Skip to main content

Maps

The Maps page provides infrastructure discovery visualization: mapping the relationships between domains, IP addresses, and hosting infrastructure used by scam operations. A single discovered domain often reveals an entire cluster of related fraud sites run by the same actor.

Maps

What infrastructure discovery does

When you run a map on a suspicious domain, the Maps engine:

  1. Resolves the domain's DNS records (A, AAAA, CNAME, NS, MX)
  2. Reverse-looks up other domains hosted on the same IP address
  3. Checks the SSL certificate's Subject Alternative Names (SANs) for co-hosted domains
  4. Scans for related domains by registrar, nameserver pattern, or registration timing
  5. Applies WHOIS enrichment to identify registration patterns across the cluster
  6. Builds an interactive graph of the entire hosting cluster

This reveals the full scope of a scam operation's infrastructure: a single phishing URL typically shares infrastructure with dozens of other fraud domains run by the same operator.

Reading a map

Map detail

Each map is rendered as an interactive node-link graph:

ElementDescription
Central nodeThe initial domain or IP you investigated
Domain nodesOther domains discovered through the infrastructure relationships
IP nodesHosting servers that connect multiple domains
Edge labelsThe relationship type connecting two nodes (same IP, same cert SAN, same registrar, same nameserver)

Node color coding

ColorRisk levelMeaning
RedCRITICALConfirmed phishing or fraud infrastructure
OrangeHIGHLikely malicious based on scoring
YellowMEDIUMSuspicious: warrants investigation
GrayUnknownNot yet scored or analyzed

You can click any node in the map to open the Domain Detail Drawer, with five tabs covering everything Chainara knows about that domain. Use zoom, pan, and fullscreen to navigate large infrastructure clusters; an a11y-aware toolbar provides keyboard alternatives for every gesture.

Domain Detail Drawer

Clicking a domain node opens a side drawer with the following tabs:

TabContents
OverviewRisk score, hosting provider, WHOIS, certificate, registration timing
NetworkDirect neighbors and the relationships connecting them (IP, NS, cert SAN, registrar)
WalletsCrypto wallets observed on this domain across all worker scans
ActorsThreat actors and campaigns this domain has been attributed to
SessionsPast worker scan sessions with timestamps, threat verdicts, and links to the originating reports

Drawer reads are cached, so opening the same node twice in quick succession is instant.

Cross-pivot

Inside the drawer, click any pivot button to find every other domain that shares a given attribute:

  • Same IP address
  • Same ASN (hosting provider)
  • Same registrar
  • Same certificate issuer
  • Same nameserver

Cross-pivot turns a single domain into a starting point for hunting an entire infrastructure cluster. This is useful when an operator rotates IPs but leaves a registrar or cert issuer fingerprint constant.

Right-click context menu

Right-click any node (domain, IP, script hash, or wallet) for quick actions:

  • Tag with Campaign or Tag Threat Actor: opens the tagging modal seeded with the artifact ID, so you can attribute discovered infrastructure to a known operation in one step
  • Pivot, copy, or open in a new tab

Tor routing for .onion infrastructure

When a map includes .onion nodes (for example, a clearnet phishing site that mirrors itself on a hidden service), the discovery worker routes those resolutions through Tor, the same way Dark Web Hunter does. Your platform's IP is never exposed to dark-web infrastructure during enrichment.

Composite graphs across shared URL patterns

When a group of domains is held together only by a shared URL pattern (for example, /to-participate appearing across six different domains), the composite map links the sub-clusters explicitly instead of rendering each domain's local infrastructure as a disconnected island. URL-pattern edges are styled distinctly so they're easy to tell apart from infrastructure relationships.

Running a new map

  1. Click New Map in the top right
  2. Enter a domain name or IP address as the starting point
  3. Set the discovery depth (1–3 hops):
    • 1 hop: only direct relationships of the seed domain
    • 2 hops: relationships of the seed and its first-degree neighbors
    • 3 hops: full extended cluster; use sparingly on large hosting providers
  4. Click Discover
  5. The worker crawls the infrastructure graph and renders the interactive map
  6. Click Save Map to store the result for future reference and sharing
tip

Start with depth 1 to get a fast result, then re-run at depth 2 if the initial map reveals interesting neighbors. Running at depth 3 against a shared hosting IP can return hundreds of nodes and take significantly longer.

Stored maps

Previously run maps are listed on the Maps page. Each stored map entry shows the seed domain, risk level, number of nodes discovered, and the date it was run. You can re-open any stored map to interact with the visualization, compare it against a more recent run, or reference it in a report.

Use cases

Use caseHow to use maps
AttributionIdentify all domains run by the same scam operator by following shared infrastructure
Takedown campaignsGet the complete list of domains in a cluster to include in abuse reports and blocking requests
Proactive detectionWhen a new domain appears on known bad infrastructure (an existing node's IP), pre-flag it before it launches
Law enforcementProvide complete infrastructure evidence with node relationships and WHOIS data in LE reports