Skip to content

Flowsint - Graph-Based OSINT Investigation Platform Cheatsheet

Flowsint - Graph-Based OSINT Investigation Platform Cheatsheet

A modern, open-source graph-based investigation tool for cybersecurity analysts, OSINT researchers, and investigators. Visualize relationships between entities (domains, IPs, emails, wallets) with automated enrichment and local-first data storage.

Ethical Use Only: Flowsint must only be used for lawful, ethical investigation and research purposes. Review the project’s ETHICS.md before deployment.

Installation

Quick Setup (Docker)

# Clone the repository
git clone https://github.com/reconurge/flowsint.git
cd flowsint

# Production deployment
make prod

# Development deployment
make dev

Prerequisites: Docker and Make

Access

ModeURL
Developmenthttp://localhost:5173
Productionhttp://localhost:5173/register (create account first)

Architecture Overview

Flowsint is a modular platform with five core components:

ModulePurpose
flowsint-appFrontend interface (graph visualization)
flowsint-apiFastAPI backend with authentication
flowsint-coreDatabase, utilities, task orchestration
flowsint-enrichersData enrichment modules
flowsint-typesPydantic data models

Entity Types

Flowsint works with various investigation entities you can add to your graph:

EntityDescription
DomainWebsite domain names
IP AddressIPv4/IPv6 addresses
EmailEmail addresses
Phone NumberPhone numbers
UsernameSocial media / service usernames
OrganizationCompanies and organizations
ASNAutonomous System Numbers
CIDRIP address ranges
Cryptocurrency WalletBitcoin, Ethereum, etc. addresses
URLSpecific web pages

Available Enrichers

Network Intelligence

EnricherWhat It Does
DNS ResolutionResolve domain to IP addresses
Reverse DNSFind domains pointing to an IP
Subdomain EnumerationDiscover subdomains of a domain
WHOIS LookupDomain registration information
IP GeolocationPhysical location of IP addresses
ASN MappingIdentify network ownership
CIDR ExpansionExpand IP ranges to individual addresses

Digital Identity

EnricherWhat It Does
Email Breach CheckCheck if email appears in known breaches
Gravatar DiscoveryFind Gravatar profiles linked to emails
Phone Breach CheckCheck phone numbers in breach databases
Username Search (Maigret)Search for username across social platforms

Organization Research

EnricherWhat It Does
ASN OwnershipIdentify organizations behind ASNs
Domain PortfolioFind other domains owned by same entity
Company DetailsRetrieve company registration info

Web Analysis

EnricherWhat It Does
Website CrawlingMap site structure and discover pages
Link ExtractionExtract all links from a webpage
Tracking ScriptsIdentify analytics and tracking code
Text HarvestingExtract text content from pages

Cryptocurrency

EnricherWhat It Does
Wallet TransactionsView transaction history for addresses
NFT OwnershipTrack NFT holdings of wallet addresses

Integrations

IntegrationWhat It Does
N8n WorkflowsConnect to N8n automation workflows

Investigation Workflow

1. Create an Investigation

Start a new investigation from the dashboard. Give it a descriptive name and optional tags.

2. Add Seed Entities

Add your starting entities (known domains, emails, IPs, etc.) to the graph canvas.

3. Run Enrichers

Right-click an entity or select it and run relevant enrichers. New entities and connections are automatically added to the graph.

4. Analyze Relationships

Use the visual graph to trace connections:

  • Domain → IP: Hosting relationships
  • Email → Breaches: Compromised accounts
  • Domain → Subdomains: Attack surface mapping
  • Username → Platforms: Digital footprint

5. Expand and Pivot

Select newly discovered entities and run additional enrichers to expand the investigation graph.

Key Features

FeatureDescription
Graph VisualizationInteractive node-link diagrams showing entity relationships
Automated EnrichmentOne-click data gathering from multiple OSINT sources
Local StorageAll data stays on your machine — privacy by design
Multi-UserAuthentication system for team investigations
Modular ArchitectureAdd custom enrichers via the plugin system
ExportExport investigation data for reporting

Running Tests

# Test individual modules
cd flowsint-core
poetry run pytest

cd flowsint-api
poetry run pytest

cd flowsint-enrichers
poetry run pytest

Common Investigation Scenarios

Domain Investigation

  1. Add target domain as entity
  2. Run DNS Resolution → discover IPs
  3. Run Subdomain Enumeration → map attack surface
  4. Run WHOIS → find registrant info
  5. Run Website Crawling → map site structure
  6. Pivot to discovered IPs → run Reverse DNS

Email Investigation

  1. Add target email as entity
  2. Run Breach Check → find compromised databases
  3. Run Gravatar Discovery → find linked profile
  4. Extract username → run Username Search across platforms

Infrastructure Mapping

  1. Add known IP or ASN
  2. Run ASN Ownership → identify organization
  3. Run CIDR Expansion → map IP ranges
  4. Run Reverse DNS on IPs → discover domains
  5. Visualize full infrastructure on graph

Troubleshooting

IssueSolution
Docker build failsEnsure Docker and Make are installed and running
Port conflict on 5173Change port mapping in docker-compose.yml
Enricher timeoutCheck network connectivity; some enrichers require internet
Empty resultsVerify the entity format is correct (valid domain, IP, etc.)
Authentication errorsRegister a new account at /register

Resources