We supply APIs with exhaustive information on hosts and their infrastructure. By using data received from a range of providers and our own comprehensive internal databases (accumulated for more than a decade), and by conducting real-time host configuration analysis, we provide APIs with meticulous details of the target host. It is a building block in your system of threat detection and prevention.
Contact us at
Investigate a particular domain name and find out all there is to know about its web, mail, and name servers along with its registered subdomains. For each infrastructure entry, reveal its IP address, physical location and subnetwork information.
Investigate a particular domain name and get the specifics of its SSL Certificate, including the complete SSL Certificates chain. The data is compiled in a unified and consistent JSON format that is easy to integrate with your system.
Investigate a particular domain name, establish and test SSL connection to the host and analyze its configuration so as to identify common configuration issues that may result in vulnerabilities.
Investigate a particular domain name and check whether it is deemed dangerous in various security data sources. Dangerous domains are those related to a malware distribution network or hosting a malicious code.
Obtain a list of domain and subdomain names that refer to a certain IP address. Find out whether or not the website in question shares its IP address with malicious domains, as that may lead to overblocking, which is a situation when the blocking of a malicious site causes other sites with the same IP to be blocked as well. Analyze the connected domains infrastructure.
Assess the reputation of a domain on the basis of multiple security data sources and an instant host audit. Investigate a particular domain name, collect its reputation data and implement 120 parameters to calculate the total reputation score.
No credit card or company details required.
Check our threat intelligence data feeds that cover typosquatting and disposable domains and more in the form of downloadable files for use within your own security perimeter.