How It Works

From onboarding your first domain to resolving a takedown — here's how MSP Domain Watch protects your clients step by step.

1

Onboard Your Domains

Add your clients and their domains through the multi-tenant dashboard. Import in bulk via CSV or add one at a time. Each domain is immediately queued for its first scan.

  • Add clients individually or import via CSV
  • Enter root domains — subdomains are included automatically
  • Assign domains to specific clients for organized management
  • Bulk import supports hundreds of domains at once
1

Step 1 Screenshot

Coming Soon

2

Discover All Permutations

Our engine generates thousands of lookalike domain variants for each monitored domain using multiple techniques — typosquatting, homoglyphs, TLD swaps, bitsquatting, and more.

  • 2,000+ permutations generated per domain
  • Multiple fuzzing techniques cover every attack vector
  • Permutations are stored and tracked over time
  • New permutation types added as attack methods evolve
2

Step 2 Screenshot

Coming Soon

3

Receive Threat Alerts

When a lookalike domain is registered or changes status, you're alerted immediately. Each alert includes a threat score based on DNS records, MX configuration, content analysis, and SSL certificates.

  • Instant alerts via email, webhook, or PSA ticket (coming soon)
  • Multi-signal threat scoring: Low, Medium, High, Critical
  • Daily digest option for lower-priority notifications
  • Configurable alert thresholds per client
3

Step 3 Screenshot

Coming Soon

4

Investigate the Threat

Drill into any threat from the dashboard to see full details — DNS records, MX status, WHOIS data, web content analysis, SSL certificate details, and historical scan data.

  • Complete DNS, MX, and WHOIS information
  • Web content similarity detection for cloned sites
  • SSL certificate details and issuance history
  • Historical data showing when the domain first appeared
4

Step 4 Screenshot

Coming Soon

5

Initiate Takedown

For confirmed threats, initiate a takedown with one click. The system generates an evidence package, looks up the registrar's abuse contact, drafts the abuse report, and tracks follow-ups until the domain is taken down.

  • One-click takedown with auto-generated evidence
  • Registrar abuse contact database with email templates
  • Automated follow-up emails at configurable intervals
  • Full audit trail from detection through resolution
5

Step 5 Screenshot

Coming Soon

See It in Action

A 3-minute walkthrough of the complete workflow.

Product Demo Video

Coming Soon

Ready to get started?

Set up in under 5 minutes. Free 7-day trial, no credit card required.