Security intelligence
your AI can call directly

Plug SwarmHawk into Claude, Cursor, or any MCP-compatible assistant. Scan domains, check breaches, and get AI threat analysis β€” without leaving your conversation.

18 security checks 7 MCP tools 25 EU countries Free tier available
Checking server… View on GitHub β†—
{
  "mcpServers": {
    "swarmhawk": {
      "url": "https://swarmhawk.com/mcp",
      "headers": {
        "X-API-Key": "YOUR_KEY"
      }
    }
  }
}
Click to generate your free API key

Free: 10 scans/month Β· Pro: €29/mo Β· Business: €99/mo

scan_domain() ~30s
quick_risk_score() ~3s
check_typosquats() ~5s
check_breach_exposure() ~3s
check_reputation() ~8s
batch_risk_scores() ~10s
get_quota() instant
πŸ”

Security Due Diligence

Ask Claude to scan vendor domains before signing contracts. Risk assessment without leaving your conversation.

πŸ’Ό

M&A Security Review

Batch scan acquisition targets. Claude ranks domains by risk and flags deal-breaker findings automatically.

πŸš€

Pre-deployment Checks

Wire into your CI/CD pipeline. Catch SSL expiry and misconfigs before they hit production.

βš™οΈ

Security Automation

Build internal security agents that monitor your entire domain portfolio on autopilot.

also available as

Protect your domain.
Know before attackers do.

18 automated security checks, AI threat analysis, and monthly PDF reports delivered to your inbox β€” across 25 European countries. No technical knowledge required.

€50/domain/year Monthly AI reports NIS2 compliance No setup needed
βœ“ SSL/TLS CertificateValidity, expiry, TLS grade
βœ“ HTTPS RedirectEnforced HTTPS on all traffic
βœ“ Security HeadersCSP, HSTS, X-Frame-Options
βœ“ DNS ConfigurationSPF, DMARC, DNSSEC
⚠ Typosquat MonitorLookalike domain detection
βœ“ Breach ExposureHaveIBeenPwned 12B+ accounts
βœ“ Shodan Port ScanOpen ports & CVEs
βœ“ VirusTotal94 antivirus engines
βœ“ Google Safe BrowsingPhishing & malware flags
βœ“ Spamhaus DBLDomain block list
βœ“ URLhausMalicious URL database
βœ“ Tech FingerprintCMS, framework, jQuery version
βœ“ HTTP MethodsDangerous methods exposed
βœ“ Cookie SecuritySecure, HttpOnly, SameSite
βœ“ Content PolicyMixed content & CSP
βœ“ Subdomain ScanExposed subdomains & takeover
βœ“ Email SecuritySPF, DKIM, DMARC policy
βœ“ AI Threat AnalysisPlain-language findings + fixes

Free scan Β· No credit card required

Top Domains by Country
Ranked by web traffic Β· Source: SimilarWeb / Tranco Top 1M Β· Updated monthly
🏒

SME Protection

Enterprise-grade security monitoring at €50/year. Know instantly if your domain appears on malware lists or breach databases.

πŸ“‹

NIS2 / DORA Compliance

Monthly reports serve as audit evidence for EU regulations. Stay compliant without hiring a dedicated security team.

🎯

Brand Protection

Detect typosquat domains registered by attackers. Protect customers from phishing sites impersonating your brand.

πŸ“§

Monthly AI Reports

Plain-language PDF every month. Risk score, new findings, and step-by-step fixes β€” no technical knowledge needed.

🏦

Financial Services

Banks, fintechs, and insurance firms use SwarmHawk for continuous domain monitoring required under DORA and NIS2.

πŸ₯

Healthcare & Public Sector

Hospitals and government bodies monitor domains for breach exposure and blocklist presence to meet GDPR obligations.

πŸ›’

E-commerce

Online shops monitor for typosquats and SSL issues that could send customers to fake checkout pages.

βš–οΈ

Legal & Professional Services

Law firms and accountancies protect client trust by ensuring their domain is clean, verified, and not impersonated.

technical specifications

What powers SwarmHawk

18 checks drawing from 12 independent threat intelligence sources, updated in real-time. Every scan queries live APIs β€” no cached or stale data.

πŸ”’

SSL/TLS & Infrastructure

Certificate validity, expiry, TLS version, cipher strength graded A–F. Checks HTTPS enforcement and redirect chain. Source: direct TLS handshake + Python ssl library.

sslTLS 1.2/1.3HSTS
🌐

DNS & Email Security

SPF, DKIM, DMARC record validation. DNSSEC status. MX record health. Checks for dangling DNS records that enable subdomain takeover. Source: dnspython + direct DNS resolution.

SPFDMARCDNSSECMX
πŸ›‘οΈ

Security Headers

OWASP-recommended HTTP headers: Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, Strict-Transport-Security. Source: direct HTTP inspection.

OWASPCSPHSTS
πŸ”

VirusTotal

Aggregates results from 94 antivirus engines and URL scanners. Detects malware, phishing, and suspicious activity. Used by Google, Cisco, and major security teams globally. Source: VirusTotal API v3.

94 enginesmalwarephishing
🚨

Spamhaus DBL

Spamhaus Domain Block List β€” the world's most widely used DNS-based blocklist. Used by over 3 billion mailboxes. A listing here means significant email deliverability impact. Source: Spamhaus DBL DNS query.

blocklist3B+ mailboxesDNS
πŸ’€

HaveIBeenPwned

Checks 12+ billion breached accounts from 700+ data breaches. Created by Troy Hunt, trusted by FBI and NCA. Identifies if your domain's email accounts appear in known breach dumps. Source: HIBP API v3.

12B+ accounts700+ breachesFBI trusted
πŸ“‘

Shodan

Internet-wide port scanner and CVE database. Crawls the entire internet continuously and maps every exposed service, software version, and known vulnerability. Source: Shodan REST API.

port scanCVE mappingIoT
🌍

Google Safe Browsing

Google's threat intelligence database used to protect Chrome, Firefox, and Safari users. Flags domains used for phishing, malware distribution, and unwanted software. Source: Safe Browsing API v4.

ChromeFirefoxphishing
🦟

URLhaus (abuse.ch)

Community-driven malware URL database maintained by abuse.ch. Tracks active malware distribution sites, botnet C&C servers, and phishing campaigns in real-time. Source: URLhaus API.

malware URLsC&C serversreal-time
🎭

Typosquat Detection

Generates 200+ domain permutations per scan (character swap, omission, addition, homoglyph attacks) and checks DNS registration for each. Detects active phishing infrastructure. Source: dnstwist + DNS.

200+ variantshomoglyphsIDN
πŸ€–

AI Threat Analysis

Claude (Anthropic) synthesises all 18 check results into a plain-language executive summary with prioritised remediation steps. Trained on security reports, CVE databases, and OWASP guidelines. Source: Anthropic Claude API.

ClaudeOWASPCVE
🏷️

Tech Fingerprinting

Identifies CMS (WordPress, Drupal, Joomla), frameworks (React, Vue, Angular), server software, CDN, and jQuery versions. Maps detected versions to CVE database for vulnerability scoring. Source: HTTP headers + HTML parsing.

CMSCVEjQuery
β€” SAMPLE REPORT

Loading…