Ollama running on 10.10.0.210:11434 with a model pulled (e.g., llama3:8b)
(Optional) API keys for enhanced OSINT sources
2. Deploy
# Clone the repository
git clone https://github.com/icepaule/IceSpider.git
cd IceSpider
# Copy and edit environment configurationcp config/env.example .env
nano .env # Add your API keys# Generate self-signed TLS cert (or add your own to certs/)
./scripts/generate-cert.sh
# Build and start
docker-compose up -d--build# Verify Ollama connectivity
docker-compose exec spiderfoot python -c"
import requests
r = requests.get('http://10.10.0.210:11434/api/tags')
print('Ollama models:', [m['name'] for m in r.json().get('models', [])])
"
3. Access
Web UI: https://localhost (via Nginx) or http://localhost:5001 (direct)
Default credentials (change in .env): icespider / IceSpider2024!
4. Configure API Keys
Open the SpiderFoot web UI, go to Settings and add API keys for maximum coverage:
Priority
Source
Free Tier
1
Shodan
100 queries/month
2
VirusTotal
4 req/min, 500/day
3
AlienVault OTX
Unlimited
4
GreyNoise Community
Unlimited
5
Censys
250 queries/month
6
SecurityTrails
50 queries/month
7
ipinfo.io
50k req/month
8
urlscan.io
100 scans/day
9
AbuseIPDB
1000 checks/day
10
Have I Been Pwned
Limited free
5. Run AI-Enhanced Scan
# Using the orchestrator script
docker-compose exec spiderfoot python /home/spiderfoot/scripts/orchestrator.py \--target example.com \--name"Full OSINT Scan"\--usecase all \--ai-report# Or use the web UI and let the Ollama modules work automatically
Custom Modules
Ollama AI Modules
Module
Description
sfp_ollama_analyzer
Analyzes malicious indicators and vulnerabilities with AI threat assessment
sfp_ollama_summarizer
Generates executive summaries at scan completion
sfp_ollama_entities
Extracts structured entities (names, orgs, tech) from unstructured content
Additional OSINT Modules
Module
Description
sfp_abuseipdb
IP address reputation and abuse reports from AbuseIPDB
sfp_cve_enrich
CVE detail enrichment from NIST NVD API
Custom Correlation Rules
Rule
Risk
Description
ai_threat_convergence
HIGH
Multiple AI-flagged threats on same host
exposed_admin_panels
HIGH
Admin panels with weak security indicators
credential_exposure_chain
HIGH
Email found in breaches + credentials leaked
shadow_infrastructure
MEDIUM
Forgotten/stale infrastructure with active services