Pentiq

Free Tool

Free Attack Surface Preview

Enter your work email and we'll preview what your domain looks like from the outside - subdomains, email security records, and exposed metadata. Free. No obligation.

Check your domain

How exposed is your attack surface?

Enter your work email below. We'll use the domain to run reconnaissance against your external estate and return a snapshot in under a minute.

Your work email

Your email is solely to identify your domain. We won't add you to a mailing list without your consent. See our privacy policy.

Concerned about what we find?

A Pentiq consultant will walk you through it.

Talk to Pentiq

What we check

What's in the preview?

The preview groups external signals across three categories - the same surfaces a real attacker maps before deciding whether to go further.

External attack surface

Common subdomains and the addresses behind them - the things attackers find with reconnaissance, mapped against your domain.

Email security posture

MX, SPF, and DMARC records - the configuration that decides whether someone can send phishing emails as your domain.

Exposed web metadata

HTTPS reachability, page title, server headers, and X-Powered-By disclosures - the things your site tells visitors about its underlying tech.

Why this matters

External reconnaissance is the first thing a real attacker does.

Reconnaissance is free

Before any attacker buys an exploit, they Google. Subdomain enumeration, DNS lookups, and metadata harvesting are all free, automated, and constant. If something's exposed, it's already been seen.

Most exposure is forgotten

Forgotten dev environments, expired certs, legacy subdomains pointing nowhere - external attack surfaces grow faster than they shrink. Most clients haven't audited theirs in over a year.

Email is the cheap entry

A weak SPF record or missing DMARC policy lets attackers send phishing emails that look genuinely like yours. It's the single cheapest, highest-success attack vector going.

What happens next

We don't just show you the preview - we'll help you act on it.

The preview is a starting point. If you want a Pentiq consultant to walk through what it means - and what changes the fastest - a 30-minute conversation usually clarifies it.

  • Plain-English explanation of what the preview surfaces and what it means
  • Priority actions based on your specific gaps
  • Options for full external infrastructure testing or Continuous Security Assurance

About this tool

What the preview is - and isn't

The Attack Surface Preview runs lightweight external reconnaissance against your domain - DNS lookups, common subdomain checks, email-record analysis, and surface web metadata. It's a snapshot, not a manual penetration test.

For a deeper view of what's actually exploitable, see External Infrastructure Penetration Testing or CSAS.

Any leads generated through this tool are stored by Pentiq in accordance with our Data Processing Agreement.

Common questions

Frequently asked questions.

Is this a real penetration test?

No. The preview runs basic external reconnaissance against your domain - DNS, common subdomain checks, email-record lookups, and surface web metadata. It's a snapshot of what's visible from the outside. A penetration test goes much deeper, with manual exploitation and business-impact analysis.

Why does it need a work email?

We extract the domain from the email so we know what to preview. We also use the email to follow up if you'd like a written-up version or want to discuss the findings.

What happens to my email address?

It's used to identify your domain, log the lead, and follow up if you've consented. We don't add you to a marketing list, sell your data, or share it with anyone outside Pentiq. See our privacy policy for the full picture.

Is anything I'd be uncomfortable sharing exposed by this?

The preview only collects information that's already public - DNS records, web metadata, email-server configuration. Nothing the tool retrieves is data only you have access to.

See the full picture

The preview is the first 5%. The rest is a real penetration test.

When you're ready to know what's actually exploitable - not just what's visible - book a 30-minute call and a Pentiq consultant will scope it honestly.