Alternatives to SecurityTrails

Compare SecurityTrails alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SecurityTrails in 2026. Compare features, ratings, user reviews, pricing, and more from SecurityTrails competitors and alternatives in order to make an informed decision for your business.

  • 1
    AdRem NetCrunch

    AdRem NetCrunch

    AdRem Software

    NetCrunch is a powerful, scalable, all-in-one network monitoring system built for modern IT environments. It supports agentless monitoring of thousands of devices, covering SNMP, servers, virtualization (VMware, Hyper-V), cloud (AWS, Azure, GCP), traffic flows (NetFlow, sFlow), logs, and custom data via REST or scripts. With 670+ monitoring packs and dynamic views, it automates discovery, configuration, alerting, and automates self-healing actions for efficient remote remediation in response to alerts. Its node-based licensing eliminates sensor sprawl and complexity, providing a clear, cost-effective path to scale. Real-time dashboards, policy-driven setup, advanced alert tuning and 40+ alert actions including remote script execution, service restart, process kill or device reboot-make NetCrunch ideal for organizations replacing legacy tools like PRTG, SolarWinds, or WhatsUp Gold. Fast to deploy and future-proof. Can be installed on-prem, self-hosted in the cloud, or mixed.
    Leader badge
    Partner badge
    Compare vs. SecurityTrails View Software
    Visit Website
  • 2
    Cisco Umbrella
    Cisco Umbrella's cloud-delivered security enables an immediate improvement in security and compliance posture. That's because DNS is at the heart of every internet connection request. Securing the DNS layer means blocking malicious domains, IP addresses, and cloud applications before a connection is ever established. More than 30,000 organizations depend upon Umbrella DNS to deliver a fast, safe, and reliable internet experience that is simple to deploy and easy to manage. A recent study by GigaOM ranked Cisco #1 in DNS-layer security, and our DNS security contributed to Miercom ranking Cisco #1 in the industry in its laboratory testing of SSE threat efficacy. When you are looking to build upon DNS-layer protection with additional user protection capabilities, including ZTNA, SWG, CASB, DLP, and more, see Cisco Secure Access. Cisco Secure Access features a single client, single manager, and single policy construct protection for multi-function internet access protection and integrated
  • 3
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 4
    Brave Search

    Brave Search

    Brave Software

    Brave Search is a privacy-focused search engine from the creators of the Brave Browser. Brave Search does not currently show ads. Eventually it will have an ad-supported free model, or a paid model that does not show ads. Brave Search API: Power your search and AI applications with the fastest growing independent search engine since Bing. Access an index of billions of pages with a single API call. All users can get started for FREE for up to 1 query per second, and 2,000 queries per month. Brave is one of only a few global, independent search providers, and it’s the fastest growing search engine since Bing. Get access to high-quality data that’s actually usable. Build everything from search engines to AI apps. As the default engine in the Brave browser, Brave Search is consistently refreshed with new data via its Web Discovery Project contribution framework.
  • 5
    ScanFactory

    ScanFactory

    ScanFactory

    ScanFactory is an Attack Surface Management & Continuous Automated Vulnerability Assessment Platform that provides realtime security monitoring across all external assets of a company by enumerating & scanning its entire network infrastructure utilizing 15+ most trusted community-backed security tools & extensive database of exploits. Its vulnerability scanner stealthily performs a deep & continuous reconnaissance to map your entire external attack surface & are extended with handpicked top-rated premium plugins, custom wordlists & plethora of vulnerability signatures. Its dashboard can be used to discover & review all vulnerabilities sorted by CVSS & has enough information to understand, replicate & remediate the issue. It also has capability to export alerts to Jira, TeamCity, Slack & WhatsApp.
  • 6
    SubdomainRadar.io

    SubdomainRadar.io

    SubdomainRadar.io

    SubdomainRadar.io is a powerful subdomain discovery platform tailored for cybersecurity professionals, penetration testers, and bug bounty hunters. It offers a wide range of functionalities designed to uncover hidden subdomains and assets within any target domain. With its ability to perform fast, medium, or deep scans, users can choose the level of depth they need depending on the target. Fast scans prioritize speed, while deep scans utilize a broader range of data sources and brute-force techniques to find obscure subdomains that other tools often miss. The platform pulls data from multiple enumerators, ensuring comprehensive coverage. Additionally, its reverse search functionality allows users to search based on subdomain or domain patterns, making it easier to uncover related assets. SubdomainRadar.io also provides an easy-to-use API that can be integrated into existing workflows, supporting automation and rapid subdomain discovery with a rate limit of five requests per second.
  • 7
    Netlas.io
    Netlas.io is a network scanner and search engine on the Internet. Netlas stores DNS records of billions of domain names, hundreds of millions of HTTP responses and SSL certificates. All this information can be obtained through several tools: Responses Search: This collection consists of results from internet scans. Netlas non-intrusive scanners continuously scan internet-accessible hosts and save their responses. DNS Search: These stores domain names, their corresponding IP addresses, and other types of DNS records. IP WHOIS: Information about the owner and management of an IP address, including the IP address range, network provider name, and contact information. Domain WHOIS: Information about the domain owner and registrar, such as contact information, registrar details, registration dates, and expiration dates. Certificates: Database of SSL certificates collected from various sources. Netlas is an indispensable tool for any cybersecurity professional!
    Starting Price: $49 per month
  • 8
    WhoisFreaks

    WhoisFreaks

    WhoisFreaks

    WhoisFreaks is your go-to source for domain WHOIS data. It provides meticulously parsed and structured information about domain names, registrars, countries, and TLDs. Whether you’re investigating a specific domain or analyzing historical trends, WhoisFreaks has you covered.
    Starting Price: $10/month
  • 9
    JsonWHOIS

    JsonWHOIS

    JsonWHOIS

    JsonWhois is a domain API service that provides real-time WHOIS data, domain details, full-page screenshot capture, and social data statistics through a simple JSON-based API designed for developers and automated systems. It delivers up-to-date domain registration information such as creation and expiration dates, registrar details, registrant and administrative contacts, nameserver records, and status codes, enabling programmatic access to essential domain metadata. In addition to WHOIS lookup, JsonWhois offers a fast screenshot API that captures full web page images of domains, refreshes them monthly, and stores historical screenshots for trend or archival use. It also includes social data metrics tied to domains across platforms like Google, Twitter, Facebook, LinkedIn, Pinterest, and more, giving insight into a domain’s social footprint. JsonWhois supports multiple programming languages and integration environments including PHP, NodeJS, and Python.
  • 10
    Intruder

    Intruder

    Intruder

    Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
  • 11
    Proofpoint Emerging Threat (ET) Intelligence
    Proofpoint ET Intelligence delivers the most timely and accurate threat intelligence. Our fully verified intel provides deeper context and integrates seamlessly with your security tools to enhance your decision-making. Knowing what types of threats exist is no longer enough to protect your people, data, and brand. Emerging Threat (ET) intelligence helps prevent attacks and reduce risk by helping you understand the historical context of where these threats originated, who is behind them, when have they attacked, what methods they used, and what they're after. Get on-demand access to current and historical metadata on IPs, domains, and other related threat intelligence to help research threats and investigate incidents. In addition to reputation intel, you get condemnation evidence, deep context, history, and detection information. It's all searchable in an easy-to-use threat intelligence portal that includes: Trends and timestamps of when a threat was seen and the associated category.
  • 12
    Angry IP Scanner

    Angry IP Scanner

    Angry IP Scanner

    Angry IP scanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins. It also has additional features, like NetBIOS information (computer name, workgroup name, and currently logged-in Windows user), favorite IP address ranges, web server detection, customizable openers, etc. Scanning results can be saved to CSV, TXT, XML or IP-Port list files. With help of plugins, Angry IP Scanner can gather any information about scanned IPs. Anybody who can write Java code is able to write plugins and extend functionality of Angry IP Scanner.
  • 13
    BloxOne Threat Defense
    BloxOne Threat Defense maximizes brand protection by working with your existing defenses to protect your network and automatically extend security to your digital imperatives, including SD-WAN, IoT and the cloud. It powers security orchestration, automation and response (SOAR) solutions, slashes the time to investigate and remediate cyberthreats, optimizes the performance of the entire security ecosystem and reduces the total cost of enterprise threat defense. The solution turns the core network services you rely on to run your business into your most valuable security assets. These services, which include DNS, DHCP and IP address management (DDI), play a central role in all IP-based communications. With Infoblox, they become the foundational common denominator that enables your entire security stack to work in unison and at Internet scale to detect and anticipate threats sooner and stop them faster.
  • 14
    Free IP Scanner

    Free IP Scanner

    Eusing Software

    Free IP scanner is a very fast IP scanner and port scanner. It is intended for both system administrators and general users to monitor and manage their networks. Powered with multi-thread scan technology, this program can scan hundreds computers per second. It simply pings each IP address to check if it's alive, then optionally it is resolving its hostname, scans ports, etc. Free IP scanner can also display NetBIOS information: host name, workgroup, currently logged user and MAC address. The information obtained can be exported into a file as plain text file. Free IP Scanner can scan hundreds of computers per second which is ideal for administrators. You can configure it to scan in many priority levels, set number of maximum threads and so on. Use two fields of IP Range to enter first and last IP addresses. The last IP address can be less than the first one - there is no problem with translating your input.
  • 15
    SolarWinds IP Address Tracker
    SolarWinds® IPAM IP address tracker software automatically discovers your network’s IPv4 addresses and allows you to create IPv6 subnets using a step-by-step wizard. By regularly scanning IP addresses within managed subnets using ICMP, SNMP, and neighborhood scanning, IPAM records and maintains changes in MAC addresses, hostnames, and status (reserved, transient, in use, and available). This automated IP address tracking feature provides this recorded information for any IP address for a specified timeframe. The tracker also includes a timestamp admins can leverage to perform effective network troubleshooting. Accessing detailed device information can help admins quickly analyze and resolve issues. Use SolarWinds IP address tracker to identify current conflicts, see which device had the IP address first, and change the IP of the other device in conflict.
    Starting Price: $1,288 one-time payment
  • 16
    DarQ Intel

    DarQ Intel

    DarQ Security

    DarQ Intel is a cybersecurity platform that helps organizations better understand and manage their digital risks. It uses AI-driven analysis to highlight potential vulnerabilities, monitor network and cloud environments, and provide actionable security recommendations. DarQ Intel is designed to simplify security workflows and give teams clearer visibility into their infrastructure. Deployment is simple and agent-free, making it easy to get started quickly. The platform integrates with major cloud providers and popular security tools to help centralize insights. It also includes supply chain risk visibility, allowing businesses to identify areas that may need attention. Whether for a small business or a large enterprise, DarQ Intel aims to deliver clear, data-driven security insights that evolve with your organization’s needs. DarQ Security offers a LiTE version for Small Business, and an Enterprise / Government version with enhanced capabilities based on your needs and budget.
    Starting Price: $4.99/month
  • 17
    HackerOne

    HackerOne

    HackerOne

    HackerOne empowers the world to build a safer internet. As the world’s most trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Intel, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020. Headquartered in San Francisco, HackerOne has a presence in London, New York, the Netherlands, France, Singapore, and over 70 other locations across the globe.
  • 18
    Spiceworks IP Scanner
    Discover the devices on your network automatically with the Spiceworks IP Scanner for basic information like OS and MAC Address. Or get detailed hardware and software information on your workstations and servers like CPU, storage, memory, installed software, serial number, and lots more. Get the information you need, with minimal setup! IP Scanner is a cloud tool that scans your local network and returns a sortable list of the devices it discovers. Devices can be filtered, searched, and exported to CSV. By default, it detects and scans a local subnet, though you can also define a custom IP range. The IP Scanner lists each device’s hostname, IP address, vendor, OS, MAC address, description, open ports, and if it’s up or down. The kind of data returned depends on the type of device being scanned.
  • 19
    BreachAware

    BreachAware

    BreachAware

    Our customers not only strengthen their cybersecurity posture, but they also save time and money during the process. Small businesses and big brands across the world use breachaware's intel to protect their organization and people from threats. From emails, usernames, and passwords, to biometric data and behavioral data, we track over 100 types of personal and financial information exposed in third-party data breaches. We’ve analysis on millions of domains impacted by a breach from all over the world (including over 400 top-level domains). We continually find, analyze and monitor publicly compromised personal information (crunching billions of leaked credentials to help you). We’ll notify you if we find personal information related to your domain in any new breaches (naturally, no news is good news). You can access historical insight related to your domain at any time you like (actionable intelligence to help protect your privacy).
    Starting Price: $31.35 per month
  • 20
    DevKnife

    DevKnife

    Solo Tuna

    DevKnife is a lightweight all-in-one toolkit for developers on macOS. It brings together common utilities in a single native app, so you don’t have to switch between websites, CLI tools, or bulky IDEs for simple tasks. Current modules include: JSON Editor & Formatter, Text Compare, JWT Decoder, Domain & IP WHOIS, Port Scanner, Network Speed Test, Color Picker, Hasher, and IP Location. All tools are built to run locally without relying on third-party APIs. For network-related features like WHOIS or Speed Test, DevKnife connects directly to the relevant servers without sending your data elsewhere. DevKnife is actively developed with new features and modules added over time — a handy companion for everyday developer tasks.
  • 21
    activeDEFENCE

    activeDEFENCE

    activereach

    From malware to advanced persistent threats (APT) to extortion & internal breaches, threats to your organisation’s infrastructure are unrelenting. Today’s businesses must consider smartphones, tablets, and consumerization of IT, combined with telecommuters, contractors, partners, and business-critical services hosted in the cloud. Security is more important than ever—and far more complex. To defend your information and systems, you need an adaptable, multi-layered defensive strategy that encompasses all the components of your IT environment, from the network to the perimeter, data, applications and endpoints, minimising and managing the weak points and vulnerabilities that expose your organisation to risk. activereach’s end-to-end portfolio of network security solutions can protect your business from advancing threats, enhance network performance, and optimise operational efficiencies.
  • 22
    Sweepatic

    Sweepatic

    Sweepatic

    Sweepatic has received the “Cybersecurity Made in Europe” label from the European Cyber Security Organisation (ECSO). This certification is awarded to European IT security companies and recognizes them for their reliable and trustworthy solutions. Sweepatic offers a premium Attack Surface Management Platform. With Sweepatic you get to know your attack surface and its exposure outside in. Because in cyberspace you don’t want to be an obvious target for bad actors. Overview of key information elements about your attack surface allowing to drill down to all details. Action center of structured and prioritized observations in function of criticality requiring remediation. A visual overview of your websites and their response status. A topological, bird’s eye view of your global attack surface with all assets and their interrelation. Knowing what to protect based on actionable insights is key.
  • 23
    Red Sift ASM
    Red Sift ASM (formerly Hardenize) provides a managed service that combines automated internet asset discovery with continuous network and security monitoring. Internet Asset Discovery Multiple sources of information feeds our custom search engine to help you find your websites. Background searches find new properties that belong to you and automatically add them to your inventory. Host and Network Monitoring We continuously monitor your entire network perimeter with fresh data updated daily. We combine scanning of domains, hostnames, and IP addresses. Certificate Inventory and Expiration Monitoring We monitor your certificates and notify if they're about to expire. Crucially, we also monitor the certificates of third-party services, helping you avoid problems via dependencies and services you don't control directly.
  • 24
    Red Sift Brand Trust
    Red Sift Brand Trust (formerly OnDOMAIN) enables Security personnel to quickly shut down phishing sites, discover and secure legitimate domains that have been forgotten about, and defend their brand against abuse and reputational damage. Uncover Red Sift Brand Trust monitors in the region of 150 million hostnames a day and has access to real-time domain registration data allowing users to stay up-to-date and ready to respond to emerging threats. Investigate Red Sift Brand Trust monitors asset health for all domains and subdomains within your perimeter including WHOIS data, rasterized web snapshots, logo detection, and live spam data. Logo Management & Detection enables you to easily upload all variants of your organization’s brand assets to its logo management library. machine vision-based logo detection then scans the web for both legitimate and illegitimate use of an organization’s brand.
  • 25
    VSYS Name

    VSYS Name

    VSYS Name

    VSYS Name is an ICANN-accredited domain name registrar powered by Virtual Systems (VSYS Host). The platform allows users to search, register, transfer, and manage domain names with transparent pricing, built-in WHOIS privacy on eligible TLDs, full DNS control, and support for cryptocurrency payments.
  • 26
    STAT Search Analytics
    STAT is a powerful SERP analytics tool that gives you visibility into your performance in the search engines. With large-scale rank tracking and SERP analytics, you’re always the first with the answer to what’s happening on the SERPs. Each SERP we collect is a veritable treasure trove of consumer research and competitive intel. And with powerful analytics in play, we’re unlocking oodles of new insight — helping SEOs understand their unique search landscape and spot golden opportunities. You can track thousands to millions of keywords, review detailed SERP analytics, and analyze share of voice metrics to measure performance and uncover new opportunities. Robust competitor tracking enables you to know who and what you’re up against to gain the advantage. The most powerful rank tracker in the industry, STAT offers serious SERP tracking for experts.
    Starting Price: $720/month
  • 27
    OpenDNS

    OpenDNS

    Cisco Umbrella

    Cisco Umbrella provides protection against threats on the internet such as malware, phishing, and ransomware. OpenDNS is a suite of consumer products aimed at making your internet faster, safer, and more reliable. Thanks to our global data centers and peering partnerships, we shorten the routes between every network and our data centers, making your internet access even faster. With filtering or pre-configured protection, you can safeguard your family against adult content and more. It’s the easiest way to add parental and content filtering controls to every device in your home. Get OpenDNS up and running in your home quickly and easy. PhD in Computer Science not required. Thanks to our helpful guides and knowledge base, set up is a breeze. Blocks more than 7 million malicious domains and IPs while delivering high performance. Identifies more than 60 thousand new malicious destinations (domains, IPs, and URLs) daily. Our global network sustains over 620 billion DNS queries daily.
    Starting Price: $19.95 per year
  • 28
    OwnRegistrar

    OwnRegistrar

    OwnRegistrar

    OwnRegistrar is a white labeled domain registrar which offers domain name registration services to large corporates, small companies, web hosting providers, individuals, domain resellers, etc. OwnRegistrar offers all the top TLDs through its channel partners worldwide. Along with the private labeled control panel, OwnRegistrar also provides a private labeled whois interface. Even if the customers of the channel partners view the whois will be able to see the name of the channel partner thanks to the complete branding feature available. Whois based on port 43 can also be made private labeled. With lots of branding available, OwnRegistrar makes sure, the customer do not come to us directly for their commercial transactions.
    Starting Price: $35 per year
  • 29
    Securd DNS Firewall
    Make sure the Internet is always safe and available, to all your worldwide users, with our global, anycast dns firewall and dns resolver featuring 10ms resolutions, real-time threat protection, and a zero-trust posture to reduce your attack surface at the edge. Anti-virus protection can't keep up with the pace of modern malware, ransomware, and phishing attacks. It takes a layered approach to defend your assets from these threats. Deploying DNS filtering reduces the risk of a successful cyber attack by blocking access to malicious domains, disrupting downloads from compromised sites, or preventing malware from exfiltrating your data. DNS firewalls also provide real-time and historical visibility into endpoint DNS queries and resolution, which is necessary to hunt down and remediate infected and compromised devices quickly. Securd DNS Firewall is powered by a worldwide anycast network.
  • 30
    WebSniffer

    WebSniffer

    WebSniffer

    WebSniffer is an internet intelligence platform that tracks changes on the web and provides actionable insights to its users. The platform currently offers the following features: - view HTTP response headers of any web page - perform domain name lookups - perform IP address lookups - reverse DNS lookups - reverse IP lookups - display users information such as their IP address, user agent, and more. You can also generate random and secure passwords with WebSniffer. On the WebSniffer roadmap, the following milestones are planned: - Upgrading the user interface - Upgrading to a modern web platform - Adding API support - Adding both free and paid plans - Adding multiple separate modules, such as WHOIS, RDAP, domain monitoring, etc.
  • 31
    Namebay

    Namebay

    Namebay

    Discover all our domain name services! Choose the hosting package that suits your needs. Protect your exchange with a certificate. Dedicated solutions for corporate with complete management of the domain name portfolio. Tailored solutions for each type of reseller, WHMCS, white label, API. With over 15 years of experience as an ICANN accredited registrar, discover our solutions. In order to get your website off the ground, you will need a domain name and a hosting environment on which to build your website. Namebay offers a variety of shared hosting environments and packages to meet all of your online web hosting needs. The ideal hosting solution for your personal website or display website. To check the status of your domain name, you can find it in the client interface of your current registrar. Applied to the world of domain names, a WHOIS is a directory that lists a domain name's legal and technical information.
    Starting Price: €1.99 per month
  • 32
    GoDaddy Premium DNS
    Keep your website safe and always online. Our Premium DNS infrastructure with the Anycast DNS Network, enables your visitors to find you fast, anywhere around the world. Secondary DNS is your safeguard against power outages and internet routing problems, ensuring that your website is always available. Our online dashboard makes it easy to manage and make updates to your DNS — and you don't have to be tech savvy to use it. Every domain name is given a series of numbers known as an IP address. When you type a domain name into your browser, the DNS looks through a huge database to find the IP address and directs your browser to the website content. We distribute your DNS information on multiple servers around the world on our premium global network. So, visitors searching your site connect to the closest server, for a fast response. Our DNS security feature (DNSSEC) stops hackers by securing the "look up" process and verifying the visitor is arriving at your site.
  • 33
    DNSSense

    DNSSense

    DNSSense

    DNSEye detects malicious traffic on your network and reports whether this traffic can be blocked by your other security devices. DNS is used by all protocols like HTTP, HTTPS, SMTP, and IoT. DNS traffic provides information about your entire network, regardless of its network protocol. With DNS tunnelling, data exfiltration attacks cannot be detected by DLP products. It requires DNS log analysis for an effective solution. 80% of malware domains currently do not have an IP address. Malware requests that do not have an IP address can only be detected in the DNS log. DNSservers generate a large number of difficult-to-understand logs. DNSEye enables the collection, enrichment, and AI-based classification of the DNS logs. With its advanced SIEM integration, it saves time and EPS by transferring to SIEM only the data that SOC teams need to see. DNSEye can collect logs from many different brands and models of DNS servers without the need for making any change in your network structure.
  • 34
    Website Booster

    Website Booster

    Website Booster

    Give your site a boost with this utility. The free application submits your website URL to 4000+ unique backlink sites, in turn, increases the search engine rankings and visitors. Website Booster is the only free app that submits your website to over 5500 unique backlink sites and directories. Instantly gives a jumpstart to your traffic and immediate visibility to the search engines. This app submits your URL directly to a large variety of domain, whois, and DNS statistic websites. These backlink sites are highly visible to the major search engines and will quickly spider, aggregate, and link to your website, many within the same day of submission. Since the major search engines frequently visit these domain statistic websites, you gain instant visibility to search engine robots, instant boosting of website backlinks, and ultimately, increased traffic to your site.
  • 35
    Slitheris Network Discovery

    Slitheris Network Discovery

    Komodo Laboratories

    The vast majority of network scanning software packages require some type of credentialed access to remote devices to detect operating systems. However, using TCP/IP stack fingerprinting and other technologies, Slitheris Network Discovery can identify a wide array of operating systems without credentials or authentication, including Windows (and its Edition), Linux, iOS, and Android. Slitheris can even scan for other details related to the operating system such as Windows Uptime, Cold Boot Time, Time of Day and Domain/Workgroup names, and distinguishes between Domain and Workgroup types, all without needing authentication or credentialed access. This saves the time and frustration trying various usernames and passwords or having to visit PCs and servers in person. Managed Service Providers and other IT Providers will particularly appreciate this unique feature.
    Starting Price: $195 per 256 devices
  • 36
    Palo Alto Networks DNS Security Service
    Automatically secure your DNS traffic by using Palo Alto Networks DNS Security service, a cloud-based analytics platform providing your firewall with access to DNS signatures generated using advanced predictive analysis and machine learning, with malicious domain data from a growing threat intelligence sharing community. Maximize your protections against threats using DNS with the DNS Security subscription service. The DNS Security service now features individually configurable and extensible DNS Security Signature Categories, which allows you to create discrete security policies based on the risk factors associated with certain types of DNS traffic. DNS Security now protects you from additional DNS-based threats, including those that rely on dynamic DNS hosted domains, recently registered domains, and phishing domains.
  • 37
    PassiveTotal
    RiskIQ PassiveTotal aggregates data from the whole internet, absorbing intelligence to identify threats and attacker infrastructure, and leverages machine learning to scale threat hunting and response. With PassiveTotal, you get context on who is attacking you, their tools and systems, and indicators of compromise outside the firewall—enterprise and third party. Investigation can go fast, really fast. Find answers quickly with over 4,000 OSINT articles and artifacts. Along with 10+ years of mapping the internet, RiskIQ has the deepest and broadest security intelligence on earth. By absorbing web data like Passive DNS, WHOIS, SSL, hosts and host pairs, cookies, exposed services, ports, components, and code. With curated OSINT and proprietary security intelligence, you can see everything—from every angle—on the digital attack surface. Take charge of your digital presence and combat threats to your organization.
  • 38
    Intigriti

    Intigriti

    Intigriti

    Intigriti is the trusted leader in crowdsourced security, empowering the world’s largest organizations to find and fix vulnerabilities before cybercriminals can exploit them. Since 2016, the company has helped its customers reduce risk with the expertise of 125,000+ global security researchers, enabling real-time vulnerability detection and preventing costly breaches. Intigriti's flexible platform offers a full suite of solutions, including Bug Bounty, Managed VDP, PTaaS, Focused Sprints, and Live Hacking Events, tailored to your evolving digital needs and delivered through a pay-for-impact model, meaning you only pay for valid vulnerabilities submitted. With industry-leading triage, commitment to legal compliance, and exceptional customer service, Intigriti is the go-to choice for organizations like Coca-Cola, Microsoft, and Intel to secure their digital assets and stay ahead in a changing world.
  • 39
    CleanBrowsing

    CleanBrowsing

    CleanBrowsing

    A modernized approach to DNS-based content filtering and security. Easily decide what should, and should not, be allowed on your internet. Effective for our kids, powerful for our business. CleanBrowsing is a DNS-based content filtering service that offers a safe way to browse the web without surprises. It intercepts domain requests and filter sites that should be blocked, based on your filtering needs. Our, free, family filter, for example, blocks porn, obscene, and adult content, while still allowing Google, Youtube, Bing, DuckDuckGo and the rest of the web to load safely. Our free filters are comprised of three predefined filters for global consumption (Security, Adult, and Family). The Family filter blocks adult / obscene content and applies Safe Search filters to Google, Bing, Yandex, etc. The security filter, however, only focuses on restricting access to malicious activity.
  • 40
    LocatePLUS

    LocatePLUS

    LocatePLUS

    LocatePLUS is the nation’s leading provider of accurate, in-depth investigative and skip-tracing data. The LocatePLUS database consists of billions of current historical, cross-referenced public and private records. The latest technology and comprehensive reports save time and money. Our case management system will make your job easier than ever. LocatePLUS’ proprietary online investigative databases allow our users to access billions of public and non-public skip-tracing records and information from any internet browser. Our web-based investigative search tools and skip trace software match and link data based on the specified search parameters inputted by our users. The LocatePLUS skip tracing tools and law enforcement software provide an abundance of available, cross-referenced records found in the hundreds of databases we query. LocatePLUS takes reliability and compliance seriously, our data center is SSAE 16 certified.
    Starting Price: $99.95 per month
  • 41
    Copernic Desktop Search

    Copernic Desktop Search

    Copernic Technologies

    There are few desktop search solutions on the market that offer the depth, relevance and context that Copernic’s Desktop Search can provide. It’s one thing to conduct fast searches. It’s a whole other ballgame finding exactly what you’re looking for. No IT experience required! Simply install our application and read our guides! With Copernic’s intuitive interface, you’ll be up-and-searching in no time flat. Thanks to Copernic’s advanced keyword map (index), unlock a wealth of information that is currently buried in your PC. We support over 150 file extensions and 11 languages! Once you have built your index in just a few steps, Copernic will immediately display search results that are the most aligned with your keyword search. Copernic does NOT collect any data. You can rest assured knowing all of your information is secure and cannot be access by any third party.
    Starting Price: $49.95 one-time payment
  • 42
    KamuSEO

    KamuSEO

    KamuSEO

    It's a complete visitor and SEO analytics, a great tool to analyze your site's visitors and analyze any site's information. It has the ability to analyze your own website's information. It has the ability to analyze any other website's information. It has a native API by which developers can integrate its facilities with another app. KamuSEO is an app to analyze your site visitors and analyze any site's information such as Alexa data, similar web data, whois data, social media data, Moz check, search engine index, Google page rank, IP analysis, malware check, etc. Input a domain name and you will get a js code. Copy the embedded js code and paste it into your web page. You will get a daily report about your website. You will get some bonus utility tools such as email encoder/decoder, metatag generator, tag generator, plagiarism check, valid email check, duplicate email filter, URL encoder/decoder, etc.
    Starting Price: $29 per month
  • 43
    DNSlytics

    DNSlytics

    DNSlytics

    The ultimate online investigation tool. Find out everything about a domain name, IP address, or provider. Discover relations between them and see historical data. Use it for your digital investigation, fraud prevention, or brand protection. Premium website access is for IT professionals. You get more page views, alerts, data, and premium features. Month and year plans are available. Our premium API enables programmable access to our data and tools. Access our data and tools directly from your favorite browser. Our most-used browser extension, with over 150,000+ users, allows you to see detailed IP addresses, domain names, and provider information for the current website. This browser extension displays detailed information without leaving the current website. The information can, for example, be used for online investigation. The tooltip provides information on the city, region, and country name, and the popup reveals additional domain details.
    Starting Price: $29 per month
  • 44
    WiFi Scanner

    WiFi Scanner

    WiFi Scanner

    WiFi Scanner scans for surrounding networks and supplies vital WiFi information needed for troubleshooting purposes. Filtering and sorting options narrow the results in a high-occupancy area. 2.4 GHz and 5 GHz channel graphs allow you to see overlapping and overbearing signal interferences, which affect network performance. The IP Scanner searches for devices connected to your network. An overcrowded network can cause bandwith and speed issues. The Speed Test helps you keep track of your network speeds and performance. Walk to different areas of your network with a laptop to test download and upload speeds. Who's On My Network is an IP Scanner that searches your network for connected devices. Too many devices on the network can slow it down, causing your device to have speed and/or connection problems. It can also be used to detect intruders on your network.
    Starting Price: $29.99 one-time payment
  • 45
    Akamai

    Akamai

    Akamai Technologies

    Akamai keeps digital experiences closer to users than anyone — and keeps attacks and threats farther away. Powering the next frontier in digital transformation, the Akamai Intelligent Edge Platform is the defensive shield that can surround and protect everything — sites, users, devices, data centers, clouds. It is the technology that eliminates friction and enables immersion. A quarter of a million edge servers, deployed in thousands of locations around the world ingest 2.5 exabytes of data per year and interact with 1.3 billion devices and 100 million IP addresses every day. Residing within one network hop of over 90% of the world’s Internet users — it is the only global, massively distributed, intelligent edge platform, with the scale, resiliency and security that businesses demand. Advanced threat intelligence to help manage security risks and protect against cyberattacks.
  • 46
    LizardSystems Network Scanner
    Network Scanner is an IP scanner that is used for scanning both large corporate networks that have hundred thousands of computers along with small home networks with several computers. While the program can scan a list of IP addresses, computers and ranges of IP addresses, the number of computers and subnets is unlimited. Network Scanner will show you all the shared resources, including system and hidden NetBIOS (Samba) shared resources along with FTP and web resources. To audit network computers or use it to search for available network resources, both network administrators and regular users can use Network Scanner. Network Scanner will not only find network computers and shared resources, but also check its access rights which the user can mount as a network drive or open them in Explorer or in their browser. You can easily export the results of scanning the network to an XML, HTML or text file or store them in the program itself.
    Starting Price: $79.95 one-time payment
  • 47
    Lansweeper

    Lansweeper

    Lansweeper

    Discover your IT with Lansweeper, build your centralized IT Asset System of Record. With the Lansweeper Deepscan IP Scanner engine, you can audit all assets in your company network without installing software on them. Build an accurate network inventory of all your hardware, software and users. Scan Windows, Linux, and Mac devices. Keep track of your licenses, serial numbers and warranties of major brands like Dell, IBM, HP, Toshiba and many more. Detect Unauthorized Local Admins, unify Office 365 and AD User Data, get the netbios domain name, check for Windows updates and more. Discover all assets in your IT environment that you didn’t even knew about & take full control of your network. Download your free trial and start your IT asset management.
    Starting Price: $495.00/year
  • 48
    Scanner

    Scanner

    Scanner

    Scanner.dev is a cloud-native security data lake and lightweight security information and event management (SIEM) platform that indexes logs directly in your own Amazon S3 buckets, letting you retain unlimited logs and run full-text searches across petabytes of data in seconds without additional ETL or schema requirements. It builds lightweight indexes that make any log format instantly searchable and supports hyper-fast search and investigation, continuous threat detection with customizable detection rules managed as code via GitHub, and integrated alerting with APIs for automation and integration into existing security workflows. Scanner’s streaming detection engine continuously evaluates rule queries in near real time and can backtest detection logic against historical data, while its API and Model Context Protocol (MCP) enable programmatic access and AI-assisted analysis of security data.
    Starting Price: $30,000 per year
  • 49
    Textkernel Labor Market Insights
    In today’s highly competitive labor market, leveraging advanced data tools delivers the edge. Textkernel’s Labor Market Insights provides access to the largest job database, containing over 3 billion current and historical job postings from over 33 million websites. Plus our ability to structure and enrich an organization’s private data allows for analyzing talent data in the context of market demand. - Make better data-driven decisions - Identify business opportunities quicker - Stay competitive Trusted by the top staffing agencies, governments, leading consultancy companies and Fortune 500 companies worldwide, Textkernel’s Labor Market Insights provides real-time and historical labor market data for 15 key markets in North America, Europe, and APAC. Improve your lead generation, identify labor market trends, follow the evolving demand for skills, and track your prospects – all with one solution.
    Starting Price: $100/month
  • 50
    Tempered

    Tempered

    Tempered

    The network you want over the network you have. Fast and easy to deploy & maintain. No forklifts required. Protect critical assets and unpatchable IoT devices with a segmented virtual air gap. Securely connect any device or network across public, private, cloud, & mobile networks. Stop lateral movement from bringing your network down. Ditch internal firewalls and complex VLANs & ACLs. Replace expensive MPLS links with more cost efficient SDWAN capabilities. Simplify remote access for employees & vendors, hybrid cloud connectivity and multi-cloud transport, replace expensive MPLS network connections (SDWAN), isolate and protect critical process controls and devices, securely share device data with the cloud analytics, provide safe vendor access to sensitive industrial networks, segment networks for enhanced security and ransomware protection.