How Radar Works
From domain entry to final report — here's every step of the scanning process.
Enter Your Domain
Type your target domain. We check DNS and HTTP reachability before proceeding.
Domain Validation
We verify the domain resolves and is reachable. If behind a firewall, allowlist our scanner IP: 136.114.231.35
Verify Ownership
Add a DNS TXT record to prove you own the domain. Permanent — only needed once per domain.
Payment
$99 per scan via Stripe. Secure checkout — payment collected only after verification.
Scan Execution
Our automated engine runs a comprehensive security assessment against your target.
Report Delivery
A PDF report is emailed to you and available for download in your dashboard.
What Our Scanner Does
During Step 5, our engine performs a multi-phase security assessment:
🔍 Reconnaissance
- Subdomain enumeration and discovery
- DNS record analysis (A, AAAA, MX, TXT, CNAME, NS)
- Technology fingerprinting (web servers, frameworks, CMS)
- WHOIS data and domain registration details
🔌 Port & Service Scanning
- Identifying open ports across your infrastructure
- Detecting running services and their versions
- Service banner grabbing for deeper identification
🛡️ Vulnerability Assessment
- Testing for OWASP Top 10 vulnerabilities (XSS, SQLi, CSRF, etc.)
- SSL/TLS configuration and certificate analysis
- Missing or misconfigured security headers
- Outdated software with known CVEs
🤖 AI-Powered Analysis
- All findings validated by AI to reduce false positives
- Severity classification: Critical, High, Medium, Low
- Contextual risk assessment based on your technology stack
📊 Report Generation
- Executive summary for management
- Detailed technical findings for engineers
- Prioritized remediation recommendations
- Overall risk assessment and scoring
Understanding Your Report
Your PDF report is organized so both technical and non-technical stakeholders can take action:
📋 Cover Page
Shows your domain, scan date, and overall risk rating at a glance.
📝 Executive Summary
A high-level overview for management — key risks, overall security posture, and top priorities without deep technical detail.
🔧 Technical Findings
Detailed breakdown for engineers — each vulnerability with severity, description, affected component, and evidence.
✅ Remediation Recommendations
Prioritized action items telling you exactly what to fix and in what order, based on risk and effort.
📎 Appendix
Raw scan data, full port listings, and additional technical details for those who want the complete picture.
Want to see what a real report looks like?
Ready to see your own report?
Get a comprehensive security assessment for your organization.
Start Your Scan →