SecurityStatus
How It WorksFeaturesKnowledge BaseComparePricing
Sign In Get Started
38 Security Guides

Security Guides

Plain-English guides for every security check we run. Understand what each issue means, why it matters, and exactly how to fix it — step by step.

DNS

9 guides
high DNS

SPF Record

SPF (Sender Policy Framework) is a DNS record that lists which mail servers are authorised to send email on behalf of your domain.

Read Guide
high DNS

DMARC Record

DMARC (Domain-based Message Authentication, Reporting and Conformance) ties together SPF and DKIM to tell receiving mail servers what to do when an email fails authentication.

Read Guide
medium DNS

DKIM Record

DKIM (DomainKeys Identified Mail) adds a cryptographic signature to outgoing emails.

Read Guide
low DNS

DNSSEC

DNSSEC (DNS Security Extensions) adds cryptographic signatures to DNS records, allowing resolvers to verify that DNS responses have not been tampered with in transit.

Read Guide
low DNS

CAA Records

Certification Authority Authorization (CAA) records are DNS entries that specify which Certificate Authorities are permitted to issue SSL certificates for your domain.

Read Guide
medium DNS

MTA-STS

MTA-STS (Mail Transfer Agent Strict Transport Security) forces email sent to your domain to use encrypted, authenticated TLS connections.

Read Guide
low DNS

TLS-RPT

TLS-RPT (TLS Reporting) is a DNS record that tells sending mail servers where to send reports when they encounter TLS issues while delivering email to your domain.

Read Guide
info DNS

BIMI Record

BIMI (Brand Indicators for Message Identification) is a DNS standard that lets you display your brand logo next to your emails in supporting inboxes like Gmail and Apple Mail.

Read Guide
critical DNS

Email Spoofing Risk

Email spoofing is when an attacker sends emails that appear to come from your domain.

Read Guide

Infrastructure

13 guides
critical Infrastructure

Open Port Scanner

Open ports on your server represent services accessible from the internet.

Read Guide
critical Infrastructure

Admin Panel Exposure

Admin panels give full control over your website and application.

Read Guide
critical Infrastructure

Sensitive File Exposure

Sensitive files accidentally left accessible on web servers are a goldmine for attackers.

Read Guide
high Infrastructure

API Endpoint Exposure

APIs power modern web applications, but improperly secured API endpoints can expose sensitive data or allow unauthorised actions.

Read Guide
critical Infrastructure

Cloud Storage Exposure

Cloud storage buckets — AWS S3, Azure Blob Storage, Google Cloud Storage — are frequently misconfigured to allow public read or write access.

Read Guide
critical Infrastructure

CVE Detection

CVE (Common Vulnerabilities and Exposures) detection identifies known vulnerabilities in the software your server is running.

Read Guide
high Infrastructure

Subdomain Takeover

A subdomain takeover occurs when a DNS record points to an external service (like a GitHub Pages, Heroku app, or S3 bucket) that no longer exists.

Read Guide
high Infrastructure

Technology Fingerprint

Technology fingerprinting is the process of identifying what software powers a website — web server, CMS, frameworks, libraries, and their versions.

Read Guide
medium Infrastructure

WAF Detection

A Web Application Firewall (WAF) sits in front of your web application and filters malicious traffic — blocking SQL injection, XSS, path traversal, and other attacks before they reach your application code.

Read Guide
high Infrastructure

Directory Listing

Directory listing is a web server feature that, when enabled, shows the contents of directories that do not have an index file.

Read Guide
high Infrastructure

Blacklist Check

Blacklists are databases of IP addresses and domains known for sending spam, hosting malware, or serving phishing pages.

Read Guide
high Infrastructure

Admin Panel Discovery

Admin panel discovery goes beyond checking common paths — it actively probes for less obvious admin URLs, non-standard ports, and framework-specific admin interfaces that may have been left accessible.

Read Guide
medium Infrastructure

API Endpoint Discovery

API endpoint discovery probes your domain for API endpoints that may not be intentionally documented or public.

Read Guide

Ready to check your domain?

Run all 38 security checks on your domain and get a prioritised list of issues to fix.

Check Your Domain Now