List of Quad9 Integrations
This is a list of platforms and tools that integrate with Quad9. This list is updated as of April 2025.
-
1
Criminal IP functions as a cyber threat intelligence search engine designed to identify real-time vulnerabilities in both personal and corporate digital assets, enabling users to engage in proactive measures. The concept behind this platform is that by acquiring insights into potentially harmful IP addresses beforehand, individuals and organizations can significantly enhance their cybersecurity posture. With a vast database exceeding 4.2 billion IP addresses, Criminal IP offers crucial information related to malicious entities, including harmful IP addresses, phishing sites, malicious links, certificates, industrial control systems, IoT devices, servers, and CCTVs. Through its four primary features—Asset Search, Domain Search, Exploit Search, and Image Search—users can effectively assess risk scores and vulnerabilities linked to specific IP addresses and domains, analyze weaknesses for various services, and identify assets vulnerable to cyber threats in visual formats. By utilizing these tools, organizations can better understand their exposure to cyber risks and take necessary actions to safeguard their information.
-
2
Technitium DNS Server
Technitium
Reclaim your online privacy with powerful DNS control!Take control of your online experience by eliminating advertisements and malware on a network-wide level through DNS blocking! Self-hosting your own DNS server can significantly improve your privacy and security. The Technitium DNS Server is a remarkable open-source option that acts as both an authoritative and recursive DNS server, making it ideal for individuals interested in managing their own DNS services. It is designed for ease of use, requiring minimal configuration, and features an intuitive web console that is accessible via any modern web browser. Many users tend to overlook the complexities involved in domain name resolution, as it operates in the background and is often too intricate to fully grasp. Generally, software applications depend on the operating system's DNS resolver, which communicates with the DNS server designated by the Internet Service Provider (ISP) through the UDP protocol. While this approach may be adequate for the typical user, it allows ISPs to track and influence your online activities, even on websites protected by HTTPS. Additionally, some ISPs possess the ability to redirect, block, or inject unwanted content into the pages you visit, even if you are utilizing alternative DNS options like Google DNS or Cloudflare DNS. By deploying a self-hosted DNS server, you reclaim authority over your internet experience and can foster a more private and secure browsing environment. In this way, you not only enhance your security but also personalize the browsing experience to fit your specific needs.
- Previous
- You're on page 1
- Next