Reflection
Your Business Has
a Reflection.
Everything your business has put on the internet tells a story. Open ports. Exposed services. Email authentication gaps. Subdomains you forgot about. We read that story the same way an attacker does. Before they do.
What We Find
Everything Visible From the Outside.
CVEs and Exposed Services
Public-facing servers, open ports, and software versions matched against known vulnerabilities. Ranked by severity so you know what needs attention first.
Email Authentication Gaps
SPF, DKIM, and DMARC analysis. We identify exactly which gaps allow attackers to send email that appears to come from your domain.
Subdomains and Open Doors
Forgotten subdomains, exposed login portals, certificate details, and technology disclosures that give attackers a map of your environment.
The Process
Passive. Non-Intrusive. Complete.
Reflection never touches your network. Everything we find is publicly visible. We just know where to look.
01
We Find Your Footprint
Your domain is the starting point. From there we map every externally visible asset tied to your business.
02
We Read Every Signal
Open ports, CVEs, DNS records, certificate details, email authentication, subdomains. Every signal is collected, scored, and ranked.
03
You Get a Clear Report
A plain-English report lands in your inbox within 1 business day. No jargon. No fluff. Just what we found and what it means.
Choose Your Scan
Pick Your Starting Point.
No commitment
$0
Free Exposure Scan
- External attack surface mapping
- CVE detection on public-facing services
- Email authentication analysis (SPF, DKIM, DMARC)
- Open port and service enumeration
- Subdomain discovery
- Plain-English findings report within 1 business day
Request Free Scan
Most Popular Start
Flat rate. No multiplier.
$300
Level 2 Assessment
- Everything in the Free Scan
- Deep subdomain enumeration and takeover detection
- Portal and login page discovery
- TLS and SSL deep analysis
- Microsoft 365 tenant fingerprinting
- Banner grabbing and technology disclosure
- Neighbor IP discovery via reverse DNS
- Detailed internal brief with raw findings
Get Started
Ready for a full authorized engagement? Fathom chains your findings into actual breach paths and shows you exactly how far an attacker gets.
Learn about Fathom →