Launch offer : Available for FREE during our launch period

Detect Hacking

We have a broad range of methods to detect hacks including common library hacks, cross site scripting, SQL injection and fake referrers.

Hacks Summary


SQL Injection has been around a long time. You may think it does not affect you but hackers are coming up with new ways of getting access to your database. Along with many of the url methods we detect, we also look at the user agent and referrer data being sent by a visitor to see if it contains a malicious payload. If these details are being recorded or considered by your website (or perhaps some third party library it uses) you could be vulnerable.

SQL Injection Reports


We maintain a large database of urls and attack methods used by hackers and can highlight users attempting to hijack your website. This database is constantly improving and growing.

Risks Report


Our code uploads section can show any instances that a user has tried to upload potentially malicious code to your webserver.

Code Uploads

We can also detect bots looking to exploit issues with common libraries. For example, editors and image uploaders might be exploited by hackers to upload malicious code to your webserver.