user_guide - poppopjmp/spiderfoot GitHub Wiki
Author: poppopjmp
This guide covers the main features, workflows, and best practices for SpiderFoot, including the web interface, CLI, workspaces, exporting data, automation, and troubleshooting.
- Target: The entity you want to investigate (domain, IP, email, etc.)
- Module: A plugin that gathers specific types of information
- Event: A piece of information discovered about a target
- Scan: A collection of modules run against one or more targets
- Workspace: A container for organizing related targets and scans
SpiderFoot features a modern React SPA with a dark theme, real-time updates, and comprehensive scan management.
Docker Compose (Recommended):
# Core only (5 services)
docker compose -f docker-compose.yml up --build -d
# Or full stack (all services except SSO)
docker compose -f docker-compose.yml --profile full up --build -dAccess the UI at http://localhost:3000 (core) or https://localhost (with proxy profile) and log in with your admin credentials.

The dashboard provides at-a-glance statistics — active scans, total events, risk distribution, and recent activity.

Click New Scan to configure and launch an OSINT scan:
- Enter the target (domain, IP, email, etc.)
- Select the target type and choose module categories
- Click Run Scan

View all scans with status, target, event counts, and duration. Filter, search, and manage scans from one place.

Each scan has a detailed view with tabbed navigation:
- Summary — Key metrics, risk distribution, top modules, event type breakdown
- Browse — Filter results by event type, risk level, and source module
- Graph — Interactive force-directed graph of entity relationships
- GeoMap — World map plotting discovered IP address locations
- Correlations — Automated findings from the 94-rule YAML engine
- AI Report — LLM-generated Cyber Threat Intelligence report
- Scan Settings — Module configuration used for the scan
- Log — Execution logs and module output






Organize related scans into Workspaces for multi-target campaigns. Each workspace groups scans, tracks notes, and provides workspace-level analytics and AI-generated reports.

Configure global settings, module API keys, and monitor the 6 AI-powered analysis agents.


-
List modules:
python sf.py -M
-
Help for a module:
python sf.py -M sfp_dnsresolve
-
Run scan:
python sf.py -s example.com -t DOMAIN_NAME -m sfp_dnsresolve,sfp_ssl
-
Workspaces (CLI):
- Create, add targets, and run multi-target scans (see Quick Start).
- Use CLI workspaces for automation and scripting in large-scale assessments.
SpiderFoot v6.0.0 includes 309 modules organized into the following categories:
- DNS/Network: sfp_dnsresolve, sfp_whois, sfp_ssl, sfp_portscan_tcp, sfp_banner
- Threat Intelligence: sfp_threatcrowd, sfp_virustotal, sfp_alienvault, sfp_malware
- Search Engines: sfp_google, sfp_bing, sfp_duckduckgo, sfp_yandex
- Social Media: sfp_twitter, sfp_github, sfp_linkedin, sfp_instagram, sfp_tiktok_osint
- Data Breach: sfp_haveibeen, sfp_hunter, sfp_emailrep
- Blockchain Analytics: sfp_blockchain_analytics (Bitcoin, Ethereum, Litecoin analysis)
- Advanced Correlation: sfp_advanced_correlation (entity resolution, pattern detection)
- Performance Optimization: sfp_performance_optimizer (caching, rate limiting)
Enhanced CLI Patterns:
# Domain reconnaissance with performance optimization
python sf.py -s example.com -t DOMAIN_NAME -m sfp_dnsresolve,sfp_subdomain_enum,sfp_ssl,sfp_whois,sfp_threatcrowd,sfp_performance_optimizer
# TikTok OSINT investigation
python sf.py -s @username -t SOCIAL_MEDIA -m sfp_tiktok_osint,sfp_advanced_correlation
# Cryptocurrency investigation
python sf.py -s 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa -t BITCOIN_ADDRESS -m sfp_blockchain_analytics,sfp_advanced_correlation
# Network block analysis
python sf.py -s 192.168.1.0/24 -t NETBLOCK -m sfp_portscan_tcp,sfp_banner,sfp_ssl
# Email investigation with enhanced correlation
python sf.py -s [email protected] -t EMAILADDR -m sfp_hunter,sfp_haveibeen,sfp_emailrep,sfp_advanced_correlation
# Multi-target investigation with performance optimization
python sf.py -s multiple_targets.txt -t FILE -m sfp_dnsresolve,sfp_ssl,sfp_blockchain_analytics,sfp_performance_optimizer-
Workspace management, multi-target scanning, correlation, CTI reports, and automation:
- See Quick Start and Developer Guide for scripting, batch operations, and CI/CD integration.
- Use
sfworkflow.pyfor advanced workspace and scan management.
SpiderFoot v6.0.0 provides enhanced result analysis and interpretation:
- Traditional Types: IP_ADDRESS, DOMAIN_NAME, TCP_PORT_OPEN, SSL_CERTIFICATE_ISSUED, VULNERABILITY, MALICIOUS_DOMAIN, EMAILADDR, SOCIAL_MEDIA
- Enhanced Types: TIKTOK_PROFILE, BLOCKCHAIN_ADDRESS, CRYPTOCURRENCY_TRANSACTION, AI_THREAT_SUMMARY, CORRELATION_MATCH, PERFORMANCE_METRIC
- HIGH (critical): Active threats, known vulnerabilities, sanctions matches
- MEDIUM (important): Suspicious patterns, potential risks, correlation matches
- LOW (informational): General information, metadata, social profiles
- INFO (general): Performance metrics, cache statistics, correlation data
- TikTok Intelligence: Profile verification, follower analytics, content patterns
- Blockchain Analysis: Transaction flows, risk scores, exchange attribution
- Correlation Results: Cross-platform identity matches, behavioral patterns
- Performance Insights: Cache hit rates, optimization recommendations
- AI Analysis: Automated threat summaries, pattern recognition
- Open admin ports, expired SSL, known vulnerabilities
- Threat feed hits, breach exposures
- Cryptocurrency sanctions matches
- High-risk blockchain transactions
- Cross-platform identity correlation
- Anomalous behavioral patterns
- Define scope and start with passive modules
- Escalate to active scanning only when necessary
- Document findings and keep records
- Configure API keys for maximum coverage
- Regularly update SpiderFoot and modules
- Use workspaces to keep projects organized
- Tune thread counts and timeouts for performance
- Respect authorization and legal boundaries
- For common issues, see the Troubleshooting Guide.
- For module-specific help, see the Modules Guide.
- For configuration and API keys, see the Configuration Guide.
- Use
python sf.py --helpandpython sf.py -Mfor command and module help. - Community support: GitHub Issues, Discord, and Wiki.
- Use CLI and
sfworkflow.pyfor scripting, batch scans, and automation - Integrate with CI/CD (see examples in the old CLI guide)
- Use environment variables for configuration and API keys
- Export results as CSV, Excel, or JSON from the web UI or CLI
- Use the API for programmatic access (see API Reference)
- Reports can be shared with stakeholders or imported into other tools
Next: Modules for a list of available modules and their usage.