Threat Intelligence APIs
Supplement your attack surface visibility with resourceful API capabilities to analyze any web asset’s linked infrastructure, suspicious configurations, and malicious connections.
Domain Infrastructure Analysis
Map any domain’s entire DNS infrastructure, including its name servers, subdomains, IP addresses, network location, and subnetworks.
SSL Configuration and Certificate Chain
Discover misconfigurations and issues in a domain’s SSL certificate and its entire SSL certificate chain.
Domain Malware Check
Verify if a domain has been flagged as malicious across industry-leading domain security data sources.
IP-Connected Domains
Find the external digital footprint of an IP address by gathering a list of all the domains and subdomains it hosts.
IP and Domain Reputation
Obtain reputation scores based on multiple security and configuration audit parameters.
-
Expanded Asset Discovery
Catalog even more external-facing assets, including subdomains, IP addresses, SSL certificates, and IP-connected domains.
-
Widened Threat Analysis
Scan assets of interest for hundreds of domain, IP, and SSL misconfigurations and issues that may expose them to or make them vectors of cyber attacks.
-
Easily Integrable APIs
Integrate relevant and updated threat intelligence into your internal systems, applications, cybersecurity operations, and analyses.
What security experts say
Featured Resources
How Are Attack Vectors and Attack Surfaces Related?
Attack vectors and attack surfaces are deeply intertwined cybersecurity concepts. In a nutshell, an attack surface is the sum of all attack vectors in[...]
CWE Vs. CVE Vs. CVSS: What Are the Differences?
When protecting your digital infrastructure from threats, it’s critical to become familiar with security standards like CWE, CVE, and CVSS. These term[...]
How to Find Vulnerabilities in a Website
Website vulnerabilities are exploitable weaknesses that allow attackers to access data without authorization, steal sensitive information, or disrupt[...]