Try every endpoint from your browser. No signup, no API key, no setup.
{
"domain": "cloudflare.com",
"risk_score": 15,
"dns": {
"a": ["104.16.132.229"],
"mx": ["route1.mx.cloudflare.net"]
},
"whois": {
"registrar": "Cloudflare, Inc.",
"created": "2009-02-17"
},
"ssl": {
"grade": "A",
"issuer": "Google Trust Services",
"expires_in_days": 89
},
"subdomains": ["www.cloudflare.com", "api.cloudflare.com", "dash.cloudflare.com"]
}
{
"domain": "example.com",
"summary": "Audit for example.com · 3 technologies detected",
"technologies": {"count": 3, "summary": "nginx, Cloudflare, jQuery"},
"live_headers": {"server": "nginx", "x-powered-by": "Express"},
"report": {"...full domain report...": null}
}
{
"domain": "cloudflare.com",
"records": [
{"type": "A", "value": "104.16.132.229", "ttl": 300},
{"type": "MX", "value": "route1.mx.cloudflare.net", "ttl": 300, "priority": 36},
{"type": "NS", "value": "ns1.cloudflare.com", "ttl": 86400},
{"type": "TXT", "value": "v=spf1 include:_spf.google.com ~all", "ttl": 300}
]
}
{
"domain": "cloudflare.com",
"registrar": "Cloudflare, Inc.",
"creation_date": "2009-02-17T00:00:00",
"expiration_date": "2033-02-17T00:00:00",
"updated_date": "2024-01-15T00:00:00",
"nameservers": ["ns1.cloudflare.com", "ns2.cloudflare.com"],
"status": ["clientTransferProhibited"],
"dnssec": true
}
{
"domain": "cloudflare.com",
"subdomains": [
"www.cloudflare.com",
"api.cloudflare.com",
"dash.cloudflare.com",
"support.cloudflare.com",
"blog.cloudflare.com"
],
"total": 5
}
{
"domain": "cloudflare.com",
"grade": "A",
"protocol": "TLSv1.3",
"cipher": "TLS_AES_256_GCM_SHA384",
"issuer": "Google Trust Services",
"not_before": "2024-12-01T00:00:00",
"not_after": "2025-03-01T00:00:00",
"days_remaining": 89,
"san": ["cloudflare.com", "*.cloudflare.com"]
}
{
"domain": "example.com",
"malware_urls": 0,
"threat_tags": [],
"threat_status": "clean",
"summary": "No threats found in URLhaus"
}
{
"ip": "8.8.8.8",
"ptr": "dns.google",
"geo": {
"country": "US",
"city": "Mountain View",
"org": "Google LLC"
},
"ports": [53, 443],
"hostnames": ["dns.google"],
"reputation": {
"score": 0,
"categories": []
}
}
{
"domain": "shopify.com",
"technologies": [
{"name": "Cloudflare", "category": "CDN", "confidence": 100},
{"name": "Ruby on Rails", "category": "Framework", "confidence": 80},
{"name": "Nginx", "category": "Web Server", "confidence": 90}
]
}
{
"asn": 13335,
"holder": "CLOUDFLARENET - Cloudflare, Inc.",
"prefixes_v4": ["104.16.0.0/20", "172.64.0.0/13"],
"prefixes_v6": ["2606:4700::/32"],
"resolved_from": "cloudflare.com"
}
{
"domain": "google.com",
"provider": "Google Workspace",
"mx_records": ["smtp.google.com"],
"spf": {
"record": "v=spf1 include:_spf.google.com ~all",
"valid": true
},
"dmarc": {
"record": "v=DMARC1; p=reject",
"policy": "reject"
},
"grade": "B",
"score": 80
}
{
"email": "test@tempmail.com",
"disposable": true,
"domain": "tempmail.com",
"risk": "high"
}
{
"email": "admin@gmail.com",
"syntax_valid": true,
"role_address": true,
"free_provider": true
}
{
"domain": "github.com",
"score": 95,
"grade": "A",
"spf": { "present": true, "all_mechanism": "-all" },
"dmarc": { "policy": "reject" },
"dkim": { "selectors_tested": 2 }
}
{
"domain": "github.com",
"status_code": 200,
"sitemaps": ["https://github.com/sitemap.xml"],
"user_agents": { "*": { ... } }
}
{
"start_url": "https://bit.ly/3xyz",
"final_url": "https://example.com/",
"hop_count": 2,
"loop_detected": false
}
{
"domain": "stripe.com",
"favicon_url_untrusted": "https://stripe.com/favicon.ico",
"og_image_url_untrusted": "https://stripe.com/og.png",
"site_name_untrusted": "Stripe"
}
{
"domain": "example.com",
"score": 85,
"h1_count": 1,
"missing_signals": ["meta_description_length_off"]
}
{
"number": "+14155552671",
"valid": true,
"country": "US",
"region": "California",
"carrier": "",
"line_type": "fixed_line_or_mobile",
"timezone": "America/Los_Angeles"
}
{
"username": "torvalds",
"total_found": 7,
"platforms": [
{"name": "github", "exists": true, "url": "https://github.com/torvalds"},
{"name": "reddit", "exists": true, "url": "https://reddit.com/user/torvalds"},
{"name": "keybase", "exists": true, "url": "https://keybase.io/torvalds"}
]
}
{
"domain": "example.com",
"first_snapshot": {
"date": "1997-01-01",
"url": "https://web.archive.org/web/19970101/http://example.com"
},
"last_snapshot": {
"date": "2026-04-01",
"url": "https://web.archive.org/web/20260401/http://example.com"
},
"total_snapshots": 125000
}
{
"domain": "contrastcyber.com",
"headers_present": [
"Strict-Transport-Security",
"X-Frame-Options",
"X-Content-Type-Options",
"Content-Security-Policy",
"Referrer-Policy",
"Permissions-Policy"
],
"headers_missing": [],
"score": 100,
"grade": "A"
}
{
"cve_id": "CVE-2024-3094",
"description": "Malicious code in xz/liblzma 5.6.0-5.6.1",
"cvss_score": 10.0,
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"epss": {
"score": 0.85,
"percentile": 0.99
},
"kev": true,
"severity": "CRITICAL"
}
{
"total": 1,
"cves": [
{
"cve_id": "CVE-2025-23419",
"description": "TLS Session Resumption Vulnerability in Nginx",
"cvss_score": 9.8,
"severity": "CRITICAL",
"published_date": "2025-02-05",
"epss_score": 0.12
}
]
}
{
"count": 3,
"results": [
{"cve_id": "CVE-2024-3094", "cvss_score": 10.0, "kev": true},
{"cve_id": "CVE-2021-44228", "cvss_score": 10.0, "kev": true},
{"cve_id": "CVE-2014-0160", "cvss_score": 7.5, "kev": false}
]
}
{
"cve_id": "CVE-2024-3094",
"total_count": 21,
"exploits": [
{
"source": "GitHub Advisory",
"title": "xz-utils backdoor",
"url": "https://github.com/advisories/GHSA-rxwq-x6h5-x525",
"published_date": "2024-03-29"
}
]
}
{
"cve_id": "CVE-2021-44228",
"score": 100.0,
"label": "CRITICAL",
"urgency": "Patch immediately — actively exploited (CISA KEV).",
"has_public_poc": true,
"components": {
"cvss_v3": 10.0,
"epss_score": 0.95,
"in_kev": true,
"has_public_poc": true
},
"boosters_applied": ["kev_with_public_poc", "critical_severity_high_epss"],
"recommendation": "Active exploitation confirmed by CISA — apply the vendor patch now and review intrusion telemetry for the affected service."
}
{
"version": "3.1",
"vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"base_score": 9.8,
"base_severity": "CRITICAL",
"metrics": {
"attack_vector": "NETWORK",
"attack_complexity": "LOW",
"privileges_required": "NONE",
"user_interaction": "NONE",
"scope": "UNCHANGED",
"confidentiality_impact": "HIGH",
"integrity_impact": "HIGH",
"availability_impact": "HIGH"
}
}
{
"cve_id": "CVE-2021-44228",
"vendor_project": "Apache",
"product": "Log4j2",
"vulnerability_name": "Apache Log4j2 Remote Code Execution Vulnerability",
"date_added": "2021-12-10",
"due_date": "2021-12-24",
"required_action": "Apply updates per vendor instructions.",
"known_ransomware_use": true,
"cwes": ["CWE-20", "CWE-400", "CWE-502"],
"next_calls": [
{"tool": "cve_lookup", "input": "CVE-2021-44228"},
{"tool": "cwe_lookup", "input": "CWE-502"}
]
}
{
"cwe_id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"abstract_type": "Base",
"status": "Stable",
"likelihood": "High",
"parent_cwe": "CWE-74",
"child_cwes": ["CWE-80", "CWE-81", "CWE-83"],
"mitigations": ["PHASE: Architecture and Design DESCRIPTION: Use a vetted library or framework..."],
"cve_count": 43011
}
{
"technique_id": "AML.T0051",
"name": "LLM Prompt Injection",
"tactics": ["AML.TA0011"],
"maturity": "realized",
"attack_reference_id": null,
"description": "An adversary may craft malicious prompts as inputs to an LLM...",
"next_calls": [
{"tool": "atlas_case_study_search", "input": "prompt injection"}
]
}
{
"total": 2,
"techniques": [
{
"technique_id": "AML.T0051",
"name": "LLM Prompt Injection",
"tactics": ["AML.TA0011"],
"maturity": "realized"
}
]
}
{
"case_study_id": "AML.CS0009",
"name": "ChatGPT Plugin Privacy Leak",
"techniques_used": ["AML.T0051", "AML.T0054"],
"description": "A researcher demonstrated indirect prompt injection..."
}
{
"total": 3,
"case_studies": [
{
"case_study_id": "AML.CS0009",
"name": "ChatGPT Plugin Privacy Leak"
}
]
}
{
"defense_id": "TokenBinding",
"label": "Token Binding",
"tactic": "Harden",
"parent_label": "Credential Hardening",
"attack_techniques": ["T1550.001", "T1539"],
"description": "Cryptographically binds tokens to a specific TLS session..."
}
{
"total": 3,
"defenses": [
{
"defense_id": "TokenBinding",
"label": "Token Binding",
"tactic": "Harden"
}
]
}
{
"attack_technique_id": "T1059",
"total": 15,
"truncated": true,
"coverage_by_tactic": {"Harden": 4, "Detect": 8, "Isolate": 3},
"defenses": [
{"defense_id": "ContentFiltering", "label": "Content Filtering", "tactic": "Harden"}
]
}
{
"queried_techniques": ["T1059", "T1190", "T1078"],
"defended_techniques": ["T1059", "T1190"],
"undefended_techniques": ["T1078"],
"coverage_by_tactic": {
"Harden": 7,
"Detect": 12,
"Isolate": 4
}
}
{
"rule": {
"rule_id": "195e1b9d-...",
"title": "Suspicious Powershell Process Creation",
"status": "stable",
"level": "high",
"tags": ["attack.t1059"],
"logsource": {"product": "windows"}
}
}
{
"total_matches": 187,
"limit": 50,
"rules": [{ // 50 rules tagged attack.t1059 }]
}
{
"ip": "8.8.8.8",
"threat_level": "none",
"summary": "IP 8.8.8.8 · AS15169 · 2 open ports · threat level: none",
"enrichment": {"ports": [53, 443], "vulns": []},
"abuseipdb": {"abuse_score": 0},
"asn": {"asn": 15169}
}
{
"indicator": "8.8.8.8",
"type": "ip",
"found": false,
"threat_type": null,
"malware_family": null,
"tags": [],
"confidence": null,
"source": "abuse.ch",
"references": []
}
{
"count": 3,
"summary": "All 3 indicators processed",
"results": [
{"indicator": "8.8.8.8", "type": "ip", "found": false},
{"indicator": "1.1.1.1", "type": "ip", "found": false},
{"indicator": "malware.example.com", "type": "domain", "found": false}
]
}
{
"file_hash": "d41d8cd98f00b204e9800998ecf8427e",
"found": false,
"malware_family": null,
"file_type": null,
"file_size": null,
"tags": [],
"first_seen": null,
"last_seen": null,
"signature": null
}
{
"found": true,
"count": 52256179
}
{
"url": "https://example.com/login",
"found": false,
"threat_type": "none",
"status": null,
"tags": [],
"date_added": null,
"source": "URLhaus"
}
{
"total": 3,
"by_severity": {
"CRITICAL": 1,
"HIGH": 2,
"MEDIUM": 0,
"LOW": 0
},
"findings": [
{
"severity": "CRITICAL",
"type": "AWS Access Key",
"line_number": 1,
"matched_text": "EXAMPLE_KEY_NOT_REAL",
"recommendation": "Remove and rotate this AWS access key immediately"
}
]
}
{
"total": 3,
"by_severity": {
"CRITICAL": 0,
"HIGH": 3,
"MEDIUM": 0,
"LOW": 0
},
"findings": [
{
"severity": "HIGH",
"type": "SQL Injection",
"line_number": 1,
"matched_text": "SELECT * FROM users WHERE id = \" + user_input",
"recommendation": "Use parameterized queries instead of string concatenation"
}
]
}
{
"total": 2,
"by_severity": {
"critical": 1,
"high": 1
},
"summary": "Found 2 CVEs across 2 of 3 packages (1 critical, 1 high)",
"findings": [
{
"package": "openssl",
"version": "3.0.0",
"cve_id": "CVE-2023-0286",
"severity": "high",
"cvss_v3": 7.4,
"in_kev": false
}
]
}