Sentel Network Intelligence & Utility Engine
A one-stop toolbox for investigating domains, IPs, and internet-facing services during day-to-day operations, threat hunting, and incident response.
Instead of jumping between terminals and external tools, analysts can run the most common checks directly inside Sentel.
Sentel's Network & Intelligence Utility engine capabilities are exposed through a single, unified module, making it easy for SOC analysts, network teams, and incident responders to run quick checks, validate assumptions, and gather evidence—without juggling separate tools or leaving the Sentel Framework.Smart DNS Intelligence
Resolve hostnames, perform reverse lookups (PTR), and run flexible “dig-style” DNS queries against chosen resolvers. This helps you quickly see where a domain points, how it’s configured, and whether DNS changes or misconfigurations might be involved in an incident.
WHOIS Ownership & Registration Checks
Pull WHOIS information for domains and IPs to understand who owns an asset, when it was registered, and where it is hosted. This is ideal for spotting suspicious, newly registered domains or mismatches between claimed brand and infrastructure.
Connectivity & Path Diagnostics (Ping & Traceroute)
Use integrated ping and traceroute to test reachability and see the network path to any host. Teams can quickly answer: “Is this host actually up? Is there a routing or latency issue?”—without leaving the Sentel environment.
HTTP Header & Redirect Analysis
Fetch HTTP(S) response headers and redirect chains to understand how a site behaves: status codes, redirects, server banners, security headers, and more. This is useful both for security reviews (e.g., missing security headers) and for confirming how suspicious URLs behave without fully browsing to them.
TLS Certificate Scanning
Inspect TLS certificates for any internet-facing host: issuer, subject, validity period, and other key details. This supports certificate hygiene checks, detection of misissued or self-signed certs, and verification of secure configurations for critical services.