The mlab Domain Scan provides a structured analysis of internet domains,
helping security teams understand infrastructure, trust signals, and exposure.
It focuses on transparency, technical accuracy, and analyst‑driven interpretation.
The overview section provides the essential context of the domain scan. It confirms what domain was analyzed, when the scan occurred, and whether the analysis completed successfully.
This section acts as the reference point for all subsequent data and helps assess the freshness and completeness of the results.
This notice clarifies the intended use of the domain scan and provides additional context when the analyzed domain belongs to the user.
It encourages legitimate owners to authenticate and unlock deeper insights while reinforcing responsible and defensive usage.
Domain Intelligence is the core of the analysis. It aggregates technical signals collected from multiple sources to describe how a domain is configured, exposed, and interconnected.
Rather than producing a single score, mlab exposes raw and enriched data so analysts can interpret results based on their own context and threat model.
SSL and TLS certificates provide critical insight into how a domain is deployed, shared, and trusted across infrastructures.
mlab collects certificate data from transparency logs and live endpoints to expose relationships that are often invisible at first glance.
Active subdomains represent the live and reachable attack surface of a domain.
These entries are resolved in real time and reflect services that are currently exposed to the internet.
Currently resolving and reachable. Represents the immediate attack surface of the domain.
Observed in the past through passive sources. May indicate legacy risks or abandoned infrastructure.
This section includes subdomains observed historically or via passive sources, even if they are no longer active.
Historical data is essential for identifying legacy services, abandoned infrastructure, and potential takeover risks.
DNS records define how a domain is routed, hosted, and delegated across providers.
Misconfigurations at the DNS level often lead to security issues, service outages, or exposure of internal infrastructure.
Email authentication mechanisms protect a domain from spoofing, phishing, and unauthorized message delivery.
mlab evaluates configuration correctness and enforcement strength using industry-standard mechanisms.
The robots.txt file defines how automated crawlers are allowed
to interact with a domain.
While primarily intended for search engines, this file can unintentionally expose sensitive paths or internal structure.
The security.txt file is a standardized mechanism for declaring
how security issues should be reported.
Its presence reflects a domain’s security maturity and openness to responsible disclosure.
Some domains cannot be fully analyzed due to size, complexity, rate limiting, or explicit platform restrictions.
In such cases, scans may timeout or return partial results while still providing useful insights.
mlab Domain Scan is intended for defensive security, research, and legitimate infrastructure analysis.
The platform does not perform intrusive exploitation, does not bypass authentication, and does not modify remote systems.