Examples to try:
All analysis data is stored locally in your browser using IndexedDB. Your data:
- Never leaves your device - 100% private
- Not synced across browsers or devices
- May be lost if you clear browser data
💡 Tip: Visit the History tab to export your analysis data as a backup (JSON, CSV, or PDF).
Custom Domains
Add your own domains to check against
No custom domains added yet. Add domains you want to protect.
Need Professional Security Services?
Our cybersecurity experts can help protect your business with comprehensive security solutions.
References & Citations
- Unicode Consortium. (2023). Unicode Security Mechanisms (TR39). Retrieved from https://www.unicode.org/reports/tr39/ (accessed January 2025)
- ICANN. (2024). UDRP Rules and Procedures. Retrieved from https://www.icann.org/resources/pages/help/dndr/udrp-en (accessed January 2025)
- APWG (Anti-Phishing Working Group). (2024). Phishing Activity Trends Report. Retrieved from https://apwg.org/trendsreports/ (accessed January 2025)
- Ke Tian et al.. (2018). Combosquatting Attack Detection. IEEE Security & Privacy. Retrieved from https://ieeexplore.ieee.org/document/8406612 (accessed January 2025)
Note: These citations are provided for informational and educational purposes. Always verify information with the original sources and consult with qualified professionals for specific advice related to your situation.
Key Security Terms
Understand the essential concepts behind this tool
Certificate Transparency (CT)
A public logging system that records all SSL/TLS certificates, enabling detection of misissued or malicious certificates.
Domain Name System (DNS)
The hierarchical naming system that translates human-readable domain names into IP addresses.
WHOIS Database
A public directory that stores registration information for domain names and IP address blocks.
Email Headers
Metadata attached to emails that shows routing information, authentication results, and delivery path.
⚠️ Security Notice
This tool is provided for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or networks you do not own. Unauthorized access or security testing may be illegal in your jurisdiction. All processing happens client-side in your browser - no data is sent to our servers.