Skip to content

Flowsint - Graph-Based OSINT Investigation Platform Cheatsheet

Flowsint - Graph-Based OSINT Investigation Platform Cheatsheet

Section titled “Flowsint - Graph-Based OSINT Investigation Platform Cheatsheet”

A modern, open-source graph-based investigation tool for cybersecurity analysts, OSINT researchers, and investigators. Visualize relationships between entities (domains, IPs, emails, wallets) with automated enrichment and local-first data storage.

Ethical Use Only: Flowsint must only be used for lawful, ethical investigation and research purposes. Review the project’s ETHICS.md before deployment.

# Clone the repository
git clone https://github.com/reconurge/flowsint.git
cd flowsint

# Production deployment
make prod

# Development deployment
make dev

Prerequisites: Docker and Make

ModeURL
Developmenthttp://localhost:5173
Productionhttp://localhost:5173/register (create account first)

Flowsint is a modular platform with five core components:

ModulePurpose
flowsint-appFrontend interface (graph visualization)
flowsint-apiFastAPI backend with authentication
flowsint-coreDatabase, utilities, task orchestration
flowsint-enrichersData enrichment modules
flowsint-typesPydantic data models

Flowsint works with various investigation entities you can add to your graph:

EntityDescription
DomainWebsite domain names
IP AddressIPv4/IPv6 addresses
EmailEmail addresses
Phone NumberPhone numbers
UsernameSocial media / service usernames
OrganizationCompanies and organizations
ASNAutonomous System Numbers
CIDRIP address ranges
Cryptocurrency WalletBitcoin, Ethereum, etc. addresses
URLSpecific web pages
EnricherWhat It Does
DNS ResolutionResolve domain to IP addresses
Reverse DNSFind domains pointing to an IP
Subdomain EnumerationDiscover subdomains of a domain
WHOIS LookupDomain registration information
IP GeolocationPhysical location of IP addresses
ASN MappingIdentify network ownership
CIDR ExpansionExpand IP ranges to individual addresses
EnricherWhat It Does
Email Breach CheckCheck if email appears in known breaches
Gravatar DiscoveryFind Gravatar profiles linked to emails
Phone Breach CheckCheck phone numbers in breach databases
Username Search (Maigret)Search for username across social platforms
EnricherWhat It Does
ASN OwnershipIdentify organizations behind ASNs
Domain PortfolioFind other domains owned by same entity
Company DetailsRetrieve company registration info
EnricherWhat It Does
Website CrawlingMap site structure and discover pages
Link ExtractionExtract all links from a webpage
Tracking ScriptsIdentify analytics and tracking code
Text HarvestingExtract text content from pages
EnricherWhat It Does
Wallet TransactionsView transaction history for addresses
NFT OwnershipTrack NFT holdings of wallet addresses
IntegrationWhat It Does
N8n WorkflowsConnect to N8n automation workflows

Start a new investigation from the dashboard. Give it a descriptive name and optional tags.

Add your starting entities (known domains, emails, IPs, etc.) to the graph canvas.

Right-click an entity or select it and run relevant enrichers. New entities and connections are automatically added to the graph.

Use the visual graph to trace connections:

  • Domain → IP: Hosting relationships
  • Email → Breaches: Compromised accounts
  • Domain → Subdomains: Attack surface mapping
  • Username → Platforms: Digital footprint

Select newly discovered entities and run additional enrichers to expand the investigation graph.

FeatureDescription
Graph VisualizationInteractive node-link diagrams showing entity relationships
Automated EnrichmentOne-click data gathering from multiple OSINT sources
Local StorageAll data stays on your machine — privacy by design
Multi-UserAuthentication system for team investigations
Modular ArchitectureAdd custom enrichers via the plugin system
ExportExport investigation data for reporting
# Test individual modules
cd flowsint-core
poetry run pytest

cd flowsint-api
poetry run pytest

cd flowsint-enrichers
poetry run pytest
  1. Add target domain as entity
  2. Run DNS Resolution → discover IPs
  3. Run Subdomain Enumeration → map attack surface
  4. Run WHOIS → find registrant info
  5. Run Website Crawling → map site structure
  6. Pivot to discovered IPs → run Reverse DNS
  1. Add target email as entity
  2. Run Breach Check → find compromised databases
  3. Run Gravatar Discovery → find linked profile
  4. Extract username → run Username Search across platforms
  1. Add known IP or ASN
  2. Run ASN Ownership → identify organization
  3. Run CIDR Expansion → map IP ranges
  4. Run Reverse DNS on IPs → discover domains
  5. Visualize full infrastructure on graph
IssueSolution
Docker build failsEnsure Docker and Make are installed and running
Port conflict on 5173Change port mapping in docker-compose.yml
Enricher timeoutCheck network connectivity; some enrichers require internet
Empty resultsVerify the entity format is correct (valid domain, IP, etc.)
Authentication errorsRegister a new account at /register