How Radar Works

From domain entry to final report — here's every step of the scanning process.

1
🌐

Enter Your Domain

Type your target domain. We check DNS and HTTP reachability before proceeding.

2

Domain Validation

We verify the domain resolves and is reachable. If behind a firewall, allowlist our scanner IP: 136.114.231.35

3
🔑

Verify Ownership

Add a DNS TXT record to prove you own the domain. Permanent — only needed once per domain.

4
💳

Payment

$99 per scan via Stripe. Secure checkout — payment collected only after verification.

5
⚙️

Scan Execution

Our automated engine runs a comprehensive security assessment against your target.

6
📄

Report Delivery

A PDF report is emailed to you and available for download in your dashboard.

What Our Scanner Does

During Step 5, our engine performs a multi-phase security assessment:

🔍 Reconnaissance

  • Subdomain enumeration and discovery
  • DNS record analysis (A, AAAA, MX, TXT, CNAME, NS)
  • Technology fingerprinting (web servers, frameworks, CMS)
  • WHOIS data and domain registration details

🔌 Port & Service Scanning

  • Identifying open ports across your infrastructure
  • Detecting running services and their versions
  • Service banner grabbing for deeper identification

🛡️ Vulnerability Assessment

  • Testing for OWASP Top 10 vulnerabilities (XSS, SQLi, CSRF, etc.)
  • SSL/TLS configuration and certificate analysis
  • Missing or misconfigured security headers
  • Outdated software with known CVEs

🤖 AI-Powered Analysis

  • All findings validated by AI to reduce false positives
  • Severity classification: Critical, High, Medium, Low
  • Contextual risk assessment based on your technology stack

📊 Report Generation

  • Executive summary for management
  • Detailed technical findings for engineers
  • Prioritized remediation recommendations
  • Overall risk assessment and scoring

Understanding Your Report

Your PDF report is organized so both technical and non-technical stakeholders can take action:

📋 Cover Page

Shows your domain, scan date, and overall risk rating at a glance.

📝 Executive Summary

A high-level overview for management — key risks, overall security posture, and top priorities without deep technical detail.

🔧 Technical Findings

Detailed breakdown for engineers — each vulnerability with severity, description, affected component, and evidence.

✅ Remediation Recommendations

Prioritized action items telling you exactly what to fix and in what order, based on risk and effort.

📎 Appendix

Raw scan data, full port listings, and additional technical details for those who want the complete picture.

Want to see what a real report looks like?

Ready to see your own report?

Get a comprehensive security assessment for your organization.

Start Your Scan →