Immediate Steps to Take
Isolate Affected Systems
Disconnect compromised servers from the network. Do NOT power off — you may need forensic evidence from memory.
Preserve Evidence
Capture logs, screenshots, and network traffic. Do not delete or modify any files on the compromised system.
Rotate Credentials
Change all passwords, API keys, tokens, and SSH keys that may have been exposed. Start with admin/root accounts.
Enable DDoS Protection
If under DDoS, enable Cloudflare "Under Attack" mode or activate your CDN's DDoS mitigation immediately.
Block Attacker IPs
Check access logs for attacker IPs. Add them to your firewall blocklist or WAF rules immediately.
Scan for Exposure
Use our Exposure Checker to scan your domain for leaked secrets, open paths, and misconfigurations.
Request Emergency Help
Fill out this form and our security team will respond within 1 hour during business hours.
Request Submitted
Your incident report has been received. Our security team will review it and respond as soon as possible. In the meantime, follow the immediate steps on the left to contain the threat.
Run an Exposure Scan on your domain while you wait.
Free Security Tools
Exposure Checker
Scan any domain for leaked API keys, exposed paths, missing security headers, SSL issues, and known vulnerabilities.
Live Threat Map
Real-time cyber threat intelligence from CISA, NVD, and URLhaus. Monitor active attacks and latest CVEs.
SSL Checker
Verify your SSL/TLS certificate is valid, properly configured, and not expired or misconfigured.
DNS Lookup
Check DNS records to detect unauthorized changes, DNS hijacking, or suspicious record modifications.
Password Generator
Generate strong, unique passwords for credential rotation after a breach. Configurable length and character sets.
Hash Generator
Generate file hashes (SHA-256, MD5) to verify file integrity and check for tampering on compromised systems.