How does it work?

Created by Charley Downey, Modified on Fri, 22 Mar at 12:43 PM by Charley Downey

To use the Breach Check, you can either enter a business domain or upload a spreadsheet with a list of domains as a portfolio. The system will then identify all the internet-facing assets of the business, which is then used to conduct a scan across our scanning modules.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article