Protego
HomeBlogToolsRoadmapsAboutContact

Protego

Expert insights on cloud security, cybersecurity, zero trust, and AI technologies.

Quick Links

  • Blog
  • Tools
  • About
  • Contact

Categories

  • Cloud Security
  • Zero Trust
  • Networking
  • Cybersecurity
Privacy Policy·Terms of Service

© 2026 Protego. All rights reserved.

Home/Tools/Domain Security Report

Domain Security Report

Passive attack surface analysis for any domain. SSL, headers, email security, tech stack, CVEs, and subdomains — all from public data. Nothing uploaded.

Passive scan only — uses public data sources. No attack traffic sent. Takes 10-20 seconds.

What This Report Checks

All checks use public data only — nothing is uploaded, no attack traffic is sent.

🔒
SSL / TLS
Certificate validity, expiration, protocol version, and security grade.
🛡️
Security Headers
CSP, HSTS, X-Frame-Options, and other protective HTTP headers.
📧
Email Security
SPF, DMARC, and DKIM — whether your domain can be spoofed for phishing.
⚙️
Technology Stack
Web server, CMS, framework, and CDN detected from HTTP response.
🚨
Known CVEs
Recent CVEs from NVD matched against your detected technology versions.
🌐
Subdomains
Subdomains discovered via Certificate Transparency logs (crt.sh).
📋
WHOIS
Domain registration date, registrar, expiration, and nameservers.
📊
Risk Score
An aggregated score (0-100) based on all findings across all checks.
⏱️
~15 seconds
All checks run in parallel. Results appear once complete.

Frequently Asked Questions

Is this a penetration test?

No. This is a passive reconnaissance tool that reads publicly available information only. It does not probe for vulnerabilities, send attack payloads, or interact with your systems beyond making a standard HTTP request. It is equivalent to what any browser or search engine crawler does.

Why does the report take 10-20 seconds?

The report runs 7+ checks in parallel against external services (crt.sh, NVD, RDAP, DNS servers, and your domain itself). Each check has its own network latency. The longest checks are typically the NVD CVE lookup and the CT log search.

Are the CVEs definitely affecting my site?

Not necessarily. CVEs are matched by technology name and version where available. You should verify each CVE against your specific configuration. This tool helps you identify what to investigate, not replace a security assessment.

My technology is not detected. Why?

Technology fingerprinting reads public HTTP headers and HTML source. Many modern sites obfuscate or remove server headers for security. If your site does not expose technology information (which is good practice), the tool will not detect it.

Can I run this on competitor sites?

All data collected is publicly available — DNS records, CT logs, and HTTP headers are accessible to anyone on the internet. However, use this tool responsibly and in accordance with applicable laws and terms of service.

Related Tools

📧
Email Security Checker
Deep dive into SPF, DMARC, DKIM, MTA-STS, and BIMI.
🔒
SSL Certificate Checker
Detailed SSL analysis with CT log history and monitoring.
📋
WHOIS Lookup
Full WHOIS / RDAP registration details for any domain.