Ransomfeed Advanced Domain Monitoring Tool
RF-Lookup is an advanced tool for monitoring domains and onion sites, designed to detect DNS changes and possible seizures by law enforcement before they become public. Originally based on FBI_Watchdog.
- Python 3.7 or higher
- Firefox (for automatic screenshots)
- Tor (optional, for onion site monitoring)
- Git (for cloning repositories)
- π DNS Monitoring: Checks changes in DNS records (A, AAAA, CNAME, MX, NS, SOA, TXT)
- π Onion Support: Monitors .onion sites through the Tor network
- πΈ Automatic Screenshots: Automatically captures screenshots of suspicious pages
- π HTML Reports: Generates detailed reports in HTML format
- πΎ Local Logging: Saves all alerts in local JSON files
- π Auto-Update: Automatic update system from GitHub
- π CTI Integration: Automatic extraction of domains from intelligence files deepdarkCTI - this project is a dependency from which to retrieve domain names to monitor.
- Clone the RF-Lookup repository:
git clone https://github.com/ransomfeed/RF-lookup.git
cd RF-lookup- Clone the CTI repository (external dependency):
git clone https://github.com/fastfire/deepdarkCTI.git- Install Python dependencies:
pip install -r requirements.txtNote: The deepdarkCTI repository is an external dependency necessary for RF-Lookup to function. It contains intelligence files with domains to monitor.
- Configure Tor (optional, for onion site monitoring):
# On macOS with Homebrew
brew install tor
# Start Tor
torpython rf_lookup.pypython test_rf_lookup.pypython test_cti_extraction.pypython test_onion_seizure.pypython test_whitelist.pyRF-Lookup automatically extracts domains marked as "ONLINE" from files in the deepdarkCTI/ folder:
markets.md- Dark web marketsforum.md- Forums and communitiesransomware_gang.md- Ransomware groups
The system automatically analyzes these files at startup and monitors all found domains.
RF-Lookup supports domain whitelisting to exclude specific domains from monitoring. Create a whitelist.json file:
Quick Start:
cp whitelist.example.json whitelist.json
# Edit whitelist.json with your domainsManual Configuration:
{
"whitelist": {
"description": "Domains to exclude from RF-Lookup monitoring",
"clearnet_domains": [
"example.com",
"test-domain.org"
],
"onion_domains": [
"example.onion"
],
"enabled": true
},
"settings": {
"skip_whitelisted": true,
"log_skipped_domains": true
}
}Configuration Options:
enabled: Enable/disable whitelist functionalityskip_whitelisted: Skip monitoring whitelisted domainslog_skipped_domains: Log which domains are being skipped
If you want to add custom domains, modify the extract_online_domains_from_cti() function in the rf_lookup.py file:
RF-lookup/
βββ rf_lookup.py # Main script
βββ test_rf_lookup.py # Test script
βββ whitelist.example.json # Example whitelist configuration
βββ requirements.txt # Python dependencies
βββ README.md # Documentation
βββ LICENSE # MIT License
βββ .gitignore # Git ignore file
βββ deepdarkCTI/ # External CTI repository (cloned separately)
β βββ markets.md
β βββ forum.md
β βββ ransomware_gang.md
βββ [Automatically generated files]
βββ rf_lookup_logs/ # Log folder (created automatically)
βββ rf_lookup_results.json # Previous DNS results
βββ onion_lookup_results.json # Previous onion results
βββ screenshots/ # Screenshots of suspicious pages
- Detects changes in DNS records
- Identifies possible seizures through suspicious NS records
- Saves change history
- Checks .onion site status
- Detects seizure pages
- Uses Tor proxy automatically
- Local logging in JSON format
- Interactive HTML reports
- Automatic screenshots of suspicious pages
- Python: 3.7 or higher
- Firefox: For automatic screenshots of suspicious pages
- Tor: Optional, for onion site monitoring (port 9050)
- Git: For cloning necessary repositories
- Operating System: Windows, macOS, Linux
dnspython- DNS resolutionrequests- HTTP requestsselenium- Browser automationbeautifulsoup4- HTML parsingrich- Colored outputPySocks- SOCKS proxy support
This project is released under the MIT License. See the LICENSE file for details.
Contributions are welcome! Please:
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
- deepdarkCTI: Intelligence repository containing domains to monitor. Must be cloned separately in the project folder.
This tool is intended exclusively for educational and research purposes. Users are responsible for complying with local laws and applicable regulations.