unfamiliar IP 56.60.161.97 in your firewall logs. Run:
wtfis 56.60.161.97\ You might see:
\ This is extremely helpful during incident response, threat hunting, or vulnerability scans.
\ JSON Output
# Get JSON output wtfis openexploit.in --json\ Export to Markdown
# export Wtfis output to a Markdown wtfis openexploit.in > openexploit-osint-report.md Best Use Cases for WtfisWtfis is potent, but it's no magic bullet. There are a couple of limitations:
Always treat OSINT tools as pieces of a larger puzzle.
ConclusionTools like Wtfis offer an edge. It combines the depth of traditional OSINT with the elegance of human-friendly design—making it easier for both beginners and pros to get meaningful answers, fast.
\ If you haven’t already, give it a spin, and consider integrating it into your daily toolkit. You’ll be surprised at how much you can uncover with a single command.
\
All Rights Reserved. Copyright , Central Coast Communications, Inc.