Disclaimers & Authority to Scan
Important information about our scanning practices and your responsibilities.
Authority to Scan
You must have proper authorization before scanning any domain or IP address. By using this service, you confirm that you have the legal right to scan the target systems.
- You own or control the domain/IP being scanned
- You have written permission from the owner
- You are conducting authorized security testing as part of your role
- The scanning falls within the scope of a legitimate business relationship
Warning: Unauthorized scanning may violate local, state, or federal laws. We are not responsible for any legal consequences of unauthorized scanning activities.
What We Actually Scan
Our scanning activities are designed to be non-intrusive and publicly accessible:
DNS & Domain Analysis
- Public DNS record queries
- DNSSEC validation checks
- Email authentication (SPF, DKIM, DMARC)
- Domain registration information
Network & Web Scanning
- Open port detection (Nmap)
- SSL certificate analysis
- HTTP header inspection
- Public web content analysis
Note: All scans are performed against publicly accessible services only. We do not attempt to bypass authentication, exploit vulnerabilities, or access private systems.
Data Handling & Privacy
What We Store
- Scan results and analysis data
- Domain names and IP addresses scanned
- Timestamp and scan metadata
- User email (for report delivery only)
Data Retention
- Guest scans: Purged every hour
- Registered users: Retained per your account settings
- No sharing: Your data stays private
- Secure storage: Encrypted and protected
Service Limitations & Disclaimers
Accuracy & Completeness
Our scans provide a point-in-time assessment based on publicly available information. Results may not reflect the complete security posture of your systems.
No Security Guarantee
A clean scan does not guarantee your systems are secure. This tool is for assessment and educational purposes, not comprehensive security validation.
Professional Advice
Results are informational only and do not constitute professional security advice. Consult qualified security professionals for comprehensive assessments.
Guidelines for MSP Usage
This tool is designed to help MSPs provide value to their clients. Best practices:
Recommended Practices
- Get client consent before scanning their domains
- Use results to educate, not frighten clients
- Position findings as opportunities for improvement
- Combine with other assessment tools
Avoid These Approaches
- Don't use for unauthorized prospect scanning
- Don't present results as comprehensive audits
- Don't use fear-based selling tactics
- Don't scan without proper authorization
Questions or Concerns?
If you have questions about our scanning practices, believe we've scanned your systems without authorization, or need to report an issue, please contact us immediately.
Contact Information:
- Email: [email protected]
- Response Time: Within 24 hours
- For Urgent Issues: Include "URGENT" in subject line
Last Updated: August 14, 2025
By using this service, you acknowledge that you have read, understood, and agree to these terms and disclaimers.