DEV Community

Teycir Ben Soltane
Teycir Ben Soltane

Posted on

SeekYou: How I Built a Unified Host Intelligence Tool That Runs Free on Cloudflare Workers

One input. 15 sources. One structured report. Zero infrastructure costs.

The Problem

Every security engineer knows the workflow. You get an IP, a domain, or an ASN you need to investigate. You open Shodan in one tab, BGPView in another, crt.sh in a third. You paste the same value into VirusTotal, then into a passive DNS provider, then into two or three threat feeds. Twenty minutes later you have seven browser tabs, a notes file full of copy-pasted snippets, and you're manually trying to reconcile whether the cert history matches the passive DNS timeline.

It's not a hard problem. It's just a tedious one that nobody had solved cleanly for the open-source side of the house.

So I built SeekYou.

What SeekYou Does

SeekYou takes any IP, domain, or ASN as input and returns a single structured intelligence report by querying 15 sources in parallel:

  • Open ports and service banners
  • Known CVEs mapped to running services
  • BGP and routing data
  • RDAP / WHOIS enrichment
  • Certificate history via crt.sh
  • Passive DNS records
  • 5 threat feed lookups — malicious classification, abuse scoring, blocklist status
  • Exposed cloud buckets
  • Wayback Machine snapshots — useful for infrastructure history and phishing page archaeology

The key word is parallel. All 15 sources are queried simultaneously, so your total response time is roughly equal to the slowest single source — not the sum of all 15.

Architecture: Why Cloudflare Workers

I had a few hard requirements going in:

  1. No self-hosted infrastructure — I wanted this to run for free and be instantly deployable by anyone
  2. True parallel execution across 15 external sources
  3. Caching granular enough to be actually useful
  4. Rate limiting and circuit breaking without an external service

Cloudflare Workers satisfied all four cleanly.

The V8 Isolate Advantage

On traditional serverless platforms, cold starts can add hundreds of milliseconds per invocation. When you're fanning out to 15 sources simultaneously, that compounds fast. Workers' V8 isolate model eliminates that problem — isolates start in microseconds, making the fan-out pattern genuinely viable.

4-Layer Parallel Execution Model

Layer 1  Input parsing and normalization
Layer 2  Source fan-out (all 15 queries fire simultaneously)
Layer 3  Per-source response parsing and normalization
Layer 4  Report assembly and diff comparison
Enter fullscreen mode Exit fullscreen mode

Each layer is non-blocking. Layers 3 and 4 begin processing as soon as individual sources return — you're not waiting for all 15 to complete before starting assembly.

Per-Source KV Caching

Each source response is cached independently with a TTL tuned to that source's data freshness:

const SOURCE_TTLS = {
  ports: 3600,
  certs: 86400,
  threatFeeds: 1800,
  bgp: 43200,
  passiveDns: 7200,
};
Enter fullscreen mode Exit fullscreen mode

Partial cache hits work. If 12 of 15 sources are cached, only 3 cold fetches happen. Per-source caching gives proportional speedups on repeat queries — critical for monitoring workflows.

Circuit Breakers

Each source is wrapped in a circuit breaker implemented directly in the Worker:

async function fetchWithCircuitBreaker(source, fetcher) {
  const state = await kv.get(`circuit:${source}`);

  if (state === 'open') {
    return { source, status: 'circuit_open', data: null };
  }

  try {
    const result = await fetcher();
    await kv.put(`circuit:${source}`, 'closed');
    return { source, status: 'ok', data: result };
  } catch (err) {
    await incrementFailureCount(source);
    return { source, status: 'error', data: null };
  }
}
Enter fullscreen mode Exit fullscreen mode

A source failing doesn't kill the report — it returns a graceful null and the rest assembles normally.

Per-IP Rate Limiting

Rate limiting is handled natively in the Worker using KV as the backing store. No external Redis, no rate limiting service. Each client IP gets a sliding window counter, and requests over the threshold get a clean 429 before touching any upstream source.

The Diff Engine

SeekYou can monitor a host over time and alert you when its observable state changes. The diff engine is typed — it tells you specifically what category of change occurred:

  • A port opened or closed
  • A new CVE appeared against a running service
  • A certificate rotated or is approaching expiry
  • The host appeared on a new threat feed
  • A new subdomain appeared in passive DNS
{
  host: "example.com",
  timestamp: "2026-05-19T10:00:00Z",
  changes: [
    { type: "port_opened", detail: { port: 8443, service: "HTTPS" } },
    { type: "cve_added", detail: { id: "CVE-2024-XXXX", severity: "HIGH" } },
    { type: "cert_expiry_warning", detail: { daysRemaining: 14 } }
  ]
}
Enter fullscreen mode Exit fullscreen mode

This turns SeekYou from a one-off lookup tool into something you can build alerting workflows around.

Free Tier Math

Resource Free Limit Usage at 5k lookups/day
Worker requests 100,000/day ~80,000 (orchestration + source fetches)
KV reads 100,000/day Proportional to cache hit rate
KV writes 1,000/day One write per cache miss per source
CPU time 10ms/request Well within limit

At 5k full lookups per day you're comfortably within the free tier on every dimension.

Deployment

git clone https://github.com/Teycir/SeekYou
cd SeekYou
npm install
wrangler deploy
Enter fullscreen mode Exit fullscreen mode

Cloudflare account and Wrangler CLI required. No paid plan needed.

What I'd Build Next

  • Webhook support for the diff engine — push changes to Slack, Discord, or a SIEM
  • Bulk input — accept a list of IOCs via Workers Cron Triggers
  • STIX export format for formal TI workflows
  • Additional sources — Censys, Fofa, and more threat feeds

Wrapping Up

The core insight behind SeekYou is simple: the data is publicly available, the sources all have free tiers, and the only missing piece was an orchestration layer that queries them simultaneously and returns one coherent report. Cloudflare Workers was the right substrate — the isolate model, KV, and native rate limiting covered everything without adding infrastructure complexity.

GitHub: https://github.com/Teycir/SeekYou

Top comments (0)