Discover every voice & video service
from a single domain

SRV, TXT, NAPTR, CNAME, MX — full DNS interrogation across 20+ UC vendors. Microsoft Teams, Cisco Webex, Zoom, RingCentral, Avaya, and more. Passive discovery + optional active SIP probing.

Active probing sends packets to discovered endpoints
Initializing UC discovery engine...
0
Vendors Detected
0
Total Findings
0
Detection Methods
0ms
Scan Duration

UC Services Discovered

Five-stage UC discovery pipeline
Enter a domain. We interrogate every DNS record type that UC vendors use for service discovery and federation.
1
SRV Scan
Query 30+ vendor-specific SRV records: _sip._tls, _sipfederationtls._tcp, _collab-edge._tls, _h323cs._tcp, and more.
2
CNAME/A Probe
Check vanity subdomains: lyncdiscover, sip, meet, webex, pbx, voip, phone — and resolve their targets.
3
TXT Analysis
Parse domain verification records (MS=, ZOOM_verify), SPF includes for UC vendor IPs, and DKIM selectors.
4
NAPTR + MX
Check NAPTR for SIP/ENUM routing. Cross-reference MX with UC vendors to detect M365 voice capability.
5
SIP Probe
Optional: Send SIP OPTIONS to discovered endpoints. Parse User-Agent for device/SBC fingerprinting.
20+ UC platforms detected
From enterprise PBX to cloud UCaaS — we check them all.
Microsoft Teams
Cisco Webex
Zoom Phone
RingCentral
8x8
Vonage / Nexmo
Avaya Aura
Genesys Cloud
BroadSoft
Mitel / ShoreTel
Dialpad
Google Voice
AudioCodes SBC
Oracle SBC
Polycom / Poly
Yealink
Grandstream
Asterisk / FreePBX
FreeSWITCH
Kamailio
Twilio
Bandwidth

Full domain intelligence
in one scan

Subdomain enumeration, certificate transparency, email provider detection, SPF/DMARC/DKIM analysis, and cloud stack fingerprinting — all from a single domain.

Initializing domain intelligence engine...
0
Subdomains Found
0
Live / Resolving
0
Certs (crt.sh)
0
Cloud Providers
Email Provider
MX record analysis
Unknown
🛡️
Email Security
SPF · DMARC · DKIM

Subdomains

Subdomain IPs CNAME Target Cloud Source Cert Expiry
Five-signal domain recon engine
Enter a domain. We run five parallel intelligence collection modules and correlate the results.
1
Subdomain Enum
Probe 80+ common subdomains: www, mail, vpn, api, dev, staging, admin, portal, cdn, and more.
2
Cert Transparency
Query crt.sh for all SSL/TLS certificates ever issued. Reveals subdomains that may not appear in DNS enumeration.
3
Email Provider
Analyze MX records to identify Google Workspace, M365, Proofpoint, Mimecast, and 10+ other providers.
4
Email Security
Parse SPF policy, DMARC enforcement level (none/quarantine/reject), and probe 25+ DKIM selectors.
5
Cloud Detection
Follow CNAME chains to fingerprint AWS, Azure, GCP, Cloudflare, Vercel, Netlify, and 12+ other providers.

Certificate History Timeline

Query Certificate Transparency logs to see every TLS cert ever issued for this domain — issuer migrations, SAN changes, and cert lifecycle history.

Querying Certificate Transparency logs...
0
Total Certs
0
Active
0
Expired
0
Unique CAs

Certificate Authorities

Cert History Timeline

Certificate Transparency archaeology
Every TLS cert is logged to public CT logs. We mine them all to reveal the full certificate lifecycle for your target domain.
🏛️

crt.sh CT Logs

Queries the crt.sh aggregator which indexes all major Certificate Transparency logs — Let's Encrypt, DigiCert, Sectigo, and more.

📅

Temporal Analysis

Shows when certs were issued, who issued them, and when they expired. Reveals issuer migrations (e.g., old DigiCert → Let's Encrypt).

🔍

SAN Coverage

Tracks Subject Alternative Names across cert generations to see new subdomains added over time and infrastructure expansion patterns.

HTTP Header & Tech Fingerprinting

Probe discovered subdomains for Server headers, X-Powered-By, cookies, JS libraries, meta tags. Map the full technology stack per host.

Tip: Run a Domain Intelligence scan first to discover subdomains for deeper coverage.

Probing HTTPS endpoints...
0
Hosts Probed
0
Live Hosts
0
Technologies
0s
Duration

Tech Stack per Host

50+ technology signatures
HTTP headers, HTML meta tags, cookie names, asset paths, and JS library patterns — all mapped to known tech stacks.
🌐

CMS Detection

WordPress, Drupal, Joomla, Squarespace, Ghost, Shopify, Magento, WooCommerce — identified via headers and HTML patterns.

⚙️

Framework Fingerprinting

Laravel, Django, Rails, ASP.NET, Next.js, Nuxt.js, Gatsby — detected via cookies, headers, and JS bundle names.

☁️

CDN & Proxy Detection

Cloudflare (CF-Ray), Fastly (X-Served-By), AWS CloudFront (X-Amz-Cf-Id), Varnish (X-Varnish), Vercel, Netlify.

TLS/SSL Security Analysis

Check cipher suites, protocol versions, certificate chain, HSTS, and CT log status. Grade the TLS configuration for the domain and all discovered subdomains.

Negotiating TLS handshakes...
0
Hosts Analyzed
0
TLS Enabled
Overall Grade
TLS Version

Host TLS Assessment

A+ to F TLS grading
Grades reflect the overall security posture: protocol version, cipher strength, HSTS presence and duration, and certificate health.
🏆

A+ Grade

TLS 1.3, HSTS with max-age ≥ 1 year and includeSubdomains. No deprecated ciphers or expired certs.

⚠️

B Grade

TLS 1.2 but missing HSTS or max-age too short. Acceptable protocol version but room for improvement.

🚨

F Grade

TLS 1.0 enabled (deprecated since 2020), expired certificate, self-signed cert, or RSA key under 2048 bits.

IP Intelligence

ASN lookup, geolocation, reverse DNS, hosting provider identification, and shared hosting detection for every IP tied to this organization.

Tip: Run Domain Intelligence first to discover subdomain IPs for full coverage.

Resolving IP addresses...
0
IPs Analyzed
0
Unique ASNs
0
Countries
0
Hosting Providers

IP Intelligence Map

IP intelligence pipeline
Cross-references multiple sources to build a complete picture of the target's internet infrastructure footprint.
🌍

Geolocation

Country, region, city, and coordinates. Timezone detection for operational planning.

🏢

ASN & ISP

Autonomous System Number identifies the network operator. ISP field shows the internet service provider. Critical for network attribution.

🔄

Hosting Detection

Identifies cloud hosts (AWS, Azure, GCP, Cloudflare, DigitalOcean) vs. on-premise or colocation. Flags shared hosting environments.

DNS Security Assessment

DNSSEC validation, dangling CNAME detection (subdomain takeover risk), zone transfer testing, SPF/DMARC misconfiguration checks.

Checking DNSSEC and nameservers...
0
Findings
0
Takeover Risks
0
Risk Score
DNSSEC
0
Risk Score
🔐 DNSSEC
📤 Zone Transfer
🎯 Subdomain Takeover
📌 DANE / TLSA

Security Findings

DNS attack surface analysis
DNS is often overlooked in security assessments. We check for the issues that matter most to red teams and security researchers.
🎯

Subdomain Takeover

Dangling CNAMEs pointing to unclaimed accounts on GitHub Pages, Heroku, Netlify, Vercel, Azure, S3, and 20+ other platforms.

📤

Zone Transfer (AXFR)

Misconfigured nameservers that respond to AXFR queries expose the entire DNS zone — every subdomain, MX record, and internal hostname.

📧

Email Spoofing

Missing or misconfigured SPF (+all policy), absent DMARC, or p=none enforcement — all enable impersonation attacks targeting the organization.

Passive DNS History

Historical DNS resolution data from HackerTarget and Certificate Transparency. See infrastructure changes, IPs rotated, and hosts discovered over time.

Querying HackerTarget passive DNS...
0
Total Records
0
Unique Hosts
0
Unique IPs
0
Source Records
HostnameIP AddressTypeSource
Run a scan to see results
Passive DNS intelligence
Passive DNS data is collected by passive DNS sensors embedded in resolvers worldwide. It reveals historical associations between hostnames and IPs.
📡

HackerTarget

Provides hostsearch data aggregated from passive DNS sensors. Returns hostname:IP pairs seen on the internet.

📜

Certificate Transparency

Cross-references crt.sh SANs to discover hostnames that appear in TLS certificates — even if they no longer resolve in DNS.

🔄

Shared Hosting Detection

IPs serving multiple hostnames indicate shared hosting — important for attribution and understanding blast radius of compromise.

🔭 Deep Recursive Scan

Discover every subdomain via wordlist brute-force + Certificate Transparency, then run all OSINT modules against each one — TLS grading, tech stack, IP intelligence, and subdomain takeover detection.

Discovering subdomains...
0%
Initializing scan engine...
🔭

Enter a domain and click Deep Scan to discover all subdomains and run full OSINT against each one.

Typical scan: 50–200 subdomains in 2–5 minutes.

Every subdomain. Every module.
Deep Scan combines subdomain discovery with full OSINT — giving you a complete attack surface map in one click.
🌐

Subdomain Discovery

Wordlist brute-force (80+ common patterns) + Certificate Transparency logs (crt.sh). Every discovered subdomain is resolved to IPs.

🔒

TLS Grading per Subdomain

Connects to HTTPS on every live subdomain. Analyzes protocol version, cipher, HSTS, cert expiry. Grades A+ → F — finds forgotten subdomains with weak configs.

🔬

Tech Stack Fingerprinting

HTTP header analysis reveals server software, framework, CDN, and CMS for every subdomain — even ones you didn't know were live.

🌍

IP Intelligence

Maps each subdomain to ASN, hosting provider, and country. Shows which infrastructure providers your org uses across all subdomains.

⚠️

Subdomain Takeover Detection

Checks every CNAME for dangling pointers to GitHub Pages, Heroku, Netlify, Vercel, AWS S3, and 18 other vulnerable platforms.

Parallel Batching

Scans 8 subdomains concurrently with per-subdomain timeouts. No waiting — results appear as each batch completes.

WHOIS Registration Data

Domain registration details via RDAP (Registration Data Access Protocol). Shows registrar, registration date, expiry, nameservers, and domain status.

Querying RDAP registry...
Modern WHOIS replacement
RDAP provides structured JSON responses from authoritative registrar databases — more reliable and consistent than legacy WHOIS queries.
📅

Registration Dates

Creation date, last updated, and expiry date. Critical for detecting domains near expiry that could be hijacked if not renewed.

🔒

Domain Status

EPP status codes: clientTransferProhibited, serverHold, pendingDelete — each has security implications for domain hijacking risk.

🌐

Nameservers

Current authoritative nameservers. Changes to nameservers can indicate domain hijacking or DNS provider migrations.

Open Port Intelligence

Discovers open ports, exposed services, and known CVEs via Shodan's InternetDB. No active probing — uses Shodan's prebuilt index for passive discovery.

Resolving IPs...
Shodan InternetDB — passive port intel
No active scanning. We query Shodan's prebuilt index of the internet — completely passive, no packets sent to the target.
🔌

Open Ports

All TCP/UDP ports Shodan has observed as open. Includes common dangerous services: RDP (3389), SMB (445), Redis (6379), Docker (2375), Elasticsearch (9200).

⚠️

Known CVEs

CVEs indexed by Shodan against the IP based on banner information. Identifies unpatched software before active exploitation occurs.

🏷️

Tags & CPEs

Shodan tags (cloud, self-signed, honeypot) and CPE identifiers for software/hardware running on the IP. Useful for vendor tracking.

Risk Intelligence

Unified view across all scanner modules. Correlates findings from DNS Security, TLS, Port Intel, WHOIS, Deep Scan, and more to surface the highest-priority risks.

Correlating findings across all modules...
Cross-module risk correlation
Run the individual scanners first, then use Risk Intel to connect the dots. It applies security correlation rules across all scan data.
🔗

Cross-Module Correlation

Links findings across DNS Security, TLS Analysis, Port Intel, WHOIS, and Deep Scan. A dangling CNAME + expired TLS = amplified risk.

📊

Risk Scoring

Each correlated finding includes a CVSS-like severity score. Findings are sorted so the most critical issues surface first.

🎯

Prioritized Remediation

Instead of 8 separate result sets, get one prioritized list of what to fix. Start with Critical, then High — ignore the noise.