Loading...

Trusted by 50,000 Websites

We Detect Security Vulnerabilities

Expert Security Checkup For Your Website

Malware Infections

Website:

Hosting server:

Leaked Passwords

Number of leaked passwords:

Domain Name

Days to expiration:

Subdomains

Number of subdomains:

Email Security

MX:

SPF:

DMARC:

SSL Certificate

Grade:

Days to expiration:

Open Ports

Number of open ports:

Vulnerabilities

Number of vulnerabilities:

Purchase Your Security Report

All the security issues we have detected on your website, including detailed mitigation recommendations, are available to you both in PDF and Excel formats. Get your report today!

Review Detailed Results Below:

Details
Data Timestamp

Registrar

Name Servers

Registration Date

Expiration Date

Malware Infections

Summary

Domain Information

Your domain is a part of your brand name. It is the name of your business online.

When people search your domain name online, they find your contact details, reviews, articles, interviews, social media profiles, and your website, among other things.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Keep your website clean from malware infections.
  • Enable auto-renewal for your domain to make sure it's never expired.
  • Configure at least two name servers for your domain name.
Details
Data Timestamp

IP Address

ISP

Country

Malware Infections

Summary

IP Information

Your IP address is the address of your website hosting server online.

Most of the hosting providers host your website on a shared server, with hundreds of other websites sharing the same IP address with you.

When you're using a dedicated hosting server (it's more expensive than a shared one), you benefit from better control, performance, security, and reputation as no other websites are sharing your server's resources.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Keep your server clean from malware infections.
  • Choose the closest hosting country to your customers' countries of residence.
  • Always prefer a dedicated hosting server over a shared one.
Details
Data Timestamp

Subdomains ()

Summary

Subdomains

Your subdomains are a part of your domain name. They help you to organize your digital assets, such as servers, APIs, and other business-related services.

When your customers browse or get redirected between the different services you provide online, your subdomains provide them with helpful context and help maintain trust.

Cybercriminals typically map your public subdomains to find what servers belong to your business and try to compromise them.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Keep track of your subdomains and delete the ones you don't need anymore.
  • Don't disclose sensitive information in your subdomain names (e.g., customer names).
  • Consider SEO best-practices when using subdomains. In some cases, using subdirectories instead of subdomains might be more beneficial for your online ranking.
Details
Data Timestamp

Leaked Passwords ()

Summary

Leaked Passwords

Cybercriminals are constantly trying to collect valid email addresses, usernames, and passwords to make a quick profit.

The credentials they acquire via Phishing scams and data breaches typically end up for sale to the highest bidder across marketplaces on the dark web.

We monitor the dark web to detect any credentials related to your domain name, so you could protect your business and customers before the cybercriminals can abuse them.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Never reuse the same password for multiple services.
  • Use a password manager and change your passwords frequently.
  • Enable two-factor authentication on any service that supports this feature.
(MX) Details
Data Timestamp

Status

Info A mail exchanger record (MX record) specifies the mail servers responsible for accepting email messages on behalf of a domain name.
Value

Summary

(SPF) Details
Data Timestamp

Status

Info Sender Policy Framework (SPF) lets the domain owner authorize IP addresses that are allowed to send email for the domain.
Receiving servers can verify that messages appearing to come from a specific domain are sent from servers allowed by the domain owner.
Value

Summary

(DMARC) Details
Data Timestamp

Status

Info Domain-based Message Authentication, Reporting, and Conformance (DMARC) tells receiving mail servers what
to do when they get a message that appears to be from your organization, but doesn't pass authentication checks,
or doesn't meet the authentication requirements in your DMARC policy record. Messages that aren't authenticated
might be impersonating your organization, or might be sent from unauthorized servers.
Value

Summary

Email Security

It's a common business practice to send and receive email messages using your domain, rather than using free email addresses such as @gmail.com and @yahoo.com.

Several email security protocols can improve your email deliverability to your customers' inbox (e.g., SPF, DKIM, and DMARC).

When not configured properly, it increases the chance that your email messages will end up in your customers' spam folder.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Configure valid MX records to receive email messages on behalf of your domain.
  • Setup and enable the SPF, DKIM, and DMARC email security protocols to improve your email deliverability.
  • Make sure your domain name and IP address are not blocked by spam filters.
Details
Data Timestamp

Issuer

Expiration Date

Grade

Summary

SSL Information

A valid SSL certificate helps you to build trust with your customers online.

When they browse to your website via the secure and encrypted HTTPS protocol, your customers' web browser will automatically warn them about missing or invalid SSL certificates.

Some web browsers will even block users from visiting your website if your SSL certificate is misconfigured. The chance that customers will choose to do business with a website without a valid SSL certificate is very low.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Make sure you can reach your website via the HTTPS protocol.
  • Configure your SSL certificate. It should be graded as 'A' or 'B' but no lower.
  • Enable auto-renewals for your SSL certificate (you can use Certbot for this task).
Details
Data Timestamp

IP Address

Hostname

Open Ports ()

Summary

Open Ports

Your hosting server is using open ports to receive incoming connections and serve your customers online.

Typically, a public web server should have only two open ports (80 and 443). On a shared hosting server, you can't control the open ports as all the clients use the same open ports.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Review your open ports frequently using an external port scanner.
  • Monitor what services on your server are listening for incoming connections.
  • Filter all unnecessary open ports from incoming connections using a Firewall to reduce your potential attack surface.
Details
Data Timestamp

Target URL

Vulnerabilities ()

Summary

Vulnerabilities

Software vulnerabilities are bugs, misconfigurations, and security weaknesses that typically present in any server, web application, and website.

Cybercriminals may take advantage of present software vulnerabilities to infect your server with malware, distribute spam on your behalf, website defacement, and stealing your data (e.g., customer details, and credit card numbers) to name a few.

Best Practices

Follow the tips below to improve the security and reputation of your website:

  • Setup automated backups for all your servers at least once a week.
  • Run security patches and software updates at least once a week.
  • Check for vulnerabilities frequently using an external vulnerability scanner.

Secure Websites Generate More Sales

We believe that you don't have to be a Cybersecurity expert to run your business online. Focus on what you love, imagine, create, and make your customers happy. Let us assist you in making sure your website is as secure as your customers expect it to be.

Detect Malware Infections

Cybercriminals may infect your hosting server or website with malware, distribute spam on your behalf, website defacement, and stealing your data (e.g., customer details, and credit card numbers) to name a few.

Verify Domain Expiration

Your domain is a part of your brand name. It is the name of your business online. When people search your domain name online, they find your contact details, reviews, articles, interviews, social media profiles, and your website, among other things.

Validate SSL Certificate

A valid SSL certificate helps you to build trust with your customers online. When they browse to your website via the secure and encrypted HTTPS protocol, your customers' web browser will automatically warn them about missing or invalid SSL certificates. Some web browsers will even block users from visiting your website if your SSL certificate is misconfigured. The chance that customers will choose to do business with a website without a valid SSL certificate is very low.

Search Subdomains

Your subdomains are a part of your domain name. They help you to organize your digital assets, such as servers, APIs, and other business-related services. When your customers browse or get redirected between the different services you provide online, your subdomains provide them with helpful context and help maintain trust. Cybercriminals typically map your public subdomains to find what servers belong to your business and try to compromise them.

Find Leaked Passwords

Cybercriminals are constantly trying to collect valid email addresses, usernames, and passwords to make a quick profit. The credentials they acquire via Phishing scams and data breaches typically end up for sale to the highest bidder across marketplaces on the dark web. We monitor the dark web to detect any credentials related to your domain name, so you could protect your business and customers before the cybercriminals can abuse them.

Test Email Security

It's a common business practice to send and receive email messages using your domain, rather than using free email addresses such as @gmail.com and @yahoo.com. Several email security protocols can improve your email deliverability to your customers' inbox (e.g., SPF, DKIM, and DMARC). When not configured properly, it increases the chance that your email messages will end up in your customers' spam folder.

Review Open Ports

Your hosting server is using open ports to receive incoming connections and serve your customers online. Typically, a public web server should have only two open ports (80 and 443). On a shared hosting server, you can't control the open ports as all the clients use the same open ports.

Discover Security Vulnerabilities

Software vulnerabilities are bugs, misconfigurations, and security weaknesses that typically present in any server, web application, and website. Cybercriminals may take advantage of present software vulnerabilities to infect your server with malware, distribute spam on your behalf, website defacement, and stealing your data (e.g., customer details, and credit card numbers) to name a few.

Simple, Transparent Pricing

PRO - Purchase Your Security Report
$19
  • Detect Malware Infections
  • Verify Domain Expiration
  • Validate SSL Certificate
  • Search Subdomains
  • Find Leaked Passwords
  • Test Email Security
  • Review Open Ports
  • Discover Security Vulnerabilities
  • Rescan Your Website
  • Download Your Report (Example: PDF, XLSX)
  • 30-Min Consultation with a Security Expert
VIP - Review Your Report with an Expert
$99
  • Detect Malware Infections
  • Verify Domain Expiration
  • Validate SSL Certificate
  • Search Subdomains
  • Find Leaked Passwords
  • Test Email Security
  • Review Open Ports
  • Discover Security Vulnerabilities
  • Rescan Your Website
  • Download Your Report (Example: PDF, XLSX)
  • 30-Min Consultation with a Security Expert

How May We Assist You?

Thank You For Getting In Touch!

We appreciate you contacting us. One of our team members will get back in touch with you soon. Have a great day!

Our Address Info

Derech Menachem Begin 144
Tel Aviv-Yafo, 6492102
Israel

Our Contact Info
Follow Us