Open navigation

District 4

Modified on: Thu, 10 Nov, 2022 at 9:11 AM

Overview

District 4’s flagship product, Darkside, is an open-source data solution that leverages one of the largest repositories of compromised credentials and other Person of Interest data (PII).


With over 40 billion records and millions of new records added daily from deep and dark web sources around the globe, Darkside is truly at the cutting edge of cyber threat intelligence data.


This data is essential for any online investigation, especially those involving adversarial or anonymous threat actors.

 

District4 data in Maltego


When paired with the link analysis power of Maltego, investigators can quickly pivot off email addresses, domains, IP addresses, names, passwords and other PII to unravel a subject’s online presence; identify threat actors; determine a company’s breach exposure and perform cutting-edge OSINT investigations.


Read more about District4 Transforms for Maltego here.


Pricing & Access

Community Hub

District4 Transforms are only available to Maltego commercial plan users.


Commercial Hub

Users with a Maltego One license have the following purchase options:


  • CLICK-AND-RUN

Simply install the Hub item and start using the Transforms in your Maltego plan

  • Maltego Enterprise: 50 Transform Runs / month


  • DATA SUBSCRIPTION

Purchase annual data subscriptions by reaching out to support@maltego.com.


  • BRING YOUR OWN KEY

Plug in your District4 API key to install and use the Transforms in Maltego.


District 4 Transforms

D4 - Extract Personally Identifiable Information (PII)

Description

Extract meaningful Person of Interest data (PII) from record as well as social media profiles when available.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Extract Personally Identifiable Information
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4piiext
Short DescriptionExtract meaningful PII from record.
Input Entitiesdistrict4.CompromisedRecord
Output EntitiesPhrase

D4 - Leaked Records Search (password)

Description

Search plain-text or passwords that have been cracked by D4.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (password)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchpw
Short Description Search passwords cracked by D4
Input Entitiesdistrict4.Password
Output EntitiesPhrase

D4 - Leaked Records Search (phrase)

Description

Search records for information in other fields like bio, signature, description, userid, connected accounts, etc.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (phrase)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchphrase
Short Description Search records by Phrase
Input Entitiesmaltego.Phrase
Output EntitiesPhrase

D4 - Leaked Records Search (phone)

Description

Search records by phone number. Punctuation and spaces do NOT matter. We recommend you search with and without the country code.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (phone)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchphone
Short Description Search records by phone number.
Input Entitiesmaltego.PhoneNumber
Output EntitiesPhrase

D4 - Leaked Records Search (person)

Description

Search records by name. Order is irrelevant: search is for each term in your query in the name field, e.g., 'John Smith' will return records for 'John Smith', 'Smith John', 'John Robert Smith', etc.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (person)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchperson
Short Description Search records by person Name.
Input Entitiesmaltego.Person
Output EntitiesPhrase

D4 - Leaked Records Search (ip)

Description

Search records by IPv4 or IPv6 address.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (ip)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchip
Short Description Search records by IP
Input Entitiesmaltego.IPv4Address
Output EntitiesPhrase

D4 - Leaked Records Search (email)

Description

Search by email address. Punctuation in the email handle does NOT matter, so 'johnsmith@aol.com' will return records with 'john_smith@aol.com', john.s.mith@aol.com', etc.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (email)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchemail
Short Description Search by email address.
Input Entitiesmaltego.EmailAddress
Output EntitiesPhrase

D4 - Leaked Records Search (domain)

Description

Search for records by domain.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (domain)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchdomain
Short Description Search records by domain.
Input Entitiesmaltego.Domain
Output EntitiesPhrase

D4 - Leaked Records Search (complex)

Description

Search records leveraging an 'AND' query to filter results.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (complex)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchcomplex
Short Description Search records - complex terms
Input Entitiesdistrict4.D4ComplexSearch
Output EntitiesPhrase

D4 - Leaked Records Search (alias)

Description

Search by Alias. Punctuation in the email handle does NOT matter, so 'johnsmith' will return records with 'john_smith', john.s.mith!', etc.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Leaked Records Search (alias)
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4PIIcredsearchalias
Short Description Search records by alias.
Input Entitiesmaltego.Alias
Output EntitiesPhrase

D4 - Email Wildcard Maker

Description

Creates Entity to facilitate searches for a given username as part of an email address.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Email Wildcard Maker
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4emailwild
Short DescriptionCreate wildcard email so you can search for the handle as a substring in the email field.
Input Entitiesmaltego.EmailAddress
Output EntitiesPhrase

Description

Create complex search Entity to allow you to filter searches. A wildcard '*' is allowed at the end of each term.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Create Complex Search
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Short DescriptionCreate complex search Entity to allow you to filter searches
Output EntitiesPhrase

Variants

Transform NameInput Entities
d4complexpersonmaltego.Person
d4complexpassworddistrict4.Password
d4complexdomainmaltego.Domain
d4complexaliasmaltego.Alias

D4 - Wildcard Email Maker

Description

Creates an Entity to facilitate searches for a given username as part of an email address, e.g., johnsmith will capture johnsmith@aol.com, johnsmith123@gmail.com, etc.


Transform Settings

Setting NameDisplay NameSetting TypeDefault ValueOptionalPopupAuthentication
APIKeyAPI Keystring TrueTrueFalse

Transform Meta Info

InformationValue
Display NameD4 - Wildcard Email Maker
OwnerDistrict4
Authorinfo@district4labs.com 
Data SourceD4
Transform Named4aliaswild
Short DescriptionCreate wildcard email so you can search for the handle as a substring in the email field.
Input Entitiesmaltego.Alias
Output EntitiesPhrase


Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.