Chiasmodon | An OSINT Tool Designed To Assist In The Process Of Gathering Information About A Target Domain



Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. the tool allows users to search by domain, CIDR, ASN, email, username, password, or Google Play application ID.


  • :globe_with_meridians:Domain: Conduct targeted searches by specifying a domain name to gather relevant information related to the domain.
  • :video_game:Google Play Application: Search for information related to a specific application on the Google Play Store by providing the application ID.
  • :mag_right:CIDR and :1234:ASN: Explore CIDR blocks and Autonomous System Numbers (ASNs) associated with the target domain to gain insights into network infrastructure and potential vulnerabilities.
  • :email:Email, :bust_in_silhouette:Username, :lock:Password: Conduct searches based on email, username, or password to identify potential security risks or compromised credentials.
  • :earth_africa:Country: Sort and filter search results by country to gain insights into the geographic distribution of the identified information.
  • :clipboard:Output Customization: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.
  • :gear:Additional Options: The tool offers various additional options, such as viewing different result types (credentials, URLs, subdomains, emails, passwords, usernames, or applications), setting API tokens, specifying timeouts, limiting results, and more.

:rocket:Comming soon

  • :iphone:Phone: Get ready to uncover even more valuable data by searching for information associated with phone numbers. Whether you’re investigating a particular individual or looking for connections between phone numbers and other entities, this new feature will provide you with valuable insights.
  • :office:Company Name: We understand the importance of comprehensive company research. In our upcoming release, you’ll be able to search by company name and access a wide range of documents associated with that company. This feature will provide you with a convenient and efficient way to gather crucial information, such as legal documents, financial reports, and other relevant records.
  • :bust_in_silhouette:Face (Photo): Visual data is a powerful tool, and we are excited to introduce our advanced facial recognition feature. With “Search by Face (Photo),” you can upload an image containing a face and leverage cutting-edge technology to identify and match individuals across various data sources. This will allow you to gather valuable information, such as social media profiles, online presence, and potential connections, all through the power of facial recognition.

Why Chiasmodon name ?

Chiasmodon niger is a species of deep sea fish in the family Chiasmodontidae. It is known for its ability to swallow fish larger than itself. and so do we. :wink: Chiasmodon background

:key: Subscription

Join us today and unlock the potential of our cutting-edge OSINT tool. Contact on Telegram to subscribe and start harnessing the power of Chiasmodon for your domain investigations.


pip install chiasmodon


Chiasmodon provides a flexible and user-friendly command-line interface and python library. Here are some examples to demonstrate its usage:

usage: [-h] [-d DOMAIN] [-a APP] [-c CIDR] [-s ASN] [-e EMAIL] [-u USERNAME] [-p PASSWORD] [-C COUNTRY]
                         [-vt {cred,url,subdomain,email,password,username,app}] [-o OUTPUT] [-ot {text,json,csv}] [--init INIT] [-A] [-de] [-T TIMEOUT] [-L LIMIT]

Chiasmodon CLI

  -h, --help            show this help message and exit
  -d DOMAIN, --domain DOMAIN
                        Search by domain.
  -a APP, --app APP     Search by google play applciton id.
  -c CIDR, --cidr CIDR  Search by CIDR.
  -s ASN, --asn ASN     Search by ASN.
  -e EMAIL, --email EMAIL
                        Search by email, only pro, only pro account.
  -u USERNAME, --username USERNAME
                        Search by username, only pro account.
  -p PASSWORD, --password PASSWORD
                        Search by password, only pro account.
  -C COUNTRY, --country COUNTRY
                        sort result by country code default is all
  -vt {cred,url,subdomain,email,password,username,app}, --view-type {cred,url,subdomain,email,password,username,app}
                        type view the result default is "cred".
  -o OUTPUT, --output OUTPUT
                        filename to save the result
  -ot {text,json,csv}, --output-type {text,json,csv}
                        output format default is "text".
  --init INIT           set the api token.
  -A, --all             view all result using "like",this option work only with (-d or --domain , -a or --app),default is False
  -de, --domain-emails  only result for company domain, this option work only with -d or --domain, default is False
  -T TIMEOUT, --timeout TIMEOUT
                        request timeout default is 60.
  -L LIMIT, --limit LIMIT
                        limit results default is 10000.
  -v, --version         version.


    # Search for target domain, you will see the result for only this "" --domain

    # Search for target subdomains --domain --all

    # Search for target domain, you will see the result for only this "" on United States --domain --country US

    # search for target app id --app com.example

    # Search for target asn --asn AS123 --type-view cred

    # Search for target username --username someone --country CA

    # Search for target password --password example@123

    # Search for target cidr --cidr x.x.x.x/24

    # Search for target creds by domain emsils --domain --domain-emails --domain --domain-emails --output example-creds.json --output-type json --domain --domain-emails --view-type email --output example-emails.txt --output-type text

    # Search for target subdomain --domain --view-type subdomain

    # Search for target email --email [email protected] --email [email protected] --view-type url

    # search for multiple targets: --domain targets.txt --output example-creds.txt --domain targets.txt --view-type url --output example-urls.txt

How to use pychiasmodon library:

from pychiasmodon import Chiasmodon as ch token = “PUT_HERE_YOUR_API_KEY” obj = ch(token)

  • Search for target subdomains:
    • Command line --domain --all

  • Python

result =‘’,method=‘domain’, all=True) for i in result: print(i)

  • Searching for target domain, you will see the result for only this “
    • Command line --domain

  • Python

result =‘’,method=‘domain’) for i in result: print(i)

  • Searching for target domain, you will see the result for only this “” on United States:
    • Command line --domain --country US

  • Python

result =‘’,method=‘domain’,country=“US”) for i in result: print(i)

  • Searching for target application ID on the Google Play Store:
    • Command line --app com.discord

  • Python

result =‘com.example’,method=‘app’) for i in result: print(i)

  • Searching for target ASN:
    • Command line --asn AS123 --view-type cred

  • Python

result =‘AS123’,method=‘asn’, view_type=‘cred’) for i in result: print(i)

  • earching for target username:
    • Command line --username someone

  • Python

result =‘someone’,method=‘username’) for i in result: print(i)

  • Searching for target password:
    • Command line --password example@123

  • Python

result =‘example@123’,method=‘password’) for i in result: print(i)

  • Searching for target CIDR:
    • Command line --cidr x.x.x.x/24

  • Python

result =‘x.x.x.x/24’,method=‘cidr’) for i in result: print(i)

  • Searching for target credentials by domain emails:
    • Command line --domain --domain-emails

  • Python

result =‘’,method=‘domain’, only_domain_emails=True) for i in result: print(i)

  • All methods and view types:
Methods View Type
–domain, --email, --cidr, --app, --asn, --username, --password –view-type cred
–cidr, --asn, --email, --username, --password –view-type app
–domain, --email, --cidr, --asn, --username, --password –view-type url
–domain –view-type subdomain
–domain, --cidr, --asn, --app –view-type email
–domain, --cidr, --app, --asn, --email, --password –view-type username
–domain, --cidr, --app, --asn, --email, --username –view-type password

Please note that these examples represent only a fraction of the available options and use cases. Refer to the documentation for more detailed instructions and explore the full range of features provided by Chiasmodon.

:speech_balloon: Contributions and Feedback

Contributions and feedback are welcome! If you encounter any issues or have suggestions for improvements, please submit them to the Chiasmodon GitHub repository. Your input will help us enhance the tool and make it more effective for the OSINT community.


Chiasmodon is released under the MIT License. See the LICENSE file for more details.


Chiasmodon is intended for legal and authorized use only. Users are responsible for ensuring compliance with applicable laws and regulations when using the tool. The developers of Chiasmodon disclaim any responsibility for the misuse or illegal use of the tool.


Chiasmodon is the result of collaborative efforts from a dedicated team of contributors who believe in the power of OSINT. We would like to express our gratitude to the open-source community for their valuable contributions and support.

:link:Chiasmodon Links

star time