Echo Scanner
See your attack surface
the way an attacker does.
Before anyone runs a single exploit, they quietly map your DNS, email and hosting footprint.
This passive recon scanner shows the high-level data they can collect in seconds – safely, with read-only lookups.
DNS records loading…
Passive only – no intrusive scanning
DNS & WHOIS footprint overview
Perfect for small & mid-size businesses
What this tool shows you
High-level signals attackers use during recon, including:
- • A / AAAA records – where your website actually lives
- • MX & NS records – email & DNS infrastructure
- • TXT records – SPF / DKIM / other security hints
- • SOA & WHOIS highlights – registrar & lifecycle data
What it does not do
This is a safe demo, not a full penetration test.
- • No active port scanning or service enumeration
- • No exploitation or “breaking in” attempts
- • No changes to your DNS or infrastructure
- • For a full assessment, you still need a scoped pentest.
Turn this snapshot into a full security picture.
The scanner only scratches the surface. In a real engagement I combine DNS, web, network and cloud
testing to show you exactly how an attacker would move from reconnaissance to impact – and how to stop them early.
- • Scoped, legal penetration testing tailored to your environment
- • Clear, non-fluffy reporting your team and insurers can understand
- • Prioritised, actionable fixes instead of generic “best practices”
No automated spam, no endless sales calls – just a technical walk-through of your real risk.
- External attacker view of your web & API surface
- Network & infrastructure testing for exposed services
- Password & identity weaknesses that enable account takeover
- Business-logic abuse paths specific to your apps