Your IP is: 13.59.205.182
Notifications

Please login using your WebAuth application

In order to gain access to our DNS page, it is necessary to have the WebAuth wallet installed. You are welcome to download the app from any available store.
Caution advised: Automated tools may not detect all attacker techniques, so additional research is necessary before trusting any domain.

Inspect the URL

WEB3
Enter domain to perform scan.
Enter domain without http:// or https://.
"Question everything, trust wisely, protect yourself."
Trust Score: 0
0
100
Higher score means lower risk!
Overview
Security
Footprint
Report
Ports
NEW
Inspector
BETA
Knowledge
Domain details
Scan finished in:
-
Domain:
-
Official domain:
-
Tranco rank: -
To obtain domain verification, please send us an email using your official email address.
TLD:
-
Certain TLDs (domain endings) are labeled as the most abused due to their greater appeal to spammers and malware operators.
Shortened domain:
-
Redirect URL:
-
Report Finished:
-
Metadata:
-
security health
THREAT TAGS
N/A
IDN status
-
IDN domains use non-ASCII characters, vulnerable to attackers who create fake websites, like "paypàl.com" with a non-ASCII character replacing "a", to trick users into giving sensitive information.
Certificates
-
Analyze SSL
-
IP resolution
Status:

IP address:

Blacklisted status
ASN:

Hostname:

Country:

City:

DNS records
-
WHOIS
-
Newly registered domains (NRDs) are known to be favored by threat actors to launch malicious campaigns.
WHOIS history
TOOLS
DNS Dumpster
MxToolbox
USER AGENT
PHISHING STATUS
This feature is currently under development
This feature verifies whether a domain is marked as a phishing site in Web3 feed lists.
INFECTED FILES
-
This feature conducts a deep analysis of potentially infected files, detecting malicious code within them.
MOZILLA Observatory
-
The HTTP Observatory provides effective security insights, guided by Mozilla's expertise and commitment to a safer and more secure internet and based on well-established trends and guidelines.
YARA STATUS
-
GOOGLE SAFE BROWSING
-
VIRUSTOTAL
DNS STATUS
-
MORE TOOLS
VirusTotal Web
Sucuri
Cloudflare
Urlscan.io
Urlhaus
Shodan
INTERNAL JS files
GOOGLE SEARCH
-
It is highly suspicious if domain does not appear in the Google search results.
JSON LD
JSON-LD is a structured data format used to represent information on websites in a machine-readable and interoperable manner.
Schema.org
FOUND FILES
-
HEADERS
-
META DATA
-
REPORT ON BLOCKCHAIN
On this page, you have option to report a potentially suspicious domain through XPR Network blockchain. Once reported, the domain will be automatically fetched to our DNS servers for scanning. Every verified report will be awarded in $XPR.
Submit Domain
Thank you for contributing #Web3 security. 🔒
ABUSE REPORT
Domain abuse involves the improper use of domain names for malicious or fraudulent activities. Clicking [send abuse report] generates an email containing details about the malicious domain, sent to the registrar's abuse address. This action may result in domain suspension, exclusively available to verified researchers.
-
OPEN PORTS
-
This feature will scan for commonly used ports and identify which ones are open.
NMAP
Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.
This feature is currently unavailable.
SUBDOMAINS
Our subdomain finder utilizes crt.sh, a certificate transparency search service. It efficiently extracts and presents subdomains associated with a given domain, offering users a streamlined way to uncover and analyze relevant information.
-
INSPECT WEBSITE
This is only available for our partners.
NUCELI
Nuclei is a fast and flexible vulnerability scanner used to detect security issues in web applications. It can scan multiple URLs or domains at once, and identify various vulnerabilities. It's highly customizable with support for custom templates and plugins, making it a popular tool for security researchers and penetration testers.

This feature will be available only for our partners.
CRYPTO SCAMS

Phishing

Phishing scams involve fraudulent attempts to obtain sensitive information, such as login credentials or private keys, by impersonating legitimate entities through emails, websites, or messages. Scammers trick victims into disclosing their cryptocurrency-related details, leading to unauthorized access to their funds.

Ponzi Schemes

Ponzi schemes promise high returns on investment to early participants using funds from new investors. The scheme collapses when there aren't enough new investors to sustain the payouts, leaving the majority of participants with losses. Ponzi schemes in the crypto space often operate under the guise of promising extraordinary returns through cryptocurrency investments.

Fake Exchanges

Scammers create fake cryptocurrency exchanges or wallets that resemble legitimate platforms to deceive users into depositing their funds. Once the funds are sent, they disappear, resulting in the loss of the deposited cryptocurrencies.

Initial Coin Offering (ICO)

ICO scams involve fraudulent initial coin offerings where scammers present fake or non-existent projects, enticing investors to purchase tokens. After collecting funds, the scammers vanish without delivering on their promises, leaving investors with worthless tokens.

Pump-and-Dump

In pump-and-dump schemes, scammers artificially inflate the price of a low-value cryptocurrency by spreading misleading information or false hype. Once the price reaches a peak, the scammers sell their holdings, causing the price to plummet and resulting in significant losses for unsuspecting investors.

Malware Attacks

Malware targeting cryptocurrency users can compromise their wallets or computers, allowing scammers to steal private keys or gain unauthorized access to funds. These attacks often come in the form of malicious software, fake wallet applications, or infected websites.

Social Media

Scammers create fake social media profiles impersonating well-known figures, cryptocurrency projects, or exchanges. They use these profiles to trick users into sending funds or sharing sensitive information, taking advantage of the trust people place in reputable entities.
GOLDEN RULE
If something seems too good to be true, it probably is. Meaning: If something seems too good to be true, it probably is too good to be true.

Please use this application responsibly and do not attempt to use it for malicious purposes.
This app utilizes ML (Machine Learning) technology to enhance its understanding of threats and domains. Please be assured that any data we store is completely independent and not associated with your personal or technical information. Your privacy and data security are of utmost importance to us.
Xprotect scanner v1.5.1. beta
Xprotect DNS protects you from all kinds of security threats. First DNS system that protects you in Web3.
All servers are operational.
No maintenance is scheduled.
Copyright 2023 - Xprotect is project created by Alvosec Security Team.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram