ThreatScoutDomains continuously discovers, monitors, and analyses domains impersonating your brand — typosquatting, homograph attacks, combo-squatting, and more — giving your security team the intelligence to act first.
From automated discovery to evidence-backed risk assessment, ThreatScoutDomains covers the full threat-domain lifecycle.
Generates thousands of lookalike candidates using typosquatting, insertion, deletion, transposition, homoglyph substitution, TLD swaps, and more.
Automatically gathers DNS records, HTTP response headers, SSL certificates, screenshots, and full HTML snapshots for each threat candidate.
Analysts review evidence and assign risk scores (New → Reviewing → Confirmed → Dismissed) with a full audit trail of every status change.
CLI-driven discovery and collection pipelines can be scheduled (cron) to run daily, keeping your threat intelligence fresh without manual effort.
Real-time overview of total candidates, unreviewed items, high-risk detections, and recent activity — purpose-built for SOC and brand protection teams.
Export threat intelligence as CSV for SIEM ingestion, ticketing system integration, or management reporting with one click.
Session hardening, CSRF protection, bcrypt authentication, brute-force lockout, and path-traversal prevention built into every layer.
Visual snapshots of live lookalike sites let analysts quickly confirm phishing pages, brand impersonation, and credential harvesting portals.
The platform generates and monitors candidates across all known lookalike domain techniques.
A simple, repeatable process — automated where possible, analyst-led where it matters.
Define your brand name and target TLDs. Run cli/seed.php
or use the API to add monitored brands. Set up a cron job for daily reruns.
The discovery engine generates all candidate domains. Evidence Collector resolves DNS, checks HTTP status, captures screenshots, and stores HTML snapshots automatically.
→Analysts review evidence in the web dashboard, assign risk ratings, and escalate confirmed threats to legal, registrar abuse, or SIEM via CSV export.
Godson Chittilappilly
Security Engineer & Entrepreneur
Love to be Part of this Race
Hi, I'm Godson Chittilappilly — a security engineer passionate about threat intelligence, brand protection, and building tools that close the gap between detection and response. I designed and built ThreatScoutDomains as a self-hosted alternative to expensive vendor platforms, putting real analyst control back in the hands of the teams who need it most.
ThreatScoutDomains was born out of a recurring pain every security team eventually hits — you know attackers are spinning up lookalike domains to phish your users and impersonate your brand, but you have no practical way to find them before the damage is done.
Enterprise brand-monitoring products exist, but they're expensive, opaque, and hand control to a vendor. Open-source scripts exist, but they're one-off and leave all the heavy lifting to the analyst. There was nothing in between: a self-hosted, full-lifecycle platform that any security team could own end-to-end.
Sign in to your ThreatScoutDomains instance and start monitoring now.
Sign In to Dashboard