Skip to content

Tech Fingerprinting

The Tech Fingerprint module infers the technology stack behind a domain entirely from DNS records — without making a single request to the target's web server. By analysing nameserver records, A records, CNAME records, MX records, and TXT records, it identifies the DNS provider, CDN or hosting platform, email provider, and SaaS tools in use.

This approach is both powerful and genuinely passive. The target has no way of knowing the analysis took place because no connection is ever made to their infrastructure.


When to use this module

Use Tech Fingerprinting when you want to:

  • Identify which platforms and services an organisation uses without visiting their website
  • Detect CDN or WAF providers protecting a domain
  • Understand the email platform an organisation has deployed
  • Find SaaS tool usage through DNS verification tokens
  • Build a picture of an organisation's technical maturity and investment level
  • Supplement findings from the DNS module with interpreted conclusions

Common scenarios:

  • A sales team wants to know which technology platforms a prospect uses before an outreach call
  • A security researcher is building a profile of an organisation's infrastructure during authorised reconnaissance
  • A developer is considering a migration and wants to understand how a similar company has structured their stack
  • An IT administrator is auditing their own DNS records to see what information is publicly visible
  • An investigator wants to quickly assess whether a domain belongs to a real operational business or a minimal setup

How it works

The module queries five DNS record types in sequence and applies pattern matching against known signatures for each category.

NS records    →    DNS provider detection
A records     →    Cloudflare proxy detection + IP range matching
CNAME records →    CDN and hosting platform detection
MX records    →    Email provider detection
TXT records   →    SaaS service token detection

No requests are made to the target's web server at any point. Every inference is derived entirely from publicly available DNS data.


What the results tell you

DNS provider

The nameserver (NS) records reveal which company controls DNS resolution for the domain. This is detected by matching NS hostnames against a database of known provider patterns.

Common DNS providers and what they suggest:

ProviderNotes
Cloudflare DNSVery common — also likely using Cloudflare proxy
AWS Route 53Suggests AWS infrastructure elsewhere in the stack
Azure DNSSuggests Microsoft Azure infrastructure
Google Cloud DNSSuggests Google Cloud infrastructure
Hetzner DNSCommon with Hetzner dedicated or VPS hosting
DigitalOcean DNSCommon with DigitalOcean VPS hosting
Namecheap / Registrar DNSDomain using registrar's default nameservers — minimal configuration

The DNS provider is often a strong signal about the rest of the stack. An organisation on Route 53 is almost certainly hosting in AWS. An organisation on Cloudflare DNS may or may not be using Cloudflare's proxy — the A records confirm this.


CDN and hosting platform

CDN and hosting detection works through two signals. First, A records are checked against Cloudflare's known IP ranges — if the IP belongs to Cloudflare, the domain is behind Cloudflare's proxy. Second, CNAME records on the root domain and www subdomain are matched against known hosting platform patterns.

Detected platforms and what they reveal:

PlatformWhat it indicates
Cloudflare (Proxy / WAF)Traffic routed through Cloudflare — origin hidden, DDoS protection active
AWS CloudFrontUsing Amazon's CDN — often with S3 or EC2 origin
FastlyCDN typically used by developers and media companies
NetlifyStatic site or JAMstack deployment
VercelFrontend framework deployment — Next.js, React etc.
GitHub PagesStatic site hosted on GitHub
ShopifyE-commerce platform
SquarespaceWebsite builder platform
WP EngineManaged WordPress hosting
HerokuApplication platform — common for startups and MVPs
RenderModern application hosting platform

What Cloudflare proxy detection specifically tells you:

When Cloudflare proxy is detected the origin server's true IP address and hosting provider are hidden. All GEO-IP and port data will reflect Cloudflare's infrastructure rather than the real host. This is extremely common among legitimate businesses and is not inherently suspicious — but it does limit what passive analysis can determine about the underlying infrastructure.


Email provider

MX records are matched against known mail server patterns to identify the email platform. This is one of the most reliable fingerprinting signals because MX records are mandatory for receiving email and their values are highly distinctive.

Common email providers and what they suggest:

ProviderNotes
Google WorkspaceProfessional Google email — common across businesses of all sizes
Microsoft 365Enterprise Microsoft email — very common in corporates
Proton MailPrivacy-focused email — common with security-conscious operators
HostingerBudget shared hosting email
Zoho MailCost-effective business email — common with smaller companies
MimecastEnterprise email security layer — sits in front of Exchange or 365
ProofpointEnterprise email security — similar to Mimecast
Amazon SESTransactional email sending service — not typically for receiving
MailgunDeveloper-focused transactional email

The email provider choice often reflects organisational maturity. A domain claiming to be an enterprise company using budget shared hosting email is an inconsistency worth noting.


SaaS service tokens

TXT records frequently contain domain verification tokens published when an organisation connects a third-party service. Each token follows a distinctive format that identifies the service it belongs to. NetSpecter matches over 20 known token patterns.

Detected services and what they reveal:

Token patternService detected
google-site-verificationGoogle Search Console
MS=Microsoft 365 or Entra ID
atlassian-domain-verificationAtlassian (Jira, Confluence)
docusign=DocuSign — electronic signature workflows
facebook-domain-verificationMeta / Facebook business account
stripe-verificationStripe — payment processing
zoom-Zoom — video conferencing
hubspot-HubSpot — CRM and marketing
salesforce-Salesforce — enterprise CRM
klaviyoKlaviyo — email marketing
shopifyShopify — e-commerce
ahrefsAhrefs — SEO tooling
braintreeBraintree / PayPal — payment processing
intercomIntercom — customer messaging
pardotSalesforce Pardot — B2B marketing
adobe-idpAdobe Experience Cloud
zendeskZendesk — customer support
twilioTwilio — communications platform

SaaS tokens are one of the most revealing passive signals available. An organisation may not publish their technology stack, but their DNS TXT records often tell the story clearly. A domain with tokens for Salesforce, HubSpot, DocuSign, and Stripe is almost certainly a legitimate commercial operation. A domain with no tokens at all is either very new, very minimal, or deliberately sparse.


Fingerprint summary

At the end of the module a summary consolidates the key findings:

DNS Host        Cloudflare DNS
CDN / WAF       Cloudflare (Proxy / WAF)
Email Stack     Google Workspace
SaaS Count      4 service(s) identified
Cloudflare      YES - IP behind CF proxy

Reading the full output

A well-established organisation:

NS Records           2 nameservers found
  NS                 ns1.company.awsdns-01.com.
  NS                 ns2.company.awsdns-01.net.
DNS Provider         AWS Route 53

A Record             52.84.12.44
A Record             52.84.12.45

CDN / HOSTING STACK
  Detected           AWS CloudFront CDN

Probing MX for email provider...
Email Provider       Microsoft 365

Mining TXT records for SaaS service tokens...
  Detected           Microsoft 365 / Entra ID
  Detected           Google Search Console
  Detected           Atlassian (Jira/Confluence)
  Detected           Salesforce
  Detected           DocuSign

FINGERPRINT SUMMARY
DNS Host             AWS Route 53
CDN / WAF            AWS CloudFront CDN
Email Stack          Microsoft 365
SaaS Count           5 service(s) identified
Cloudflare           No CF proxy detected

Route 53 and CloudFront suggest an AWS-native infrastructure. Microsoft 365 for email. Five SaaS tokens indicating Google Search Console, Atlassian, Salesforce, and DocuSign — a technology footprint consistent with a mid-to-large enterprise.

A minimal or suspicious domain:

NS Records           2 nameservers found
  NS                 paul.ns.cloudflare.com.
  NS                 kinsley.ns.cloudflare.com.
DNS Provider         Cloudflare DNS

A Record             172.67.222.221
A Record             104.21.70.107

CDN / HOSTING STACK
  Detected           Cloudflare (Proxy / WAF)

Email Provider       Self-hosted / Unknown
  MX                 mx1.hostinger.com.
  MX                 mx2.hostinger.com.

SaaS Services        No recognisable tokens in TXT records

FINGERPRINT SUMMARY
DNS Host             Cloudflare DNS
CDN / WAF            Cloudflare (Proxy / WAF)
Email Stack          Unknown
SaaS Count           0 service(s) identified
Cloudflare           YES - IP behind CF proxy

Cloudflare DNS and proxy, Hostinger email, zero SaaS tokens. This is the minimum viable configuration — a domain that has been set up quickly with budget infrastructure and no third-party service integrations visible.


Investigative signals to look for

SignalWhat it may indicate
Zero SaaS tokens on a supposedly established businessMinimal DNS footprint — inconsistent with genuine operational history
Email provider inconsistent with claimed company sizeBudget email on an enterprise claim
CDN proxy masking originCannot determine real hosting location passively
Registrar-default nameserversDomain using default DNS — minimal configuration
Many SaaS tokensGenuine operational footprint — hard to fake
AWS Route 53 or Azure DNSInfrastructure likely hosted on the same cloud platform
Token for payment processor (Stripe, Braintree)Organisation processes payments — consistent with commercial operation
Token for security tools (Ahrefs, SEMrush)Organisation invests in SEO and online presence

Examples across different use cases

Sales intelligence before an outreach call

A sales representative is preparing for a call with a prospect and wants to understand their technology stack beforehand:

Email Stack     Google Workspace
SaaS Count      3 service(s) identified
  Detected      HubSpot
  Detected      Salesforce
  Detected      Stripe

The prospect uses Google Workspace for email, HubSpot for marketing, Salesforce for CRM, and Stripe for payments. The sales representative knows to frame their pitch around integration with these platforms and avoid suggesting the prospect adopt any competing tools they already use.


Competitive intelligence

A product manager wants to understand how a competitor has structured their technical infrastructure:

DNS Host        AWS Route 53
CDN / WAF       AWS CloudFront CDN
Email Stack     Google Workspace
SaaS Count      6 service(s) identified
  Detected      Google Search Console
  Detected      Atlassian (Jira/Confluence)
  Detected      Intercom
  Detected      Zendesk
  Detected      HubSpot
  Detected      Klaviyo

The competitor is AWS-native, uses Google Workspace for email, Atlassian for internal project management, Intercom and Zendesk for customer support, HubSpot for marketing, and Klaviyo for email campaigns. This is a substantial investment in tooling — consistent with a well-funded, operationally mature company.


Auditing your own DNS exposure

An IT administrator wants to see what information their organisation's DNS records reveal to anyone who queries them:

SaaS Count      8 service(s) identified
  Detected      Google Search Console
  Detected      Microsoft 365 / Entra ID
  Detected      Atlassian (Jira/Confluence)
  Detected      Salesforce
  Detected      DocuSign
  Detected      Zoom
  Detected      Adobe Experience Cloud
  Detected      Stripe

Eight services are publicly identifiable through TXT tokens alone. The administrator reviews the list and removes two tokens for services that were decommissioned six months ago but whose DNS records were never cleaned up. They also note that the full list reveals more about the organisation's tooling than they would like to be publicly visible and discuss whether any tokens can be removed without breaking the associated service verifications.


Assessing a domain claiming to be an established business

An analyst is investigating a domain that was used in a suspicious approach. The company claims to have been operating for several years:

Email Stack     Self-hosted / Unknown
  MX            mx1.hostinger.com.
SaaS Count      0 service(s) identified
Cloudflare      YES - IP behind CF proxy

Zero SaaS tokens. Budget shared hosting email. No third-party integrations visible anywhere in the DNS records. A company operating for several years and claiming to work with corporate clients would typically accumulate at least some SaaS service tokens — Google Search Console at minimum, and likely several others. The complete absence of any tokens, combined with other findings across modules, is a strong indicator this domain does not belong to a genuine established business.


Limitations

  • DNS only — the module infers the stack from DNS records exclusively. Technologies deployed at the application layer (frameworks, databases, analytics tools) that do not leave DNS traces are not detected.
  • Token removal — organisations can remove verification tokens from their DNS after initial setup. A service may be in active use but no longer have a visible token if it was cleaned up.
  • CNAME detection scope — CNAME-based platform detection works for domains using CNAME records on their root or www subdomain. Domains using A records directly (rather than CNAMEs) will not trigger CNAME-based platform detection.
  • Non-standard patterns — the module matches against a curated list of known signatures. Unusual or custom configurations may not be recognised.
  • Cloudflare proxy limitation — when Cloudflare proxy is active, CNAME records pointing to origin hosting platforms may not be visible because Cloudflare replaces them with its own A records.

API used

All fingerprinting uses Google Public DNS over HTTPS. NS, A, CNAME, MX, and TXT records are queried. The www subdomain CNAME is also checked separately.

No API key is required. There are no meaningful rate limits for normal use.

https://dns.google/resolve?name={domain}&type={record_type}
https://dns.google/resolve?name=www.{domain}&type=CNAME

See API Rate Limits for a full breakdown across all modules.

Released under the MIT License.