Skip to main content
This guide walks you through everything you need to do to go from a new account to an active, monitored site. The entire process takes around five minutes. You’ll create an account, add your first website, review the vulnerability scan results, and get familiar with the live threat feed. Routing real traffic through Recon44’s WAF requires one additional DNS step — covered in the DNS setup guide.
1

Create your account

Go to recon44.com and click Start free. Enter your email address and choose a password.No credit card is required to sign up. Your Free plan activates immediately, and you can upgrade at any time from the Plans section of the dashboard.
If your organization uses SSO or requires team access, contact Recon44 support to discuss an Enterprise plan before signing up individually.
2

Add your website

After signing in, the dashboard prompts you to add your first site. Enter the domain you want to protect — for example, example.com. Do not include a protocol prefix (https://) or trailing slash.Click Add site. Recon44 immediately queues a full vulnerability scan against your domain.
Recon44 scans the public-facing surface of your site, exactly as an external attacker would. No access to your server or codebase is required.
3

Review the vulnerability scan

The initial scan typically completes within 60–90 seconds. While it runs, you’ll see a progress indicator on the site’s overview page. Once it finishes, the Security Score panel updates with findings across six categories:
CategoryWhat Recon44 checks
SSL / TLSCertificate validity, expiry date, weak cipher suites
Security headersContent-Security-Policy, X-Frame-Options, HSTS, and others
Exposed files.env, .git, backup archives, and other sensitive paths
Open portsPorts that are externally reachable but shouldn’t be
Injection vectorsForms and parameters susceptible to SQL injection or XSS
Rate limitingWhether your site enforces request throttling on key endpoints
Each finding shows a severity level (Critical, High, Medium, Low) and a plain-English description of the issue and how to fix it.
Start with Critical and High findings. Missing security headers are usually the quickest wins — they require only a server configuration change with no code changes.
4

Explore the live threat feed

Click Threat Feed in the left sidebar. Even before you add a DNS record, Recon44 begins populating this view with passive threat data for your domain.Each row in the feed shows:
  • Threat type — DDoS, SQL Injection, XSS, Brute Force, or Scanner
  • Source IP — the originating address
  • Country — geographic origin flag and country name
  • Action — what Recon44 did: blocked, mitigated, throttled, or logged
  • Timestamp — when the event occurred
On the Free plan, WAF mode is set to read-only (monitor). Recon44 logs threats but does not actively block them until you upgrade to Pro or higher and enable active blocking.
5

Manually block or whitelist an IP (optional)

If you see a suspicious IP in the threat feed, click the IP address to open its detail panel. From there you can:
  • Click Block to add the IP to your blocklist immediately. Future requests from this IP are dropped at the edge.
  • Click Whitelist to ensure Recon44 never blocks requests from this IP — useful for your own office IPs or trusted monitoring services.
Changes take effect within seconds and appear in your IP Management list under Settings → Access Control.
Whitelisting an IP bypasses all WAF inspection for traffic from that address. Only whitelist IPs you fully control or trust.
6

Route live traffic through Recon44 (recommended)

To enable active WAF inspection on every real visitor request, you need to add one CNAME DNS record to point your domain at Recon44’s edge network.This step is required for active blocking, real-time inspection, and DDoS mitigation. It does not affect your hosting or application setup.See the full walkthrough in the DNS setup guide.

What’s next

Add your CNAME record

Route live traffic through Recon44’s inspection layer in 3 steps.

Understand the WAF

Learn how Recon44 matches requests against 200+ OWASP attack patterns.

Set up alerts

Get notified by email, Telegram, or SMS when attacks are detected.

Export audit logs

Download tamper-proof logs for compliance and incident review.