
Connect with our sales team
Get a live demo!
Logout
PreCrime Brand dashboard
Overview of key metrics and real-time alerts for the following dates:
Activity
1,213,376
Observed infrastructures
Cost savings overview
$960K
Operational cost savings
$140K
Costs saved by successful takedowns
4
Successful takedowns
6
Ongoing takedowns
Analyzed Infrastructures
Takedown median time
3 days
|
Min. 0 day
Max. 6 days
My brands
Adding new brand
Please provide some details to create the new record.
Use case type
Domain to protect
Main language
Keyword list
​
startup
tech
internet
I understand that I am solely responsible for this action and its consequences also I've read and accept the terms & conditions
Exact match search
Disrupted attacks
Our automated disruption feature takes immediate initiative to disable and neutralize sites that we have predicted to be malicious. The site is not removed, but its capability is greatly reduced.
Exact match search
- 1
vought.com
Protected domain: acme.com
0 Hours
Last update
17 Mar 2024, 5:15 PM
Detection date
< 50%
Disruption impact
homelander.com
Protected domain: acme.com
0 Hours
Last update
17 Mar 2024, 3:37 PM
Detection date
< 50%
Disruption impact
homelander.com
Protected domain: homelander.com
1 Hour
Last update
17 Mar 2024, 3:29 PM
Detection date
< 50%
Disruption impact
homelander.com
Protected domain: homelander.com
1 Hour
Last update
25 Mar 2024, 3:29 PM
Detection date
< 50%
Disruption impact
Reporting False Positive
vought.com
Protected domain: vought.com
Alert Datetime: Jan 8, 4:08 AM
11 Days ago
Detection time
$35K
Potential savings

Disruption partners
6
View all
Disruption partners list
Our disruption capability enhances traditional takedown methods, significantly reducing the time to neutralize attacks. While conventional approaches can take time, potentially allowing the attack to persist, our process is fast and proactive.
Upon detecting a potential attack, we immediately activate our partner network to prevent impending malicious activity. This collaboration enables us to block attacks earlier in their lifecycle, minimizing vulnerability windows and providing a more rapid defense.
The disruption does not remove the infrastructure entirely, for this, please click on 'Start takedown'.
Upon detecting a potential attack, we immediately activate our partner network to prevent impending malicious activity. This collaboration enables us to block attacks earlier in their lifecycle, minimizing vulnerability windows and providing a more rapid defense.
The disruption does not remove the infrastructure entirely, for this, please click on 'Start takedown'.
VirusTotal
- Identifies malware and aggregates threat intelligence, helping to block malicious domains and keep you safe.
-
- VirusTotal analyzes files, IPs, and domains for malware, providing extensive threat details and a vast collection of indicators of compromise (IOCs).
- Integrating VirusTotal’s API helps block threats across VPNs, firewalls, secure DNS, endpoint protection, SIEM, SOAR, TIP, and XDR, protecting you from online threats.
Global Cyber Alliance (GCA)
- Deploys cybersecurity tools and informs organizations about threats, enhancing global cybersecurity and trust in DNS.
-
- GCA is a non-profit organization that fosters global cybersecurity by deploying tools, services, and programs, collaborating with various entities.
- When a domain is deemed malicious, GCA informs member organizations and businesses worldwide, enabling them to take preemptive actions and block threats.
Quad9
- Enhances security by blocking access to malicious domains, operating globally to keep your internet experience safe.
-
- Quad9 is a secure, public DNS resolver that blocks access to malicious domains, significantly improving security and privacy.
- When a domain is identified as malicious, Quad9 blocks access worldwide, preventing over 200 million malware, phishing, and spyware events daily.
Layer8
- Prevents access to malicious websites using automated threat blocking, protecting enterprise networks from threats.
-
- Layer8 is a DNS service that uses Response Policy Zones (RPZs) to define policies and block threats.
- When a domain is flagged as malicious, Layer8 blocks access across all enterprise networks using its solutions, ensuring network security.
Spamhaus
- Provides threat intelligence and blocklists to protect email infrastructures, safeguarding millions of mailboxes daily.
-
- Spamhaus aggregates IP and domain reputation data, offering real-time blocklists that protect against malicious URLs and IPs.
- Identified malicious domains are filtered out by email infrastructures using Spamhaus, preventing potentially harmful emails from reaching your inbox.
URLhaus
- URLhaus is a project from abuse.ch with the goal of sharing malicious URLs that are being used for malware distribution.
-
- The purpose of the project is to collect, track and share malware URLs, helping network administrators and security analysts to protect their network and customers from cyber threats
- Submissions to URLhaus are being shared with security solution providers, antivirus vendors and blacklist providers.
AI Feedback
Typosquatting
Redirects to a legit website
Low-confidence registrar
Newly Registered Domain
A records not listed
Domain Parked

Attack lifecycle
Process Overview
This is the main process of actions taken
Reviewed Threat
Mar 14, 2025
Disrupted
Mar 14, 2025
Start Takedown
Mar 14, 2025
Level 1 - Escalation
Mar 16, 2025
Level 2 - Escalation
Mar 21, 2025
Resolution
Reviewed Threat
Disrupted
Start Takedown
Cyber threat detected through monitoring systems; initial assessment conducted to determine severity and scope.
Mar 14, 2025
Level 1 - Escalation
Under review
Mar 16, 2025
Evidence review & gathering
Mar 17, 2025
Action required
Mar 18, 2025
Awaiting response
Mar 21, 2025
Level 2 - Escalation
Delayed
Mar 21, 2025
Pending resolution
Mar 24, 2025
Resolution
Threat Identified, Action Required
The threat has been reviewed and is now ready for your action. To protect your system, it’s time to take the next crucial step. Begin the takedown process now to ensure full security.
Takedown cancelled
fecha
Technical details of the threat
Address: | Domain Name: | Initial Time To Live | Record Class | Record Type | Time To Live | Server |
---|---|---|---|---|---|---|
9115--main--blubb.oggler.lab.dtag.de. | 14361 | IN | CNAME | 14361 | No Server | |
194.25.1.37 | oggler.lab.dtag.de. | 21600 | IN | A | 21600 | No Server |
9115--main--blubb.oggler.lab.dtag.de. | 14400 | IN | CNAME | 14400 | No Server | |
lab.dtag.de. | 1800 | IN | SOA | 1800 | No Server | |
9115--main--blubb.oggler.lab.dtag.de. | 14360 | IN | CNAME | 14360 | No Server | |
lab.dtag.de. | 1760 | IN | SOA | 1760 | No Server | |
Subject: | CN=Kubernetes Ingress Controller Fake Certificate, O=Acme Co |
Thumbprint: | AD3945D5168361E9711ACB8B3B9F6CE3004B211E |
Serial Number: | 00AE7D55F29D51A42AB9DC21D3EF4FE26F |
NotAfter: | 2025-04-05T09:28:04+00:00 |
NotBefore: | 2024-04-05T09:28:04+00:00 |
Domain: dtag.de
Status: connect
Status: connect
Domain connection

Nrd
Good
Bad
Requested
Sno | Domain | Role | Score |
---|---|---|---|
1 | adwa-tech.com | requested | 1.0 |
2 | adwa-tech.com | requested | 1.0 |
3 | adwa-tech.com | requested | 1.0 |
4 | adwa-tech.com | requested | 1.0 |
Takedowns
List of all attacks that have started a Takedown. This removes the malicious online content, services, or infrastructure to disrupt cybercriminal activities.
Request takedown
Please fill out all required fields with necessary information to submit a manual takedown request, either through the form or by adding relevant social media links.
Requestor email
Country code + Phone number
Description
Evidence upload
Exact match search
4 takedowns
- 1
Users
Adding new user
Please fill out all the fields with the necessary and mandatory information to create a new user in the system.
First name
Last name
Email
Temporary password
Force new password
Asks the user to reset the password as soon as they enter.
Position
Role
About
Status
Status
Active
Inactive
Users
- 1
Name | Profile | Status |
|
|
---|---|---|---|---|
![]() |
A. Vaughn | User | Inactive | |
![]() |
D. McVicker | User | Active | |
![]() |
John Witter | Company Admin | Active | |
![]() |
John Bosomworth | Company Admin | Active | |
![]() |
Karim Cranton | User | Active | |
![]() |
M. Ingalls | User | Inactive | |
![]() |
Michelle Benfell | User | Inactive | |
![]() |
Nadya Stitson | User | Active | |
![]() |
Rochell Farnaby | User | Inactive | |
![]() |
Veronique Gibling | User | Active |
Settings
Note: all changes will take effect and be saved automatically.
Account
Information pertaining to your Client Panel user.
Company Details
Informations related to your company.
Danger Zone
User Information
Saved
First name
Last name
Email
Position
About
Theme
First name
Last name
Position
Role
About
Company Information
Saved

Cost per attack
0k
Company name
VAT
Contact details
Contact Phone
Company email
Address
Post code
Language
Cost per attack
Company name
VAT
Contact details
Contact Phone
Company email
Address
Post code
Language
Danger Zone
Password
Role
Under observation
Last 30 days of pending threats under review by our Ai and those already discarded.
2
Under analysis
2
Trademark
2
Discarded
2 attacks found
- 1
26 Jun 2024, 8:06 PM
Under analysis
26 Jun 2024, 8:06 PM
Under analysis
2 attacks found
- 1
24 Jun 2024, 11:42 AM
Trademark
20 Jun 2024, 3:18 PM
Trademark
2 attacks found
- 1
26 Jun 2024, 7:12 PM
Discarded
26 Jun 2024, 6:43 PM
Discarded