Disclaimers & Authority to Scan

Important information about our scanning practices and your responsibilities.

Authority to Scan

You must have proper authorization before scanning any domain or IP address. By using this service, you confirm that you have the legal right to scan the target systems.

  • You own or control the domain/IP being scanned
  • You have written permission from the owner
  • You are conducting authorized security testing as part of your role
  • The scanning falls within the scope of a legitimate business relationship

Warning: Unauthorized scanning may violate local, state, or federal laws. We are not responsible for any legal consequences of unauthorized scanning activities.

What We Actually Scan

Our scanning activities are designed to be non-intrusive and publicly accessible:

DNS & Domain Analysis

  • Public DNS record queries
  • DNSSEC validation checks
  • Email authentication (SPF, DKIM, DMARC)
  • Domain registration information

Network & Web Scanning

  • Open port detection (Nmap)
  • SSL certificate analysis
  • HTTP header inspection
  • Public web content analysis

Note: All scans are performed against publicly accessible services only. We do not attempt to bypass authentication, exploit vulnerabilities, or access private systems.

Data Handling & Privacy

What We Store

  • Scan results and analysis data
  • Domain names and IP addresses scanned
  • Timestamp and scan metadata
  • User email (for report delivery only)

Data Retention

  • Guest scans: Purged every hour
  • Registered users: Retained per your account settings
  • No sharing: Your data stays private
  • Secure storage: Encrypted and protected

Service Limitations & Disclaimers

Accuracy & Completeness

Our scans provide a point-in-time assessment based on publicly available information. Results may not reflect the complete security posture of your systems.

No Security Guarantee

A clean scan does not guarantee your systems are secure. This tool is for assessment and educational purposes, not comprehensive security validation.

Professional Advice

Results are informational only and do not constitute professional security advice. Consult qualified security professionals for comprehensive assessments.

Guidelines for MSP Usage

This tool is designed to help MSPs provide value to their clients. Best practices:

Recommended Practices

  • Get client consent before scanning their domains
  • Use results to educate, not frighten clients
  • Position findings as opportunities for improvement
  • Combine with other assessment tools

Avoid These Approaches

  • Don't use for unauthorized prospect scanning
  • Don't present results as comprehensive audits
  • Don't use fear-based selling tactics
  • Don't scan without proper authorization

Questions or Concerns?

If you have questions about our scanning practices, believe we've scanned your systems without authorization, or need to report an issue, please contact us immediately.

Contact Information:

  • Email: [email protected]
  • Response Time: Within 24 hours
  • For Urgent Issues: Include "URGENT" in subject line

Last Updated: August 14, 2025

By using this service, you acknowledge that you have read, understood, and agree to these terms and disclaimers.