Starting...
0%
Initializing scan...
Overview
Total Findings
—
High Risk
—
Requires immediate action
Medium Risk
—
Review recommended
Low Risk
—
Monitor periodically
Findings by Source
Findings by Status
Recent High-Risk Findings
Findings
| Risk | Domain | Source | Reason | IP | Status | First Seen | Actions |
|---|
Scan History
| Started | Domain | Status | Total | New | High | Medium | Low | Duration |
|---|
Takedown Requests
Total Requests
—
Sent
—
Pending Manual
—
Failed
—
| Domain | Target | Contact | Method | Status | Sent At | Actions |
|---|
Screaming Frog Monthly Pipeline
📥 CSV Input
Upload a Screaming Frog CSV or paste a server path.
Required. Uploading a file below will auto-fill this.
🤖 AI + Actions
Defaults load from Settings and can be overridden for this run.
📈 Pipeline Status
No run started yet.
idle
0%
Waiting for input.
Show latest pipeline result JSON
No results yet.
Settings
🏢 Brand Configuration
The domain and brand name to monitor for impersonation.
Your legitimate domain (e.g. example.com)
Company name as it appears publicly
🔍 Scan Phases
Enable or disable individual scanning techniques.
Concurrent DNS resolution threads (higher = faster, more aggressive)
🤖 AI Review
Default AI provider and models used by the monthly pipeline.
⚡ Takedown Identity
Your identity used in abuse reports and takedown emails.
This appears in the From field of abuse reports
🎯 Takedown Services
Enable automatic reporting to phishing blocklist services.
⚠ When enabled, takedown requests are sent automatically for any new HIGH risk finding during scans.
🔔 Alerting
Get notified when new high-risk threats are found.