Get deeper visibility into your network with our cutting-edge DPI technology. SecLookup provides instant domain enrichment, malicious detection, and relationship mapping for enterprise-grade threat intelligence.
# Query domain intelligence
curl -X GET "https://api.seclookup.com/v1/domain/suspicious.com" \
-H "Authorization: Bearer YOUR_API_KEY"
# Response
{
"domain": "suspicious.com",
"risk_score": 87,
"threats": ["phishing", "malware"],
"dns": { "a": ["192.168.1.1"] },
"ssl": { "valid": false },
"whois": { "registrar": "..." }
}
Comprehensive domain enrichment with real-time analysis, powered by multiple intelligence sources.
Real-time scanning against 70+ threat intelligence feeds including VirusTotal, URLhaus, and PhishTank.
Complete DNS record analysis including A, AAAA, MX, TXT, NS, and historical DNS changes over time.
Certificate chain validation, expiration monitoring, and detection of suspicious or self-signed certificates.
Registration data, registrar information, creation dates, and ownership history tracking.
Interactive graph visualization showing connections between domains, IPs, certificates, and threats.
Continuous monitoring of domains with instant alerts on reputation changes and new threats.
From SOC analysts to threat researchers, SecLookup powers security workflows at every scale.
Rapidly investigate suspicious domains and IPs during security incidents. Get instant context on threats, historical data, and related infrastructure to accelerate your response.
Proactively search for indicators of compromise across your environment with powerful query capabilities.
Integrate with your SIEM and SOAR platforms for automated enrichment of security alerts.
Monitor for lookalike domains and phishing attempts targeting your organization and customers.
Build and enrich your threat intelligence feeds with comprehensive domain and IP data.
RESTful API with comprehensive documentation, SDKs for popular languages, and webhook support for real-time integrations.
from seclookup import Client
client = Client(api_key="your_api_key")
# Get domain intelligence
result = client.domain.lookup("suspicious.com")
print(f"Risk Score: {result.risk_score}")
print(f"Threats: {result.threats}")
print(f"DNS Records: {result.dns}")
# Get relationship graph
graph = client.domain.graph(
"suspicious.com",
depth=2
)
import { SecLookup } from 'seclookup';
const client = new SecLookup({
apiKey: 'your_api_key'
});
// Get domain intelligence
const result = await client.domain.lookup(
'suspicious.com'
);
console.log(`Risk Score: ${result.riskScore}`);
console.log(`Threats: ${result.threats}`);
// Get relationship graph
const graph = await client.domain.graph(
'suspicious.com',
{ depth: 2 }
);
package main
import "github.com/seclookup/go-sdk"
func main() {
client := seclookup.NewClient(
"your_api_key",
)
// Get domain intelligence
result, _ := client.Domain.Lookup(
"suspicious.com",
)
fmt.Printf("Risk: %d\n", result.RiskScore)
// Get relationship graph
graph, _ := client.Domain.Graph(
"suspicious.com",
&seclookup.GraphOptions{Depth: 2},
)
}
# Get domain intelligence
curl -X GET \
"https://api.seclookup.com/v1/domain/suspicious.com" \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json"
# Get relationship graph
curl -X GET \
"https://api.seclookup.com/v1/domain/suspicious.com/graph?depth=2" \
-H "Authorization: Bearer YOUR_API_KEY"
# Submit enrichment request
curl -X POST \
"https://api.seclookup.com/v1/enrichment/request" \
-H "Authorization: Bearer YOUR_API_KEY" \
-d '{"domain": "example.com", "priority": 5}'
Start with 50K free domain scans. Scale as your security needs grow.
Perfect for getting started with threat intelligence.
For security teams that need more power.
For organizations with high-volume needs.
Tailored solutions for large organizations.
50K domain scans are free. Email [email protected] to subscribe to our plans.