Total View Quickstart

Prev Next

Silent Push is a powerful cyber threat intelligence platform designed to help organizations like yours proactively spot potential security risks in your online presence. Think of it as a “detective tool” for your domain: it scans for things like suspicious changes to your website’s underlying setup (DNS records, server details), impersonation attempts by bad actors, or signs of compromise before they turn into real problems. It pulls in data from public sources, including WHOIS (domain ownership information), DNS (how your site resolves online), web searches (checking your site's content and headers), and threat feeds (fingerprints of known bad actors).

The example domain parking-pcnqnzn.top triggered an automated, real-time analysis; no manual scan/search button was needed beyond that initial input. The displayed screen is the overview dashboard of your scan results. It's like the executive summary of your domain's health check. This one raises some red flags immediately (high risk scores, threat feed matches), making it a great example of Silent Push catching potential issues early.

Get Oriented in Total View

This is your command center. Here, you can immediately see any warning lights that could indicate risks, such as unauthorized changes, phishing lookalikes, or exposure to attackers.

  • Top Section (Quick Scores):                    

    • Reputation (circle gauge): This example is High (100/100, red. This is concerning news, indicating a strong connection to known threats, such as spam or malware campaigns.

    • Age/Score: Age is Low (0—very new domain, often a phishing red flag). The overall threat score is High (25), which means it should be prioritized.

    • Flags Detected: Multiple, including Part of Threat Feed and Part of IOFA™ Feed (Indicators of Fraudulent Activity (IOFA™): Indicators of Attack—these are early compromise signals).

  • WHOIS Info (Center of the screen): This example is blank, with no registrar or creation date shown. This is suspicious for a legit site. This could involve hiding one’s identity or employing evasion tactics.

  • Graphs & Highlights:                    

    • The radar chart (left) shows DNS record types (e.g., A, AAAA). The parking-pcnqnzn.top domain is heavily weighted in A/AAAA (8 each), with lighter allocations elsewhere. This is imbalanced, possibly for quick redirects.

    • Web highlights: Scan date (2025-11-03), the Cloudflare title, which is either generic or masked, the Cloudflare header server commonly used for hiding, no redirects, and no favicon or screenshot are additional evasion signs.

    • Infrastructure Variance: There is high diversity (ASN: 1, IP: 8, NS Changes: 0) spread across networks, which can indicate a botnet-like setup.

  • Bottom Table (Basic Raw Data): Lists the DNS answers (the IP addresses your domain points to).

  • Tip: Hover over flags like Smishing Triad - Lucid Domains (under Threat Intelligence) to link to phishing/smishing kits. Your search is live, so it updates in real-time.

Three tabs to start with

Now that you've got the overview, zoom in on potential risks. Silent Push excels at identifying forward indicators (early signs of attacks), so focus on threats first, then on infrastructure. From your screen:

  1. Select Threat Feeds

    This is the red alert search. It cross-references your domain against global threat databases. The example above addresses Smishing Triad (SMS phishing campaigns) and IOFA™, tied to vendor Silent Push. This will inform you quickly if it's malicious (it is).

    • Click Threat Feeds. Look for indicators of compromise (IOCs), such as suspicious IP addresses, and tags (e.g., smishing-triad, phishing-kit). Export for reporting.

      • Matches here confirm high risk. Drill into timestamps/context for evidence.

  2. WHOIS (Bottom Row) or WHOIS Data (Left Menu)

    Ownership gaps can signal hijacks. This expands the blank snippet in Total View—Hunt for registrant details or updates. The example lacks basics, so compare it to the expected (if any).

    • No data = major red flag (this can signal evasion). Watch for foreign/anonymous proxies.

  3. PADNS (Bottom Row) or DNS Data (Left Menu)

    DNS  changes the signal compromise (e.g., poisoned records for phishing).

    • Click DNS Data (left) for a full breakdown, or PADNS (bottom, which displays 20 records) for historical views.

      • Look for unstable IPs (the example is spread across 8). Check for the Dangling DNS tab nearby. If the ASN Diversity is low but the IP is high, it is a potential kit hosting opportunity.

Ongoing Protection

  • Set Up a Monitor (Left Menu: Monitors): Click to track changes (e.g., new IPs). You will receive alerts via email.

  • Export Data (Left Menu: Data Export): Download CSV/PDF of flags/tags to share with your security teams.

  • Use Query History (left) to revisit, or the Advanced Query Builder for custom queries (e.g., similar domains to parking-pcnqnzn.top).

Common Pitfalls

  • Don't ignore high scores; report them (e.g., to abuse@cloudflare.com).

  • New/low-age domains like this are prime phishing bait; legit ones build history.

  • This isn't a firewall; it's intel. Pair with basics like domain locks and multi-factor authentication.