Scanning domains you own or are authorized to test
Security audits by authorized professionals
Bug bounty recon within defined program scope
Academic and educational research
✗ PROHIBITED USES
Scanning any system without explicit written authorization
Using results to plan or execute cyberattacks
Any activity violating local or international law
// APPLICABLE LAW: Unauthorized use may violate the Computer Fraud & Abuse Act (CFAA) · Computer Misuse Act 1990 (UK) · EU Directive 2013/40/EU · Canada Criminal Code §342.1 and equivalent laws in your jurisdiction.
// EXTERNAL ATTACK SURFACE RECONNAISSANCE
Discover Your Exposed Cyber Assets
Real-time subdomain discovery, DNS intelligence, certificate transparency, WHOIS/RDAP, and IP geolocation — powered by live public APIs. Free. No signup. No tracking.
ENTER TARGET DOMAIN (must be authorized)
Ready — enter an authorized domain to begin reconnaissance