How It Works
From onboarding your first domain to resolving a takedown — here's how MSP Domain Watch protects your clients step by step.
Onboard Your Domains
Add your clients and their domains through the multi-tenant dashboard. Import in bulk via CSV or add one at a time. Each domain is immediately queued for its first scan.
- Add clients individually or import via CSV
- Enter root domains — subdomains are included automatically
- Assign domains to specific clients for organized management
- Bulk import supports hundreds of domains at once
Step 1 Screenshot
Coming Soon
Discover All Permutations
Our engine generates thousands of lookalike domain variants for each monitored domain using multiple techniques — typosquatting, homoglyphs, TLD swaps, bitsquatting, and more.
- 2,000+ permutations generated per domain
- Multiple fuzzing techniques cover every attack vector
- Permutations are stored and tracked over time
- New permutation types added as attack methods evolve
Step 2 Screenshot
Coming Soon
Receive Threat Alerts
When a lookalike domain is registered or changes status, you're alerted immediately. Each alert includes a threat score based on DNS records, MX configuration, content analysis, and SSL certificates.
- Instant alerts via email, webhook, or PSA ticket (coming soon)
- Multi-signal threat scoring: Low, Medium, High, Critical
- Daily digest option for lower-priority notifications
- Configurable alert thresholds per client
Step 3 Screenshot
Coming Soon
Investigate the Threat
Drill into any threat from the dashboard to see full details — DNS records, MX status, WHOIS data, web content analysis, SSL certificate details, and historical scan data.
- Complete DNS, MX, and WHOIS information
- Web content similarity detection for cloned sites
- SSL certificate details and issuance history
- Historical data showing when the domain first appeared
Step 4 Screenshot
Coming Soon
Initiate Takedown
For confirmed threats, initiate a takedown with one click. The system generates an evidence package, looks up the registrar's abuse contact, drafts the abuse report, and tracks follow-ups until the domain is taken down.
- One-click takedown with auto-generated evidence
- Registrar abuse contact database with email templates
- Automated follow-up emails at configurable intervals
- Full audit trail from detection through resolution
Step 5 Screenshot
Coming Soon
See It in Action
A 3-minute walkthrough of the complete workflow.
Product Demo Video
Coming Soon
Ready to get started?
Set up in under 5 minutes. Free 7-day trial, no credit card required.