Skip to main content
DFIRLab
ResearchIntel BriefingsPhishing CheckDomain LookupExposure ScannerPrivacy CheckAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Free Tool

Internet Exposure Scanner

Discover what attackers see when they look at your domain or IP address. Open ports, subdomains, TLS configuration, DNS records, WHOIS data, and known vulnerabilities -- all from passive reconnaissance.

All queries use passive reconnaissance. No active scanning or probing is performed.

What You Get

This tool queries 10 intelligence sources in parallel -- including certificate transparency logs, Shodan, Censys, SSL Labs, Criminal IP, SecurityTrails, and others -- to produce a unified exposure report:

Discovered subdomains
Open ports & services
TLS certificate health
DNS configuration
WHOIS registration
Network ownership & ASN
Known vulnerabilities (CVEs)
Composite risk score (0-100)

All data is gathered passively -- no traffic is sent to the target.

5 free scans per hour -- no account required
Who Is This For

Security Teams

Audit your organization's external attack surface. Find forgotten subdomains, exposed services, and weak TLS configurations.

Penetration Testers

Kickstart reconnaissance with a comprehensive passive scan. Gather subdomains, open ports, and CVEs in one sweep.

System Administrators

Verify your infrastructure is configured correctly. Check DNS records, certificate expiry, and exposed services.

Bug Bounty Hunters

Expand your scope with subdomain enumeration and service discovery. Identify targets for deeper investigation.

How It Works
01

Enter a Target

Type any domain name (e.g., example.com) or IP address. The scanner auto-detects the target type.

02

Passive Reconnaissance

We query multiple threat intelligence providers simultaneously -- certificate transparency logs, DNS resolvers, WHOIS databases, and vulnerability feeds.

03

Analyze Results

Review your exposure across 7 categories. Each finding includes context about what it means and why it matters for security.