Skip to content
Tintelligence
Find It Before They Do

See What Attackers See

Scan any domain to uncover exposures, breached credentials, and attack surface risks — then generate a shareable threat briefing that turns prospects into policyholders.

15+ intelligence sources · 50+ threat signals per scan · CVE assessment included · Results in ~4 seconds

You can't defend against what you can't see.

Companies assume they know what's exposed. Attackers know better. Here's the gap.

01

Scattered tools, scattered picture

You're checking breach databases, DNS records, and credential leaks one by one — across scattered tools with no single view. That's not a process, it's a blind spot.

02

Assumptions instead of evidence

Industry averages and recycled stats won't move anyone to act. People only take action when they see their own exposure — whether it's a board, a client, or your own team.

03

Technical reports that don't translate

Decision-makers don't care about vulnerability scores. They care about business risk, financial exposure, and what to do about it.

There's a better way.

HOW IT WORKS

From domain to threat briefing in 60 seconds

01

Enter a domain

Type in any domain — that's the only input we need to start.

02

We scan 15+ sources in parallel

Attack surface, breached credentials, email security gaps, and industry-specific threats — all scanned in under 60 seconds.

03

Share a threat briefing

Get a password-protected, presentation-ready report you can share with your team, your client, or your board.

What Tinte scans for you

Six intelligence modules that turn a domain into a complete risk picture.

ATTACK CHAIN

Attack Chain Analysis

MITRE ATT&CK mapping of discovered findings to techniques and potential business impact. See how exposures connect to ransomware, account takeover, and lateral movement.

Attack Chain Analysis

MITRE ATT&CK mapping of discovered findings to potential impact.

Mode
Highest risk: Leaked Credentials > Valid Accounts (T1078) > Data Breach
6Findings9Techniques6Impacts
Discovered findingsATT&CK techniquesPotential impact
311 Leaked Credentials73 Plaintext Passwords80 Stealer Logs80 Missing DKIM144 High Severity CVEs73 Critical CVEsValid Accounts (T1078) 3465Credential Stuffing (T1110) 933Credentials in Files (T1552) 219Credentials from Web Browsers (T1555) 73Steal Web Session Cookie (T1539) 73Phishing (T1566) 73Exploit Public-Facing App (T1190) 651Spearphishing Link (T1566.002) 73Exploitation for Client Ex. (T1203) 434Data Breach 2145Espionage 770Financial Fraud 386Account Takeover 990Ransomware 1206Service Disruption 217
THREAT INTELLIGENCE

Attack Surface Discovery

See every exposed subdomain, open port, and known vulnerability the target has — before an attacker finds them.

Subdomain
Status
Risk
Tech
vpn.acme-corp.com
[200]
CRITICAL
OpenVPN
admin.acme-corp.com
[200]
HIGH
WordPress
staging.acme-corp.com
[200]
HIGH
Node.js
api.acme-corp.com
[200]
MEDIUM
Express
www.acme-corp.com
[200]
LOW
React
+142 more discovered
HUMAN RISK

Credential Exposure

Find breached employee passwords and stolen credentials linked to the target domain, with context on where each leak originated.

🔴j.smith@acme-corp.com
Found in: LinkedIn 2023, Collection #5
Password: ••••••••[EXPOSED]
🟠admin@acme-corp.com
Found in: Adobe Breach
Password: ••••••••[HASHED]
+12 more credentials exposed
EMAIL SECURITY

Email Security Analysis

Assess how well a domain's email is protected against spoofing and phishing, with a clear risk grade and actionable findings.

Overall Score
68/100Grade: C
SPF
100/100
DKIM
100/100
DMARC
20/100
VULNERABILITIES

CVE Vulnerability Assessment

Detect known vulnerabilities (CVEs) on exposed services. CVSS scores, CISA KEV exploit status, and affected assets at a glance.

Showing 4 CVEs of 15How we calculate
CVE ID
Score
Severity
Assets
Description
CVE-2023-28531
9.8
Critical
11
ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
6 Affected Assets — Service Banner Evidence
IP:Port
Service Banner
Hostname
203.0.113.10:22
OpenSSH/8.8
cdn.example-corp.de:22
203.0.113.22:22
OpenSSH/8.9p1 Ubuntu-3ubuntu0.13
login.example-corp.de:22
203.0.113.22:22
OpenSSH/8.9p1 Ubuntu-3ubuntu0.13
login-api.example-corp.de:22
203.0.113.22:22
OpenSSH/8.9p1 Ubuntu-3ubuntu0.13
login-pma.example-corp.de:22
203.0.113.44:22
OpenSSH/9.2p1 Debian-2+deb12u2
wissen.example-corp.de:22
203.0.113.55:22
OpenSSH/8.8
www.example-corp.de:22
CVE-2023-38408
9.8
Critical
29
The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system.
CVE-2024-6387
8.1
High
4
A signal handler race condition in OpenSSH server (sshd) allows unauthenticated remote code execution as root on glibc-based Linux systems.
CVE-2023-48795
5.9
Medium
18
The SSH transport protocol with certain OpenSSH extensions allows remote attackers to bypass integrity checks (Terrapin attack).
INDUSTRY DATA

Industry Threat Landscape

See how the target's sector is being targeted — with real attack trends and claims data from Coalition and Verizon DBIR.

Manufacturing Sector

Ransomware+23%
BEC Attacks+18%
Data Breach+12%
Supply Chain+8%
Source: Coalition 2025 • Verizon DBIR
DELIVERABLES

Report Builder

Choose from 13 slide templates, customize findings, and generate a password-protected briefing ready for your next meeting.

Target Info
Select Slides
Review
Title Slide
Executive Summary
Attack Surface
Email Security
Credential Exposure
Recommendations
5 slides selected
See sample report
15+
Intelligence Sources
Scanned in parallel
50+
Threat Signals
Per domain scan
<60s
Time to Report
From domain to briefing
100%
Browser-Based
No install required

THE PROCESS

How we turn a domain into actionable intelligence

Three stages that transform raw threat data into decision-ready intelligence

1

Collect from 15+ sources at once

One scan queries breach databases, DNS records, certificate transparency logs, vulnerability feeds, and more — all at the same time, so you don't have to check them one by one.

  • Sources include Censys, LeakCheck, DNSDumpster, Cloudflare, and more
  • Deep-dive options for subdomain intelligence, email security, and industry claims
  • Optimized to deliver maximum intelligence per scan
  • Results returned in under 60 seconds
2

Analyze and prioritize findings

Raw data gets transformed into structured intelligence: every finding is scored by severity, compared against previous scans, and translated into business impact.

  • Three-tier risk classification: Critical, High, and Medium
  • Scan-over-scan comparison shows what's new vs. already known
  • Financial exposure estimates help quantify potential losses
  • Each module processes independently for reliable, consistent results
3

Generate a client-ready briefing

The report builder turns findings into a presentation you can share with stakeholders — complete with talking points, risk narratives, and a built-in glossary that explains technical terms in plain language.

  • Auto-generated talking points for each finding
  • Hover any technical term for an instant plain-language explanation
  • Password-protected sharing with view tracking
  • Choose which sections to include and customize as needed

Built with compliance in mind

Every scan is tied to your organization, your user account, and a timestamped record — creating a full audit trail for every assessment. Designed for future compliance framework integration.

TAILORED VIEWS

One scan, four ways to use it

The same intelligence, presented differently for every role in your organization.

FOR CLIENT-FACING TEAMS

Briefing View

Get talking points for your next meeting. Key findings are translated into language that creates urgency and justifies action.

  • Auto-generated talking points per finding
  • Simplified risk metrics for non-technical buyers
  • Risk justification talking points
  • Objection handling scripts
FOR SECURITY TEAMS

Risk View

Full technical detail — every exposed port, every breached credential, every vulnerability with severity scoring and context.

  • Complete credential exposure details
  • Severity classification: Critical, High, Medium, Low
  • Technology stack fingerprinting
  • Attack vector mapping
FOR EXECUTIVES

Industry View

Show how the target's sector is being targeted, with real claims data and benchmarks from Coalition and Verizon DBIR.

  • Industry-specific threat actor profiles
  • Claims frequency benchmarks
  • Average incident costs by sector
  • Compliance framework mapping
FOR SECURITY & OPERATIONS

Remediation View

Track what changed between scans, generate remediation checklists, and export evidence packages for incident response.

  • Scan-over-scan comparison
  • New vs. resolved findings at a glance
  • Automated remediation checklist
  • Incident-ready evidence export

Switch between views instantly — same data, different angle.

AI AGENTS

AI agents that speak compliance.

Specialist AI agents powered by your attack surface data, a compliance knowledge base, and NIST-style frameworks.

Tinte Engine

One backend for all agents. Pulls live scan data — attack surface, breaches, email posture, CVEs, subdomains — searches a compliance knowledge base via RAG, and uses tools for framework mapping and report generation.

Scan DataRAGTools
Live

NIS2 Compliance Agent

Assesses your organisation against NIS2 Article 21(2) — all 10 technical and organisational measures — mapping breach exposure, email posture, and attack surface gaps to specific articles with citations.

Art. 21 MappingGap Analysis
Coming Soon

More Agents Coming

The same engine will power additional agents for ISO 27001, SOC 2, DORA, Insurance Risk, and Incident Response — each with framework-specific outputs.

ISO 27001SOC 2DORAInsuranceIncident Response

Get Your Intelligence Report — €10

One-time scan. Full domain intelligence — attack surface, credentials, email security, and threat context. No subscription.

Get Your Report
Secure payment via StripeReport within 6 hours

Need continuous monitoring? Choose a plan below. Customise with add-ons to match your needs.

Team

Best for security teams starting with continuous attack surface monitoring.

€650/month
Sign up
  • 150 domains
  • 3 users
  • 3,600 scans per year
  • Attack surface discovery
  • Credential breach detection
  • Email security analysis
  • Subdomain intelligence
  • GitHub source code leak detection
  • Threat context & MITRE ATT&CK mapping
  • Downloadable PDF reports
  • Email support

Optional add-ons

  • Extra 50 domains€800/year
  • Extra user seat€400/year
  • Extra 1,200 scans€600/year
Most Popular

Business

Best for growing teams scaling monitoring across more assets and users.

€1,000/month
Sign up

Everything in Team, plus:

  • 500 domains
  • 10 users
  • 12,000 scans per year
  • All Team features
  • Advanced reporting & dashboards
  • Priority scan scheduling
  • SLA-backed availability
  • Dedicated onboarding
  • Priority email support

Optional add-ons

  • Extra 100 domains€1,200/year
  • Extra user seat€350/year
  • API access€2,000/year

Enterprise

Best for large organisations needing custom scope, integrations and full data control.

Custom price
Talk to sales

Everything in Business, plus:

  • Custom domains & scan volume
  • Unlimited users (configurable)
  • Custom scan frequency & SLA
  • All Business features
  • Multi-account management
  • Custom data integrations
  • SSO & SAML
  • Dedicated CSM
  • White-label reports
  • On-premise / air-gapped options

Optional add-ons

  • Custom add-onsQuoted
No subscription required for one-time reportFull report in 60 seconds15+ data sources

Get Your Intelligence Report — €10

No subscription required. Full report within 6 hours. One-time payment.

Frequently asked questions

What is TINTE?
TINTE is an external attack surface intelligence platform that helps security teams, insurance professionals, and compliance-driven organizations scan any domain to uncover exposed assets, breached credentials, email security gaps, and industry-specific threats — from an attacker's perspective. You get a shareable threat briefing or full Intelligence Report in under 60 seconds.
How does TINTE scan a domain?
You enter a domain name. TINTE queries 15+ intelligence sources in parallel — including Censys, Shodan, LeakCheck, DNS and certificate data, breach databases, and email security checks — and aggregates the results into a single view with severity scoring and MITRE ATT&CK mapping. No install required; everything runs in the browser and our backend.
What data sources does TINTE use?
TINTE uses 15+ sources such as Censys, Shodan, LeakCheck, DNSDumpster, Certificate Transparency, Have I Been Pwned, VirusTotal, SecurityTrails, MITRE ATT&CK, NVD/CVE, Coalition, and others to build a complete picture of a domain's external risk.
Who is TINTE for?
TINTE is built for three audiences: enterprise security teams (CISOs, SOC analysts) who need external attack surface management; cyber insurance professionals (brokers, underwriters, agents) who need client-ready threat briefings; and compliance-driven organizations (NIS2, Cyber Essentials, DORA) who need automated risk evidence and reporting.
How fast does a scan take?
A full domain scan and Intelligence Report is typically ready in under 60 seconds. Results are delivered in the platform and can be exported as a password-protected PDF report.

We use cookies and similar technologies to analyze site usage and improve your experience. Privacy Policy