Knowledge is power—and perhaps the best way to acquire that knowledge is by using OSINT, or Open Source Intelligence. OSINT entails gathering information from open sources in order to gauge threats, conduct investigations, or simply become better informed about a target system.

Among the numerous OSINT tools out there, one that is both simple and effective is Wtfis—a command-line interface tool that makes multi-step domain and IP investigations seamless and human-readable.

In this post, we'll demystify what Wtfis is, how it works, and how you can begin using it to enhance your cybersecurity investigations.

Prefer watching instead of reading? Here’s a quick video guide

https://youtu.be/yuOoh6xqkGs?embedable=true

What is Wtfis?

Wtfis is a new command-line OSINT tool that allows you to search for information on IP addresses, hostnames, and domains in an easy-to-read format. Even its name, which is a joke on "What the F* is," amusingly reveals the tool's primary purpose—determining exactly what some internet domain or IP address is, where it originates from, and what it does.

Unlike most tools, which spit raw JSON or junk results, Wtfis tries to give you helpful insights within a clean and readable format. It's meant for humans—rather than computers.

Why Use Wtfis?

Installing Wtfis

You can download Wtfis from GitHub straight away. You need Python 3.8+ and pip. Here is a quick start guide:

Clone the Repo

https://github.com/pirxthepilot/wtfis

Or Install Directly

pip install wtfis

You can now execute the tool with:

wtfis openexploit.in # Change the target

Or to make it even more convenient, rename it or add it to your PATH for faster access.

API Keys Setup

To unlock richer results, you can link Wtfis to external data sources. You'll need API keys from services such as:

Once you have your keys, you can set them up with the .env file or environment variables.

Sample .env configuration:

VT_API_KEY=openexploit_virustotal_key

IPINFO_TOKEN=openexploit_ipinfo_token

WHOISXML_API_KEY=openexploit_whoisxml_key

ABUSEIPDB_API_KEY=openexploit_abuseipdb_key

The more APIs you hook up, the richer your results will be.

How to Use Wtfis

Investigating a Suspicious Domain

Let's say you get a suspicious-looking domain in a phishing email: openexploit.in (it's my domain, but for now just assume)

To investigate, you'd do:

wtfis openexploit.in

Wtfis will spit out a clean report, potentially containing:

Checking a Suspicious IP

You see an unfamiliar IP 56.60.161.97 in your firewall logs. Run:

wtfis 56.60.161.97

You might see:

This is extremely helpful during incident response, threat hunting, or vulnerability scans.

JSON Output

# Get JSON output
wtfis openexploit.in --json

Export to Markdown

# export Wtfis output to a Markdown
wtfis openexploit.in > openexploit-osint-report.md

Best Use Cases for Wtfis

User Tips

Limitations to Remember

Wtfis is potent, but it's no magic bullet. There are a couple of limitations:

Always treat OSINT tools as pieces of a larger puzzle.

Conclusion

Tools like Wtfis offer an edge. It combines the depth of traditional OSINT with the elegance of human-friendly design—making it easier for both beginners and pros to get meaningful answers, fast.

If you haven’t already, give it a spin, and consider integrating it into your daily toolkit. You’ll be surprised at how much you can uncover with a single command.