Add Your Domain
Register any domain with your preferred scan frequency, alert threshold and notification channel. No limit on TLD or registrar.
DomainRisk.io runs 50+ deterministic security checks across WHOIS, DNS, SSL/TLS, email authentication and subdomain infrastructure. Findings are correlated into named attack scenarios, a 90-day volatility signal, and an explainable weighted security score — every deduction traced to a named issue and a concrete remediation step.
5
Data Sources
50+
Security Checks
8
Attack Scenarios
3
Scoring Axes
0–100
Score Range
PDF + CSV
Audit Exports
From domain registration to alert delivery, every step is queued, traceable and auditable — no black boxes, no silent failures.
Register any domain with your preferred scan frequency, alert threshold and notification channel. No limit on TLD or registrar.
Scan requests enter a durable queue processed by background workers. Your dashboard stays responsive regardless of portfolio size or scan volume.
WHOIS, DNS, SSL/TLS, email authentication and subdomain signals are fetched in parallel, normalised, and scored across three weighted axes. Optional RFC1035 zone import extends coverage to every record in your zone.
Every snapshot is compared to the previous one. The deterministic scenario engine then correlates findings into named attack scenarios — with severity, evidence and recommended action.
Alerts fire via email and webhook for raw findings and correlated attack scenarios. PDF and CSV exports give your team audit-ready evidence for every finding and recommendation.
Each monitored domain is assessed across six distinct data layers — 50+ individual checks in total. Together they produce a single weighted security score with full explainability at the factor level, every deduction traced to a named issue and a concrete action.
Track the full ownership and registration lifecycle of every domain — from creation date through expiration status, registrar identity and administrative flags.
Monitor every critical DNS record type for unauthorized changes. A single nameserver replacement can redirect your entire domain — traffic, email and APIs — in minutes.
Certificate expiry causes outages; missing HTTP security headers create XSS, clickjacking and data-leakage vectors. DomainRisk.io audits both layers on every scan.
SPF, DMARC, DKIM, MTA-STS and TLS-RPT posture determine whether your domain can be impersonated or your mail transport intercepted. Weak or missing configurations are surfaced with explicit severity and policy fixes.
Your subdomain inventory is part of your attack surface. Every scan enumerates and analyses discovered subdomains for DNS misconfigurations, takeover exposure, remote access leakage and weak mail posture.
Every scan produces an immutable snapshot compared to the previous one. Changes — a DNS record, a 10-point score drift, a new critical finding, an ASN hop — are logged to an auditable timeline.
Most tools report raw findings. DomainRisk.io goes further: a deterministic correlation engine maps combinations of findings to named, actionable attack scenarios — no AI hallucinations, no guesswork. Each scenario carries an attack vector, impact assessment, likelihood rating and supporting evidence. Scenarios are tracked across scans: you are alerted on new detections, severity escalations, resolutions and regressions.
Triggered when SPF is absent and SMTP service is active. Escalates to Critical when DMARC is also absent on a mail-active domain. Suppressed when a known provider with active DKIM alignment is detected.
SPF absent + DMARC absent + MX present on an active domain. Downgraded when a trusted mail provider with DKIM alignment and valid DMARC is confirmed.
Dangling CNAME on a sensitive host pattern (admin, vpn, panel, cpanel). Escalates to Critical when takeover is confirmed via HTTP error signature or registrable target WHOIS availability.
RDP (3389), SSH (22) or FTP (21) confirmed open on a public subdomain IP. Only ports with confirmed open state are counted — filtered ports are excluded to avoid false positives.
Web-facing domain with invalid or absent TLS. Critical for missing TLS or CN/SAN mismatch on the primary hostname; High for expired certificates; Medium for secondary self-signed certificates.
Strict correlation: registrar change + NS change within ≤14 days + volatility spike. Bonus weight when the new NS provider was never previously observed in the domain's history.
Active mail infrastructure without MTA-STS and/or TLS-RPT, leaving SMTP opportunistic encryption unverified and reporting blind. High when external MX provider detected; Medium when only TLS-RPT is absent.
Web, DNS and mail routing concentrated on one provider or ASN. Critical when all three converge on the same operator; High when DNS and web share the same ASN.
The Volatility Score tracks domain change activity over a rolling 90-day window and compresses it into a 0–100 instability index. Registrar changes, nameserver flips, SSL invalidation events and new subdomain discoveries each contribute weighted signals — with deduplication to prevent inflated scores on high-frequency scan schedules.
Use Volatility Score for vendor risk due diligence, acquisition screening, portfolio prioritisation, or as an early-warning indicator for domains drifting toward instability before the security score reflects it.
Registrar changes
Highest-weight signal — registrar transfers are rare and almost always high-risk.
Nameserver changes
NS delegation changes carry double weight as high-impact infrastructure events.
SSL invalid events
Certificate becoming invalid mid-scan window signals operational instability.
DNS record changes
A, AAAA, MX, NS, TXT, CNAME and CAA additions or deletions.
New subdomain discoveries
Newly enumerated subdomains expanding the external attack surface.
Anti-noise deduplication
Signals are aggregated per day per type — frequent rescans of the same domain do not artificially inflate the score.
The Global Security Score is not a black box. It is built from three weighted axes — Exploitable Risk (50%), Hardening Gaps (30%) and Governance (20%). Every contributing factor is named, explained and linked to a specific remediation action.
A critical guardrail enforces a score ceiling of 30/100 whenever any Exploitable Risk finding is rated Critical — ensuring severe vulnerabilities are never masked by strong governance scores. Scores are tied to a versioned model so comparisons across time remain defensible even after model updates.
50%
Exploitable Risk
30%
Hardening Gaps
20%
Governance
Each scan stores the model version used. Score comparisons across time remain meaningful and defensible even after model updates.
Any Critical-severity Exploitable Risk finding caps the global score at 30/100 — a strong governance posture cannot compensate for an actively exploitable vulnerability.
Every score deduction traces to a named factor with severity, evidence and a concrete remediation step — not just a label.
Shifts of ≥10 points in any axis are surfaced as change events — catching degradation before it crosses a critical threshold.
Webhook payloads include model version, top factors with severity, a change summary and recommended actions in structured JSON — ready for SIEM, ticketing or custom automation.
Get notified when it matters — via email for human review, or via webhook for automated response pipelines. Alert coverage spans both raw findings and correlated attack scenarios, with per-domain threshold control to eliminate noise on low-risk assets.
Instant notifications when risk thresholds are crossed, DNS records change, SSL certificates approach expiry or a new attack scenario is detected.
Enriched JSON payloads with model version, top risk factors, change summary and machine-readable recommended actions — ready for Slack, PagerDuty, Jira or your own pipeline.
Distinct events for new scenarios, severity escalations, resolutions and regressions. Critical scenarios fire immediately; a 2-scan stability gate prevents noise from transient states. 24-hour cooldown per scenario key.
Set minimum score or severity level per domain. Opt into Medium-severity scenario alerts. Stay sharp on critical assets without drowning in noise from low-risk ones.
Every domain scan produces a downloadable report suitable for internal audits, executive briefings, MSSP client deliverables and compliance evidence packages.
PDF reports span 13 structured sections — from the executive summary and scored findings to the HTTP header audit, change timeline, recommended actions and compliance checklist. CSV exports give analysts raw data for custom processing or SIEM ingestion.
Report contents — 13 sections
Everything you need to know about how the platform works.
Free trial, no credit card required. Add your first domain, run a full scan across all five intelligence layers, and download an audit-ready report in minutes.