Domain Records Vendors & Technology

Unveils Hidden Technology Footprint, Exposing Potential Vulnerabilities Without Direct Access

ThreatNG's DNS Intelligence module provides a powerful Domain Records Analysis capability, offering unprecedented visibility into an organization's technology stack. Without requiring any authentication or internal access, ThreatNG's platform can uncover a comprehensive range of technologies in use – from cloud infrastructure and CRM systems to marketing automation and developer tools. This profound insight exposes potential vulnerabilities and provides crucial information for security assessments, competitive analysis, and risk management.

Domain Records Vendors and Technology

Unmask Your Vendor Ecosystem: ThreatNG Reveals the Hidden Technology Powering Any Business

Gain a competitive edge and strengthen your security posture with unprecedented visibility into any organization's technology stack. ThreatNG's Domain Records Analysis, a core component of its DNS Intelligence module, goes beyond basic domain information to uncover the hidden vendors and technologies powering their operations. From cloud providers and marketing automation platforms to CRM systems and developer tools, ThreatNG reveals a comprehensive view of its digital infrastructure – all without requiring any internal access. Explore the full spectrum of technology categories and subcategories that ThreatNG uncovers below.

Artificial Intelligence & Machine Learning (AI/ML)

  • AI Model & Platform Providers

  • AI Development & MLOps

Business Software

  • Productivity & Collaboration

  • Customer Relationship Management (CRM)

  • Design & Content Creation

  • E-commerce & CMS

  • Document & Legal Management

Cloud Infrastructure

  • Cloud Service Providers (CSPs)

  • Edge & Serverless Deployment

Cybersecurity

  • Endpoint Security (EDR/AV)

  • Cloud & Infrastructure Security (CNAPP)

  • Web & Network Security

  • Email & Phishing Security

Development & Operations (DevOps)

  • CI/CD & Source Control

  • Monitoring & Observability

  • Testing & Quality Assurance

  • Configuration & Feature Management

Domain & Certificate Services

  • Domain Registration & Hosting

  • DNS Management

  • Certificate Authorities (CA) & SSL

General IT & Productivity

  • General IT Utilities

  • Security & Privacy Tools

  • HR & Workforce Management

  • IoT & Mobile Device Management

Finance & Payments

  • Payment Gateways & Processors

  • Financial & Accounting Software

Hosting & Content Delivery

  • Content Delivery Networks (CDNs)

  • Managed Hosting & Web Platforms

  • Image & Media Optimization

Identity & Access Management (IAM)

  • IAM Platforms

  • Authentication & MFA Tools

Marketing & Sales

  • Marketing Automation

  • Sales Engagement

Security Operations

  • Security Monitoring (SIEM/XDR)

  • Vulnerability & Risk Management (GRC)

  • Access & Identity Security

These vendors are examples of those we externally uncover, but our discovery extends far beyond this list:

1Password, 2Degrees, Abnormal Security, AbuseIPDB, Acronis, ActiveCampaign, Adex, Adlane, Adobe, Adsy, Affelios, Affinity, Ahrefs, AidaFsorm, Airalo, Airtable, Akamai, Alibaba, Alibaba Cloud, Alien Vault (SpyCloud), Algolia, Alidity, Alert Logic, ALTCHA, Amazon, Amplitude, Android, AnnounceKit, Anny, Anodot, Anthropic, Apple Business Manager, Apple iOS, Apperio, AppOmni, Appspace, Aqua Security, Arcules, Arctic Wolf, Armis, AroFlo, Arsen, Asana, Astra, Astronomer, Atlassian, Atmosphere, Attaxion, Attio, Auth0, AutoDesk, AWS, AWS Route 53, Axway Amplify, axios, baidu, Barco, Bazaarvoice, Beam, BeautifulAI, BeCard, Beehiiv, BenQ, BeyondTrust, BettyBlocks, BigCommerce, Bird, BitSight, BitWarden, Bitrise, BookMyName, BotUp, Braze, Brave, BreachBits, BrightData, BrightMove, Browserstack, BugCrowd, Bugfender, BundleDocs, Caf.io, Calendly, CampaignTracks, CampusSuite, Canva, Carbon Black, CassidyAI, Celo, Censys, Centrify (Delinea), CertiK, Chargebee, Check Point, Cisco, Cisco [Intersight], CircleCI, Classroom.cloud, Clerk, ClickFunnels, ClickUp, Cloudbees, Cloudflare, Cloudflare WAF, Cloudflare Zero Trust, CloudHealth, Cloudinary, CMDCbv, Coda, Cofense, Coggle, Cohere, Coalition, ComScore, ConcordPay, ConfigCat, Confluent, Constant Contact, Contrast Security, ConvertKit, CookieYes, Cortex XDR (Palo Alto Networks), CozMos, Creatopy, Creoline, Crowdstrike, Cursor, CustomGPT, CyberArk, Cyweta DNS, D-Trust, Dailymotion, Darktrace, DataDome, Databricks, Datadog, Deep Instinct, DeepCloud.swiss, Dell, Descope, Detectify, Digicert, DigiSafe/DigiCert BIMI, Discord, DMARC Advisor, DMARC Right, DNS Made Easy, DocuSign, Docker, DomainTools, Doppler, DoubleVerify, DragonMetrics, Dragos, Drata, Drift, Dropbox, Duo, DuoCircle, Dynatrace, E2MA, EDI Express, Elastic Security, ElevenLabs, EnterpriseDB, Epay, Ethiack, Etiometry, Everlytic, EXADS, Expensify, Expedient, Extensis, ExtraHop, Ezoic, Facebook, Fastly, Favro, FediDB, Figma, FIDO Security Keys, FireEye, Fireflies AI, Flexera, FlippingBook, FlyWheel, Forcepoint, ForgeRock, Formatic, Fortifi, Fortinet, FoxIT, FreeAgent, Freedom Internet, Freelo, Freshworks, Front, FullStory, GenTrace (AI), Global Sign, Globalsign, GoDaddy, GoodNotes, Google [Firebase], Google Chat, Google Cloud, Google Site, GoSpace AI, GPT-Trainer, Gradle, GraphPad, Greenhouse, Guardicore, Guestpostnow, H8l, HackerOne, Happeo, Hashicorp, Have I Been Pwned, HaveIBeenPwned, Heroku, HeyHack (F5), Hitachi Vantara, Hotjar, Hover, HP, Hubspot, Hugging Face, Human Security, Hut Six, HydrantID, IBM, IdenTrust, IDMelon, Illumio, Imperva, Infor, Infoblox, Infloblox, InfusionSoft, Insomnia, Instapage, Instagram, Intel 471, Intercom, Invicti, iOS, JAMF, JangoMail, JetBrains, Jump Desktop, Jumpsec, Kayak, Keybase, Kiho, Kinsta, Klash, Klaviyo, KnowBe4, KolabNow, Kore, Krisp, Lacework, LangChain, LaunchDarkly, LeapingBunny, Let's Encrypt, Libera Chat, Linaro Automated Validation Architecture (LAVA) system, Linear App, LinkedIn, LiveRamp, Loader.io, Loadmill, LogMeIn, Lookout, Loom, Lucid, Ludus, MailArchiva, Mailcoach, MailerLite, Mailfence, Mailgun, Mailigen, Mailjet, MailPoet, MailRU, Mailtrap, Malcolm, MalwareBytes, ManageEngine Site24x7, Mandiant, Mapsted, Material Security, Maven, Maxcluster, MaxMD, Meta for Work, MetaTrust, MicroSec, Microsoft, Microsoft 365 Dynamics, Microsoft Clarity, Microsoft Defender XDR, Microsoft Development Toolkit, Microsoft Entra, Microsoft Office 365, Mimecast, MindManager, Miro, Mixpanel, Moxo, Mural, Mutant Mail, My Emma, MyCreditUnion.gov, MongoDB, Monday.com, Mosyle, Naver, Natro, NEAT.no, Nearmap, Neo, Netdata, Netim, Netlock, NetToolKit, Netlify, Netskope, New Relic, Nifty, Nintex, NitroPDF, NordPass, Northpass, Notion, Nozomi Networks, NuGet, Offensity, Okta, OneLogin, Onet, Onfido, OpenAI, OpenText, Opine, OPSWAT, OptimizeX, Oracle Cloud Infrastructure, Orca Security, PagerDuty, Palo Alto, Palo Alto Networks, PandaDoc, Panopto, Paperform, Parallels, Parkable, Parsec, PassLeak, Pax8, PayPal, Perception Point, PeopleXD, Perlu, Pexip, Phished.io, Phishing Tackle, PhishLabs, Pics.io, Piktochart, Pinecone, Pingly, Pinterest, Playbook, Plooto, PodUptime, PostHog, Postman, ProdPad, Proofpoint, Procurious, ProtectChildren, ProtonMail, Prowly, QQ Mail, Qualys, Quickbase, QuoVadis, Rapid7, Read AI, Reachdesk, Recorded Future, Recreativ, Red Canary, Red Hat Fuse, Reddit, reMarkable, Reftab, Regery, Replicate, Rippling, Riot Games, RiskIQ, Rock.so, RSA, S4E, SafeBreach, SafeDNS, SafetyCulture, Sage Intacct, Salesfire, Salesforce, SAP, Sapience Analytics, Schoology, Schneider Electric EcoStruxure, Search My Site, Seal Subscriptions, Seatsurfing, SecureDocs, Secureworks, Securiti, SecurityScorecard, SecurityStudio, SecurityTrails, Segment, SentinelOne, Sentry, Shireburn, Showpad, Signal Sciences WAF, SignRequest, Silverfort, Sipgate, SiteLock, Skedda, Slack, Slido, SmarterWX, Smartfense, Smartsheet, Snapcraft, Snyk, SolarWinds, Sonatype, SonicWall, Sophos, Sophos Central, Soverin, Spacelift, Splashtop, Splunk, Sprig, SpringRole, SpyCloud, Square, Squarespace, Stability AI, StartMail, Sterling, StoriesOnBoard, Storly, Storyous, Stripe, Stytch, Substack, Supabase, Supernova Learn, Symantec MDM, Synack, Synology, Synerise, Tailscale, Tanium, TCPShield, TeamViewer, Teamtailor, Teleport, TeleSec, Tenable, ThreatConnect, Threatcop, ThreatLocker, Threatmate, ThreatMetrix, Thinkst Canary, ThousandEyes, ThriveMarket, Ticketbud, TikTok, Toast, TollBit, Traction Guest, Trello, Trend Micro, TrendMicro, Tresorit, Trimble, Tripwire, Trustpilot, Trustwave SSL, Tryane, Twilio, Twingate, Twitter/X, Uber, Ubivox, Unbounce, Unione, Unisender, Unity, Unstoppable Domains, Uplynk, Upsales, Valimail, Validity, Vanta, Veracode, Varnish, Vectra AI, Vercel, Vex, Viblo, Vimeo, Virtru, VisioStudio, VisualStudio, VMWare Cloud, Vosaic, WalletConnect, Wallarm, Wayback Machine, WebFX, Webgains, Webex, Webflow, Weights & Biases, WeWork, Whalebone, Whimsical, WISeKey, Wistia, Wix, Wiz, WooCommerce, WordPress, WordPress VIP, WorkOS, Workplace, Wrike, WSO2, Yahoo, Yandex, Zapier, Zendesk, ZenQMS, Zeplin, ZeroThreat, Zisson, Zoho, Zoom, ZScaler, Zywave

Our solution is designed to externally uncover the use of vendors across your digital supply chain, including the examples above. While this list is representative of our discovery capabilities, it is not exhaustive and is continuously expanded as new vendor-related intelligence is processed.

ThreatNG also discovers and presents Vendors and Technology through these additional sources: