The prompt is the main searchterm provided to the tool. This needs to be in a format required by the tool otherwise an error may be returned. For example some tools may require URLs while others may require IP addresses.
Some options may be required while others are optional. If there are no options, an empty object should be provided.
The default API key is provided as an example only. This will not work in your own applications. Register for a free account to get an API key.
The DNS Lookup Records tool provides an efficient and reliable way to retrieve and analyze DNS records associated with a domain, aiding in the assessment of network configurations, troubleshooting, and security auditing.
IPv4 address record - A DNS resource record that maps a domain name to an IPv4 address.
IPv6 address record - A DNS resource record that maps a domain name to an IPv6 address.
Canonical name record - A DNS resource record that specifies an alias or canonical name for a domain name.
Mail exchange record - A DNS resource record that identifies the mail servers responsible for accepting incoming emails for a domain.
Name server record - A DNS resource record that indicates the authoritative name servers for a domain.
Pointer record - A DNS resource record used in reverse DNS lookups to map an IP address to a domain name.
Start of authority record - A DNS resource record that provides authoritative information about a DNS zone, including the primary name server and contact information.
Service locator record - A DNS resource record that specifies the location of services, such as domain controllers or SIP servers, for a domain.
Text record - A DNS resource record that can store arbitrary text-based information associated with a domain.
Sender Policy Framework record - A DNS TXT record that helps prevent email spoofing by specifying the authorized mail servers for a domain.
Domain-based Message Authentication, Reporting, and Conformance record - A DNS TXT record that enhances email authentication and provides policies for handling email messages that fail authentication checks.
The HTTP Status Check tool verifies the status of a given URL or website by examining the HTTP response codes returned, providing users with information on the availability and responsiveness of the web server, as well as any potential issues or errors encountered during the request.
OK - The request has succeeded. The server has successfully fulfilled the request and returned the requested content.
Created - The request has been fulfilled, and a new resource has been created as a result.
No Content - The server has successfully processed the request, but there is no content to return.
Moved Permanently - The requested resource has been permanently moved to a new URL. The client should update its bookmarks or links to the new URL.
Found - The requested resource temporarily resides under a different URL. The client should use the new URL provided in the response for future requests.
Bad Request - The server cannot process the request due to malformed syntax, invalid parameters, or other client-side errors.
Unauthorized - The request requires authentication. The client must provide valid credentials.
Forbidden - The server understood the request, but the client is not allowed to access the requested resource.
Not Found - The server could not find the requested resource.
Internal Server Error - A generic server error occurred, indicating that something unexpected went wrong on the server side.
Service Unavailable - The server is currently unable to handle the request due to temporary overloading or maintenance.
Gateway Timeout - The server, acting as a gateway or proxy, did not receive a timely response from an upstream server.
The X509 tool facilitates the inspection and analysis of X.509 digital certificates, allowing users to examine key details such as certificate validity, issuer information, subject details, cryptographic algorithms, and other critical attributes, aiding in the assessment of certificate authenticity and security compliance.
The entity (such as a person, organization, or device) to which the certificate is issued.
The entity that issues the certificate, usually a certificate authority (CA).
The period during which the certificate is considered valid, typically specified by a start and end date.
The cryptographic key used for encryption, digital signatures, or key exchange.
Specifies the purposes for which the public key can be used (e.g., encryption, digital signature, key agreement).
Subject Alternative Name (SAN) is an extension that allows additional identities (such as domain names or IP addresses) to be associated with the subject of the certificate.
Certificate Revocation List (CRL) is a list maintained by the CA that contains the serial numbers of revoked certificates.
Authority Key Identifier (AKI) is a unique identifier that helps locate the public key corresponding to the CA that issued the certificate.
Subject Key Identifier (SKI) is a unique identifier that helps identify the public key corresponding to the subject of the certificate.
The Blacklist tool checks if a domain or IP address is listed on popular blacklists used for identifying and blocking potentially malicious or spammy entities, providing valuable information about the reputation and potential security risks associated with the queried entity.
The Web Spider tool automatically crawls through webpages, extracting and collecting URL links from within the website, providing users with a comprehensive list of interconnected pages and resources, facilitating tasks such as website mapping, link analysis, and content indexing.
The Port Scan tool scans a target system or network for open ports, providing information on which ports are actively listening and potentially vulnerable to unauthorized access, aiding in network security assessments, vulnerability detection, and firewall configuration analysis.
A communication endpoint or logical construct used in network protocols to identify specific services or processes.
A port that is accessible and actively listening for incoming connections.
A port that is accessible but not actively listening for incoming connections.
A port that is being blocked by a firewall, preventing the scanner from determining its status.
A port scanning technique where the scanner attempts to avoid detection by sending packets that are unlikely to trigger a response.
A type of scan that leverages ICMP (Internet Control Message Protocol) packets to gather information about hosts or networks.
A type of port scan that sends TCP SYN packets to determine if ports are open, closed, or filtered.
A type of scan that sends TCP ACK packets to determine if ports are filtered or unfiltered.
A type of port scan that sends UDP packets to determine if ports are open or closed.
A type of scan that involves scanning IP addresses to identify active hosts within a network range.
A network scan that uses the Address Resolution Protocol (ARP) to map IP addresses to MAC addresses in a local network.
The process of gathering information about a target system, such as its operating system, services, and versions, to aid in further exploitation or enumeration.
The Subdomain Finder tool scans and searches for subdomains associated with a given domain or website. It explores different DNS records, performs various DNS queries, and utilizes different techniques to discover subdomains that are part of the target domain's infrastructure. The tool provides valuable information about subdomains, aiding in reconnaissance, security assessments, and identification of potential attack vectors or misconfigurations.
Finds lookalike domain names that adversaries can use to attack your organization. This tool is useful brand protection allowing you to see what your users may be clicking on.
The Software Scanner tool scans a target website or web server for software, providing users with a list of software and their versions. This tool first gathers a list of subdomains from DNS records and then crawls each page for a list of URLs. Each URL is then tested for software to find the software and version. We then search for vulnerabilities in identified software versions and report the results