
SecurityTrails
SecurityTrails gives your AI agent access to 3 billion WHOIS records, 203 million domains, and 1 billion passive DNS datasets. Security teams ask questions about domains, IPs, and SSL certificates and your agent delivers forensic-grade intelligence instantly.




DNS records, WHOIS history, IP intelligence, SSL certificates, and company-associated infrastructure. Your AI agent conducts security research through SecurityTrails without leaving the conversation.
SecurityTrails
From incident response to attack surface mapping, see how AI agents leverage SecurityTrails to perform security reconnaissance that would normally require dedicated tools and manual investigation.
A SOC analyst receives an alert about traffic to a suspicious domain. They ask the AI agent to investigate. The agent queries SecurityTrails for DNS records, WHOIS history, and associated IPs. Within seconds, the analyst sees the domain was registered two days ago, uses a privacy proxy, and shares infrastructure with known malicious domains. Triage that took 30 minutes happens in one conversation.
A penetration tester needs the full digital footprint of a target company. The agent queries SecurityTrails for all IPs associated with the company domain, retrieves subdomains, checks SSL certificates, and maps open ports. The complete attack surface assessment starts in the conversation before any active scanning begins.
Your brand security team suspects someone registered a lookalike domain. The agent searches SecurityTrails for domains containing your brand name, retrieves their registration dates and hosting details, and flags any that were created recently with suspicious registrars. Potential phishing domains identified before they target your customers.

SecurityTrails
FAQs
The agent accesses current DNS records including A, AAAA, MX, NS, SOA, TXT, and CNAME records for any domain. SecurityTrails also provides DNS record statistics showing the count and types of records associated with a domain, plus historical DNS changes for tracking infrastructure modifications over time.
Yes. SecurityTrails offers both DSL queries for IP searches and a SQL-like query API for hosts and IPs. The agent can execute complex filters like 'SELECT * FROM hosts WHERE domain LIKE %target%' or DSL expressions like 'ip = 8.8.8.8 AND port = 443'. Results paginate through scroll IDs for large datasets.
SecurityTrails maintains a daily-updating database of over 203 million domain names and over 1 billion passive DNS datasets. Domain records, WHOIS data, and IP associations refresh continuously. When the agent queries SecurityTrails, it retrieves the most recent data available in the platform.
No. All SecurityTrails queries execute in real-time during conversations. Domain records, IP data, SSL certificates, and WHOIS information are used solely to generate the agent's response. Tars does not persist a copy of SecurityTrails intelligence data in any separate database.
Yes. The agent uses SecurityTrails' Company Associated IPs endpoint. Provide a company domain name, and SecurityTrails returns all IP addresses linked to that organization. This is invaluable for attack surface mapping, shadow IT discovery, and understanding an organization's complete internet-facing infrastructure.
The agent retrieves both current and historical SSL certificate data for any hostname, including the certificate issuer, subject, validity dates, serial number, and certificate chain. This helps verify SSL configurations, detect certificate changes, and identify domains sharing the same certificate authority.
Manual DNS lookups show current records for one domain at a time. SecurityTrails provides historical records, WHOIS data, associated IPs, SSL certificates, and cross-domain intelligence across billions of records. The AI agent combines multiple SecurityTrails queries to build a complete picture that would take hours of manual investigation.
Yes. The agent can list existing ASI (Attack Surface Intelligence) projects and bulk add or remove static asset monitoring rules. This enables programmatic management of your attack surface monitoring from within conversations. Changes process asynchronously, and the agent can verify them through the Get Static Assets endpoint.
Don't limit your AI Agent to basic conversations. Watch how to configure and add powerful tools making your agent smarter and more functional.

Privacy & Security
At Tars, we take privacy and security very seriously. We are compliant with GDPR, ISO, SOC 2, and HIPAA.