1.0
Web Reconnaissance Platform

Understand Any
Domain's Footprint

Real DNS lookups, subdomain enumeration, WHOIS data, SSL inspection, and security header analysis — all proxied through our backend with SSRF protection.

GUEST: 1 free scan  •  REGISTERED + APPROVED: unlimited  •  Sign in for full access

Real Backend Tools

subdomain

Subdomain Enumeration

Queries Certificate Transparency logs (crt.sh) for real subdomains, resolves each to live IPs.

LIVE
dns

DNS Records

Full DNS resolution via Cloudflare DoH — A, AAAA, MX, NS, TXT, DMARC, DKIM, CAA, SOA.

LIVE
whois

WHOIS / RDAP

Real registration data from RDAP servers — registrar, dates, nameservers, status flags.

LIVE
ssl

SSL Certificate

Live TLS handshake — cipher, issuer, expiry, SAN entries, key algorithm, certificate chain.

LIVE
headers

HTTP Headers

Real HTTP request with security header grading — HSTS, CSP, X-Frame, CORS analysis.

LIVE
robots

Robots.txt

Fetches and parses real robots.txt — disallowed paths, sitemaps, crawl-delay directives.

LIVE

All Available Tools

Real tools are backend-proxied. Simulation tools include authorization disclaimers.

01 — dns
DNS Records
LIVE

A, AAAA, MX, NS, TXT, DMARC, DKIM via Cloudflare DoH

02 — subdomain
Subdomains
LIVE

CT log enumeration via crt.sh with live IP resolution

03 — whois
WHOIS
LIVE

RDAP-based registration and registrar data

04 — ssl
SSL / TLS
LIVE

Live certificate inspection and chain analysis

05 — headers
HTTP Headers
LIVE

Security header audit with grading

06 — robots
Robots.txt
LIVE

Fetch and parse disallowed paths and sitemaps

07 — port
Port Scanner
SIM

Common port enumeration visualization

08 — waf
WAF Detection
AUTH REQ

Web application firewall fingerprinting simulation

09 — xss
XSS Probe
AUTH REQ

Cross-site scripting test simulation with disclaimer

10 — sqli
SQLi Probe
AUTH REQ

SQL injection probe simulation with disclaimer

11 — brute
Brute Force
AUTH REQ

Login brute force simulation with disclaimer

12 — osint
OSINT
AUTH REQ

Open-source intelligence gathering simulation

29 — netscan
Network Scanner
LIVE

Live host discovery, CIDR summary, open port detection

30 — portsvc
Port + Service Map
LIVE

29-port scan with banner-based service fingerprinting

31 — asntrace
ASN Tracer
LIVE

AS path & BGP ownership — org, CIDR, peer ASNs

32 — iprepute
IP Reputation
LIVE

DNS-based multi-blocklist check — Spamhaus, blocklist.de

33 — certmap
Cert Transparency Map
LIVE

Extended CT log search via crt.sh, grouped by SAN

34 — netpath
Network Path Analysis
LIVE

Traceroute with per-hop RTT, rDNS, ASN attribution

Intelligence Sources

NiWeb queries authoritative external sources with no API keys required. All lookups are proxied through our backend with SSRF protection.

crt.sh
Certificate Transparency
Live CT log subdomain enumeration with IP resolution
Cloudflare DoH
DNS Resolution
DNS-over-HTTPS for all record type lookups
RDAP / WHOIS
Registration Data
IANA RDAP bootstrap for registrar and domain info
NVD / NIST
CVE Intelligence
National Vulnerability Database for CMS exploit lookup
URLHaus
Malware URLs
abuse.ch malware distribution URL database
PhishTank
Phishing Intel
Community-verified phishing URL database
Spamhaus ZEN
IP Reputation
DNS-based IP blocklist for spam and abuse detection
Wappalyzer DB
Tech Detection
Technology fingerprinting rules for CMS and frameworks

Network Intelligence

Advanced network analysis tools — ASN tracing, IP reputation, certificate transparency, and path analysis.

netscan

Network Scanner

Live host discovery across surrounding IP range with CIDR summary and open port detection.

LIVE
portsvc

Port + Service Map

Expanded port scanner (top 29 ports) with service version fingerprinting via banner grabbing.

LIVE
asntrace

ASN Tracer

Full AS path & BGP ownership map — ASN number, org, CIDR blocks, upstream/peer relationships.

LIVE
iprepute

IP Reputation

DNS-based multi-blocklist IP reputation — Spamhaus ZEN, blocklist.de, emerging threats.

LIVE
certmap

Cert Transparency Map

Extended CT log search via crt.sh — grouped by SAN, wildcard chain, multi-provider lookup.

LIVE
netpath

Network Path Analysis

Traceroute with per-hop RTT, reverse DNS, RTT histogram, and ASN attribution per hop.

LIVE

FAQ

Yes. Passive tools (DNS, WHOIS, SSL, subdomains, headers, robots, tech detection, reputation) make only standard read requests and are safe for any domain. Active/offensive tools (SQLi, XSS, brute force, Nikto) show an authorization disclaimer and should only be run against systems you own or have written permission to test.
LIVE tools make real network requests through our backend. SIM tools demonstrate what a real scan would do but use simulated data (used for offensive tools to prevent misuse). AUTH REQ tools require an approved account and display an authorization disclaimer before running — these are the offensive/intrusive tools.
NiWeb queries Certificate Transparency logs via crt.sh to find all subdomains that have ever had an SSL certificate issued for them. Each discovered subdomain is then resolved via Cloudflare DoH to check if it's still live. This is entirely passive and leaves no trace on the target.
Guests get 1 free full scan (all passive tools) per session. Signing in with Discord gives you access to more scans. Approved accounts get unlimited scans with full access to all tools including the auth-required offensive modules.
Yes. From within the NiWeb app, you can export any scan as JSON or print/save the results panel as PDF. Approved accounts also get full scan history in the dashboard where past scans can be reviewed and re-exported at any time.
Initialize Access

Ready to Start?

Sign in with Discord for full access, or try NiWeb as a guest with 1 free scan. No email required — Discord OAuth only.

Sign In with Discord

or try as guest — 1 free scan, no account needed