See What Attackers See
Scan any domain to uncover exposures, breached credentials, and attack surface risks — then generate a shareable threat briefing that turns prospects into policyholders.
You can't defend against what you can't see.
Companies assume they know what's exposed. Attackers know better. Here's the gap.
Scattered tools, scattered picture
You're checking breach databases, DNS records, and credential leaks one by one — across scattered tools with no single view. That's not a process, it's a blind spot.
Assumptions instead of evidence
Industry averages and recycled stats won't move anyone to act. People only take action when they see their own exposure — whether it's a board, a client, or your own team.
Technical reports that don't translate
Decision-makers don't care about vulnerability scores. They care about business risk, financial exposure, and what to do about it.
There's a better way.
HOW IT WORKS
From domain to threat briefing in 60 seconds
Enter a domain
Type in any domain — that's the only input we need to start.
We scan 15+ sources in parallel
Attack surface, breached credentials, email security gaps, and industry-specific threats — all scanned in under 60 seconds.
Share a threat briefing
Get a password-protected, presentation-ready report you can share with your team, your client, or your board.
What Tinte scans for you
Six intelligence modules that turn a domain into a complete risk picture.
Attack Chain Analysis
MITRE ATT&CK mapping of discovered findings to techniques and potential business impact. See how exposures connect to ransomware, account takeover, and lateral movement.
Attack Chain Analysis
MITRE ATT&CK mapping of discovered findings to potential impact.
Attack Surface Discovery
See every exposed subdomain, open port, and known vulnerability the target has — before an attacker finds them.
Credential Exposure
Find breached employee passwords and stolen credentials linked to the target domain, with context on where each leak originated.
Email Security Analysis
Assess how well a domain's email is protected against spoofing and phishing, with a clear risk grade and actionable findings.
CVE Vulnerability Assessment
Detect known vulnerabilities (CVEs) on exposed services. CVSS scores, CISA KEV exploit status, and affected assets at a glance.
Industry Threat Landscape
See how the target's sector is being targeted — with real attack trends and claims data from Coalition and Verizon DBIR.
Manufacturing Sector
Report Builder
Choose from 13 slide templates, customize findings, and generate a password-protected briefing ready for your next meeting.
THE PROCESS
How we turn a domain into actionable intelligence
Three stages that transform raw threat data into decision-ready intelligence
Collect from 15+ sources at once
One scan queries breach databases, DNS records, certificate transparency logs, vulnerability feeds, and more — all at the same time, so you don't have to check them one by one.
- •Sources include Censys, LeakCheck, DNSDumpster, Cloudflare, and more
- •Deep-dive options for subdomain intelligence, email security, and industry claims
- •Optimized to deliver maximum intelligence per scan
- •Results returned in under 60 seconds
Analyze and prioritize findings
Raw data gets transformed into structured intelligence: every finding is scored by severity, compared against previous scans, and translated into business impact.
- •Three-tier risk classification: Critical, High, and Medium
- •Scan-over-scan comparison shows what's new vs. already known
- •Financial exposure estimates help quantify potential losses
- •Each module processes independently for reliable, consistent results
Generate a client-ready briefing
The report builder turns findings into a presentation you can share with stakeholders — complete with talking points, risk narratives, and a built-in glossary that explains technical terms in plain language.
- •Auto-generated talking points for each finding
- •Hover any technical term for an instant plain-language explanation
- •Password-protected sharing with view tracking
- •Choose which sections to include and customize as needed
Built with compliance in mind
Every scan is tied to your organization, your user account, and a timestamped record — creating a full audit trail for every assessment. Designed for future compliance framework integration.
TAILORED VIEWS
One scan, four ways to use it
The same intelligence, presented differently for every role in your organization.
Briefing View
Get talking points for your next meeting. Key findings are translated into language that creates urgency and justifies action.
- •Auto-generated talking points per finding
- •Simplified risk metrics for non-technical buyers
- •Risk justification talking points
- •Objection handling scripts
Risk View
Full technical detail — every exposed port, every breached credential, every vulnerability with severity scoring and context.
- •Complete credential exposure details
- •Severity classification: Critical, High, Medium, Low
- •Technology stack fingerprinting
- •Attack vector mapping
Industry View
Show how the target's sector is being targeted, with real claims data and benchmarks from Coalition and Verizon DBIR.
- •Industry-specific threat actor profiles
- •Claims frequency benchmarks
- •Average incident costs by sector
- •Compliance framework mapping
Remediation View
Track what changed between scans, generate remediation checklists, and export evidence packages for incident response.
- •Scan-over-scan comparison
- •New vs. resolved findings at a glance
- •Automated remediation checklist
- •Incident-ready evidence export
Switch between views instantly — same data, different angle.
AI agents that speak compliance.
Specialist AI agents powered by your attack surface data, a compliance knowledge base, and NIST-style frameworks.
Tinte Engine
One backend for all agents. Pulls live scan data — attack surface, breaches, email posture, CVEs, subdomains — searches a compliance knowledge base via RAG, and uses tools for framework mapping and report generation.
NIS2 Compliance Agent
Assesses your organisation against NIS2 Article 21(2) — all 10 technical and organisational measures — mapping breach exposure, email posture, and attack surface gaps to specific articles with citations.
More Agents Coming
The same engine will power additional agents for ISO 27001, SOC 2, DORA, Insurance Risk, and Incident Response — each with framework-specific outputs.
Get Your Intelligence Report — €10
One-time scan. Full domain intelligence — attack surface, credentials, email security, and threat context. No subscription.
Get Your ReportNeed continuous monitoring? Choose a plan below. Customise with add-ons to match your needs.
Team
Best for security teams starting with continuous attack surface monitoring.
- 150 domains
- 3 users
- 3,600 scans per year
- Attack surface discovery
- Credential breach detection
- Email security analysis
- Subdomain intelligence
- GitHub source code leak detection
- Threat context & MITRE ATT&CK mapping
- Downloadable PDF reports
- Email support
Optional add-ons
- Extra 50 domains€800/year
- Extra user seat€400/year
- Extra 1,200 scans€600/year
Business
Best for growing teams scaling monitoring across more assets and users.
Everything in Team, plus:
- 500 domains
- 10 users
- 12,000 scans per year
- All Team features
- Advanced reporting & dashboards
- Priority scan scheduling
- SLA-backed availability
- Dedicated onboarding
- Priority email support
Optional add-ons
- Extra 100 domains€1,200/year
- Extra user seat€350/year
- API access€2,000/year
Enterprise
Best for large organisations needing custom scope, integrations and full data control.
Everything in Business, plus:
- Custom domains & scan volume
- Unlimited users (configurable)
- Custom scan frequency & SLA
- All Business features
- Multi-account management
- Custom data integrations
- SSO & SAML
- Dedicated CSM
- White-label reports
- On-premise / air-gapped options
Optional add-ons
- Custom add-onsQuoted
Get Your Intelligence Report — €10
No subscription required. Full report within 6 hours. One-time payment.
Frequently asked questions
- What is TINTE?
- TINTE is an external attack surface intelligence platform that helps security teams, insurance professionals, and compliance-driven organizations scan any domain to uncover exposed assets, breached credentials, email security gaps, and industry-specific threats — from an attacker's perspective. You get a shareable threat briefing or full Intelligence Report in under 60 seconds.
- How does TINTE scan a domain?
- You enter a domain name. TINTE queries 15+ intelligence sources in parallel — including Censys, Shodan, LeakCheck, DNS and certificate data, breach databases, and email security checks — and aggregates the results into a single view with severity scoring and MITRE ATT&CK mapping. No install required; everything runs in the browser and our backend.
- What data sources does TINTE use?
- TINTE uses 15+ sources such as Censys, Shodan, LeakCheck, DNSDumpster, Certificate Transparency, Have I Been Pwned, VirusTotal, SecurityTrails, MITRE ATT&CK, NVD/CVE, Coalition, and others to build a complete picture of a domain's external risk.
- Who is TINTE for?
- TINTE is built for three audiences: enterprise security teams (CISOs, SOC analysts) who need external attack surface management; cyber insurance professionals (brokers, underwriters, agents) who need client-ready threat briefings; and compliance-driven organizations (NIS2, Cyber Essentials, DORA) who need automated risk evidence and reporting.
- How fast does a scan take?
- A full domain scan and Intelligence Report is typically ready in under 60 seconds. Results are delivered in the platform and can be exported as a password-protected PDF report.