SIERRA Cloud / Live Catalog
Run from SIERRA Desktop
Browse here first, then launch the Cloud Invoker you need from the desktop workspace.
Keep results with your case
Cloud output lands inside the same graph as your notes and evidence.
Cloud Invokers Listed
25
Token-based Cloud Usage
Plans and token packs control paid cloud execution.
Catalog
Showing 25 of 25 Cloud Invokers
Availability may change as Cloud Invokers are added, revised, or temporarily removed.
Start from a domain, IP, URL, or exposed asset and expand outward into DNS, hosting, network ownership, and internet-facing exposure.
Review public abuse reports and reputation signals for an IP address.
Map an IP address to its network owner, ASN, and likely country.
Map a domain's DNS footprint, related hosts, and internet-facing infrastructure.
Resolve a domain to its current IP address.
Pull a fast snapshot of open ports, hostnames, and exposed services for an IP.
Estimate the likely geographic location and network context of an IP address.
Check whether a domain, IP, or URL appears in LeakIX exposure data.
Find publicly exposed subdomains tied to a domain.
Submit a URL for an external scan and review the resulting page, verdict, and screenshot summary.
Look up domain registration details and ownership clues from WHOIS records.
Trace public account surfaces from an email, username, phone number, or profile across services.
Check whether an email address appears in known public breach data.
See which services appear to have an account for an email address.
Check whether an email address appears deliverable and valid.
Search for a username across many public sites and profile patterns.
Summarize a Reddit account's public profile and visible activity surface.
Find confirmed public profiles tied to a username across supported sites.
Check whether a phone number appears linked to a Telegram account.
Look up carrier and numbering metadata for a phone number.
Follow wallet activity, counterparties, portfolios, and single transactions across supported public chains.
Build a first-hop graph of recent counterparties for a Bitcoin wallet.
Summarize recent Ethereum wallet activity.
Inspect a single on-chain transaction on a selected chain.
Review recent activity and native balance for a wallet on a selected chain.
Inspect token, NFT, and asset holdings for a wallet on a selected chain.
Begin with a screenshot or photo and extract visible text or location clues from the image itself.
Estimate likely location clues from visual content in an image.
Extract visible text from a screenshot or photo.
Next Step
Use this page to see what is available, then run those Cloud Invokers from the SIERRA desktop workspace where graph state, notes, evidence, and cloud results stay in one flow.
In silence, patterns emerge.
OSINT tools for modern investigators and security professionals.
© 2026 Phantom Helix Intelligence. All rights reserved.
Made with ❤️ for the OSINT community