Monitor SSL certificates for brand-impersonating domains with crt.sh, Urlscan.io and Slack
AI & ML Communication

Monitor SSL certificates for brand-impersonating domains with crt.sh, Urlscan.io and Slack

Phishing Lookout (Typosquatting) and Brand Domain MonitorThis workflow monitors SSL certificate logs to find and scan new domains that might be...

Get This Workflow

About This Workflow

Monitor SSL certificates for brand-impersonating domains with crt.sh, Urlscan.io and Slack

What This Workflow Does

This workflow automates the monitoring of SSL certificates for potential brand-impersonating domains using crt.sh and Urlscan.io. By integrating with Slack, it sends notifications when new suspicious domains are detected. This helps organizations stay vigilant against phishing attacks and typosquatting attempts.

Who Should Use This

This workflow is designed for Security Operations (SecOps) teams, security analysts, and IT professionals responsible for protecting their organization's online reputation and preventing phishing attacks.

Key Features

  • Scans SSL certificate logs from crt.sh for new brand-impersonating domains
  • Integrates with Urlscan.io to further analyze suspicious domains
  • Sends notifications to Slack when new domains are detected
  • Provides an early warning system for potential phishing attacks and typosquatting attempts

How to Get Started

To use this workflow, import it into your n8n instance and customize the crt.sh API key, Urlscan.io API key, and Slack channel settings to fit your organization's needs.

Use This Workflow in n8n →

Affiliate Disclosure: We may earn a commission if you sign up for n8n through our links. This doesn't affect our recommendations.

Get This Workflow →