From b7cba39fe287dcb969138b6de98139eaf2204d59 Mon Sep 17 00:00:00 2001 From: OH SHINT! <87458889+OhShINT@users.noreply.github.com> Date: Sun, 20 Feb 2022 16:15:16 -0800 Subject: [PATCH] Update 1-Complete-List-of-OSINT-Web-Resources.md --- .../1-Complete-List-of-OSINT-Web-Resources.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/Lists_of_OSINT_Web_Resources/1-Complete-List-of-OSINT-Web-Resources.md b/Lists_of_OSINT_Web_Resources/1-Complete-List-of-OSINT-Web-Resources.md index c93ebce..c1c11e5 100644 --- a/Lists_of_OSINT_Web_Resources/1-Complete-List-of-OSINT-Web-Resources.md +++ b/Lists_of_OSINT_Web_Resources/1-Complete-List-of-OSINT-Web-Resources.md @@ -3380,6 +3380,8 @@ The Google Hacking Data Base is an index of search queries (we call them dorks) Enter an IP address and date to find out whether that address was used as a Tor relay. - [TorWHOIS](https://torwhois.com/) Look up an .onion address and see basic information such as date last seen, open ports, running software and banners. You can also query specific onions from the command line: `whois -h torwhois.com facebookcorewwwi.onion` +- [Ahmia Link Graph](https://ahmia.fi/stats/link_graph/) + Enter a name of any .onion domain zone and see what other sites in the zone it's associated with. ### **TOR Search Engines and Directories**