🛡️ Cyber Status Monitor — Is It Down?

Live status check of 206 cybersecurity platforms, training sites, threat-intel services, and security news sources. One click checks them all from your browser. Distinguish "we broke" from "vendor down" in 30 seconds.

206
Tools
0
Online
0
Issues
206
Pending
Ready to scan
✅ All Systems Operational

206 tools checked — the cybersecurity ecosystem is healthy.

HackTheBox
Platforms
TryHackMe
Platforms
HTB Academy
Platforms
PortSwigger Academy
Platforms
PentesterLab
Platforms
OverTheWire
Platforms
VulnHub
Platforms
Root-Me
Platforms
CTFtime
Platforms
picoCTF
Platforms
CyberDefenders
Platforms
LetsDefend
Platforms
Immersive Labs
Platforms
RangeForce
Platforms
Shodan
Recon
Censys
Recon
ZoomEye
Recon
FOFA
Recon
SecurityTrails
Recon
VirusTotal
Recon
urlscan.io
Recon
Hunter.io
Recon
Have I Been Pwned
Recon
Spyse
Recon
BinaryEdge
Recon
GreyNoise
Recon
ONYPHE
Recon
FullHunt
Recon
Intelligence X
Recon
DNSdumpster
Recon
crt.sh
Recon
Wayback Machine
Recon
HackerOne
Bug Bounty
Bugcrowd
Bug Bounty
Intigriti
Bug Bounty
YesWeHack
Bug Bounty
Synack
Bug Bounty
Open Bug Bounty
Bug Bounty
Burp Suite
Security Tools
Metasploit
Security Tools
Nmap.org
Security Tools
Kali Linux
Security Tools
Parrot OS
Security Tools
Wireshark
Security Tools
Snort
Security Tools
Suricata
Security Tools
OWASP ZAP
Security Tools
Nuclei
Security Tools
Ghidra
Security Tools
IDA Pro
Security Tools
Radare2
Security Tools
Hashcat
Security Tools
John the Ripper
Security Tools
Aircrack-ng
Security Tools
Responder
Security Tools
BloodHound
Security Tools
Cobalt Strike
Security Tools
Sliver C2
Security Tools
NVD
Vuln Databases
Exploit-DB
Vuln Databases
CVE (MITRE)
Vuln Databases
VulDB
Vuln Databases
Snyk Vulnerability DB
Vuln Databases
GitHub Advisory Database
Vuln Databases
PacketStorm
Vuln Databases
MITRE ATT&CK
Threat Intel
AlienVault OTX
Threat Intel
abuse.ch
Threat Intel
ThreatCrowd
Threat Intel
Pulsedive
Threat Intel
ThreatFox
Threat Intel
MalwareBazaar
Threat Intel
Cloudflare
Services
CrowdStrike
Services
Palo Alto Networks
Services
Fortinet
Services
SentinelOne
Services
Elastic Security
Services
Splunk
Services
Qualys
Services
Rapid7
Services
Tenable
Services
GitHub
Dev Security
GitLab
Dev Security
Snyk
Dev Security
SonarQube
Dev Security
Dependabot
Dev Security
Semgrep
Dev Security
AWS
Cloud
Microsoft Azure
Cloud
Google Cloud
Cloud
DigitalOcean
Cloud
Linode (Akamai)
Cloud
Vultr
Cloud
NordVPN
VPN & Privacy
ExpressVPN
VPN & Privacy
ProtonVPN
VPN & Privacy
Mullvad VPN
VPN & Privacy
ProtonMail
VPN & Privacy
Tor Project
VPN & Privacy
Tails OS
VPN & Privacy
Offensive Security
Certifications
EC-Council
Certifications
CompTIA
Certifications
ISC2
Certifications
SANS Institute
Certifications
TCM Security
Certifications
eLearnSecurity (INE)
Certifications
Discord
Collaboration
Slack
Collaboration
Telegram
Collaboration
Signal
Collaboration
Matrix (Element)
Collaboration
Keybase
Collaboration
Cloudflare DNS (1.1.1.1)
DNS & Domain
Google DNS (8.8.8.8)
DNS & Domain
Quad9 DNS
DNS & Domain
OpenDNS
DNS & Domain
Let's Encrypt
DNS & Domain
The Hacker News
News
BleepingComputer
News
Krebs on Security
News
Dark Reading
News
Threatpost
News
SecurityWeek
News
Infosecurity Magazine
News
Maltego
OSINT
SpiderFoot
OSINT
Recon-ng
OSINT
OSINT Framework
OSINT
Social Searcher
OSINT
Namechk
OSINT
WhatsMyName
OSINT
ANY.RUN
Malware Analysis
Hybrid Analysis
Malware Analysis
Joe Sandbox
Malware Analysis
Cuckoo Sandbox
Malware Analysis
REMnux
Malware Analysis
Docker Hub
Containers
Trivy
Containers
Grype
Containers
Bitwarden
Password Managers
1Password
Password Managers
LastPass
Password Managers
KeePass
Password Managers
Dashlane
Password Managers
Autopsy
Forensics
Volatility Foundation
Forensics
YARA Rules
Forensics
Velociraptor
Forensics
TheHive
Forensics
ProjectDiscovery
Security Tools
Caido
Security Tools
Interactsh
Security Tools
CyberChef
Security Tools
DNSRecon
Security Tools
ffuf
Security Tools
Gobuster
Security Tools
WPScan
Security Tools
SQLMap
Security Tools
Nikto
Security Tools
Amass
Security Tools
Subfinder
Security Tools
Masscan
Security Tools
RustScan
Security Tools
httpx
Security Tools
Katana
Security Tools
Feroxbuster
Security Tools
Dirsearch
Security Tools
WhatWeb
Security Tools
Wappalyzer
Security Tools
Nuclei Templates
Security Tools
Wazuh
Services
Zabbix
Services
Grafana
Services
Prometheus
Services
Datadog
Services
Brave Browser
VPN & Privacy
DuckDuckGo
VPN & Privacy
Startpage
VPN & Privacy
Cybrary
Platforms
Hacksplaining
Platforms
OWASP
Security Tools
SecurityElites
Platforms
Chaos
Recon
DNSTwist
Recon
BuiltWith
Recon
Netcraft
Recon
IPinfo
Recon
Kubernetes
Containers
Harbor
Containers
Aqua Security
Containers
SSL Labs
DNS & Domain
Certbot
DNS & Domain
OTX Indicators
Threat Intel
AbuseIPDB
Threat Intel
URLhaus
Threat Intel
Feodo Tracker
Threat Intel
SSLBL
Threat Intel
FLARE VM
Forensics
SANS SIFT
Forensics
Heroku
Cloud
Vercel
Cloud
Netlify
Cloud
Authy
Password Managers
YubiKey
Password Managers

How the status checks work

The check runs entirely in your browser — there is no server-side scanning happening on our end. For each of the 206 tools in the registry, the page does two things in sequence: first, it tries to load /favicon.ico via an HTML <img> request (which works around CORS because images are allowed cross-origin without explicit headers); if that fails, it falls back to a fetch() with mode:'no-cors'. If either succeeds within the 5-second per-tool timeout, the tool is marked online; if both fail, it shows as having issues.

Concurrency and timing. Six checks run in parallel to keep the scan fast without hammering any single network. A 90-second master timeout caps the entire scan even if some tools never respond. Typical scan duration for the full 206-tool grid is 30-60 seconds depending on your network conditions.

The tool registry. The 206+ tools cover the categories a working security person actually uses: pentest distributions and tools (Kali, Parrot, BlackArch, Metasploit, Burp Suite), bug bounty platforms (HackerOne, Bugcrowd, Intigriti, YesWeHack), CTF platforms (Hack The Box, TryHackMe, picoCTF, Root-Me), training (PortSwigger Academy, OffSec, SANS), threat intelligence and OSINT (VirusTotal, AbuseIPDB, Shodan, Censys), security news and reference (Krebs, BleepingComputer, MITRE, NVD, OWASP), and dozens more. Use the search box and category dropdown above to narrow down to specific platforms.

What "down" means here. A tool marked as having issues means your browser could not reach it within 5 seconds via either the favicon or fetch path. That could mean: the service is genuinely down, or it is up but slow, or your network is having issues, or your IP is being rate-limited, or the service does not serve a favicon and rejects no-cors fetches. Status checks measure connectivity from your specific browser at this specific moment — not absolute global uptime.

Sharing results. After a scan completes, share buttons appear with prefilled summaries for X (formerly Twitter), Facebook, LinkedIn, and clipboard. The shared link includes ?up=X and ?down=Y parameters that generate dynamic Open Graph card previews — useful for posting incident summaries or when a major platform goes down.

Five real-world use cases

CTF / training: verify the platform is up before starting

You've blocked off three hours for a Hack The Box session or a TryHackMe room. Before you commit, run the status check — if HTB or THM is having issues, you'll know in 30 seconds rather than discovering it 20 minutes into setup. Saves the time-sink of debugging "why isn't this working" when the answer is "the platform is having an outage right now".

Bug bounty: distinguish target outage from your test breaking it

You're testing a target during a bounty engagement and something stops responding. Before reporting "I broke it" or escalating to the security team, check whether the target's auth provider, CDN, or upstream services are down. If Cloudflare is having issues at the time you triggered the failure, the cause is probably not your test — it is the upstream outage. Quick check, much better triage signal.

Incident response: distinguish "we broke" from "vendor down"

Your application breaks. Before paging the on-call engineer, run the status check against the third-party services in your stack — auth provider, payment processor, email gateway, monitoring vendor, observability stack. A vendor outage means coordinate with their support, communicate to your users, and wait it out. An internal break means real incident response. Confusing the two costs hours.

Tool selection / vendor evaluation

You're considering a new platform for your team — a CTF platform for staff training, a threat-intel feed, a bug-bounty platform partner. Add it to your bookmarks and run the status check periodically over a week or two. A platform that intermittently fails the check is signalling something about its operational maturity that the marketing site won't.

Vendor SLA verification

Your vendor claims 99.9% uptime. Cross-reference with independent observation: every time you notice the service is down, the vendor's status page probably shows different numbers than reality. Independent monitoring data over time is the evidence base for SLA-credit conversations and vendor-renewal decisions.

Common mistakes & edge cases

Trusting "all green" official status as ground truth

Vendor-controlled status pages are marketing artefacts as much as operational dashboards. Many incidents get understated, marked late, or omitted entirely. Independent external observation often shows different reality than the vendor's own dashboard. Use both signals; trust the one that matches what you're actually experiencing.

Treating connectivity as security or functionality

This tool measures whether your browser can reach a service, not whether the service is healthy, functional, or secure. A site that responds with "favicon loaded" might still have its admin panel broken, its API returning errors, or its database read-only. Use this as a fast first check, not as comprehensive monitoring.

Status-checking from a single network only

Your IP, your DNS resolver, your ISP routing — all of these affect whether a check succeeds. A service that shows "down" from your office might be perfectly reachable from a coffee shop or a different country. For global uptime confidence, use multi-region tools (UpDownRadar, IsItDownRightNow, DownDetector) that check from datacentres worldwide.

Ignoring partial outages

A service can be up but with a degraded subset: only the EU region affected, only the API broken while the web UI works, only paying customers can authenticate. The binary up/down signal here doesn't catch any of that. For platforms you depend on heavily, follow their official Twitter/X account and their incident-disclosure feed alongside the binary check.

Confusing DNS or CDN issues with origin outages

If a service shows down here but you can reach it via a different DNS resolver (or via Cloudflare's 1.1.1.1 instead of your ISP's resolver), the problem is DNS or CDN-routing, not the origin service. The DNS Lookup tool can help isolate which layer is failing — useful when you need to know whether to wait for the vendor to fix it or for your network team to fix DNS.

Assuming a "down" check needs immediate action

Many transient failures resolve within minutes. Before triggering incident response or sending the all-hands "service X is down" email, re-check from a different network or wait 5 minutes and re-scan. Real outages persist; transient blips don't.

Frequently Asked Questions

The check runs entirely in your browser. For each tool, the page first tries to load the favicon via an Image() request — that works around CORS restrictions because images can be loaded cross-origin. If the favicon fails, the page falls back to a fetch() request with mode:no-cors. If either succeeds, the tool is marked online. If both fail within the 5-second timeout, the tool is marked as having issues. Six checks run concurrently to keep the scan fast.
It means your browser could not reach the tool within 5 seconds. That could be: the service is genuinely down, the service is up but slow, your network is having issues, your country/region is blocking the service, the service has DDoS protection that is rejecting your IP, or the service does not serve a favicon and rejects no-cors fetches. Status checks measure connectivity from your specific browser and IP at this specific moment — not absolute global uptime.
Most common reasons: (1) regional/CDN issue affecting your network specifically, (2) the service blocks no-cors requests from browsers, (3) DDoS protection has temporarily flagged your IP, (4) DNS issue on your network (resolver problem, not the service), (5) corporate firewall or VPN routing the connection through a path that fails, (6) the service is up but extremely slow and exceeded the 5-second timeout. If a tool shows down here but you can reach it directly, the issue is on your network or the service is doing something that defeats automated probing.
Not directly — the tool list is hand-curated with 206+ popular cybersecurity platforms. For monitoring your own infrastructure, use a dedicated uptime monitor (UptimeRobot, BetterUptime, Pingdom, StatusCake) that checks from multiple regions, supports custom intervals, and sends alerts on failure. Browser-based checks like this one are useful for ad-hoc verification, not continuous monitoring.
For the question "can my browser reach this service right now from my network", very accurate. For the question "is the service up globally for everyone", much less accurate — you only have one vantage point (your IP, your DNS resolver, your ISP routing). For global uptime, use multi-region monitoring services that check from datacentres around the world. This tool answers the practical question well; it does not answer the absolute uptime question.
CORS (Cross-Origin Resource Sharing) restricts what JavaScript in the browser can do with cross-origin responses. The favicon-image trick bypasses CORS because images are allowed to load cross-origin without CORS headers. The fetch() fallback uses mode:no-cors which lets the request go through but blocks reading the response — we just need to know the connection succeeded, not what came back. Together these techniques make the check work for any service regardless of its CORS policy.
The list covers the most-used cybersecurity platforms: pentest distributions and tools (Kali, Parrot, BlackArch, Metasploit), bug bounty platforms (HackerOne, Bugcrowd, Intigriti, YesWeHack), CTF platforms (Hack The Box, TryHackMe, picoCTF, Root-Me), training platforms (PortSwigger Academy, OffSec, SANS), threat intelligence and OSINT (VirusTotal, AbuseIPDB, Shodan, Censys), security news and reference (Krebs, BleepingComputer, MITRE, NVD, OWASP), and dozens more across the broader security ecosystem. The list is curated to cover the platforms a working security person would actually use.
The list is maintained continuously to reflect currently-active platforms. Defunct tools get removed; major new platforms get added. If you spot a missing platform you would expect to see, the feedback loop runs through SecurityElites support.
Not from this tool directly — it runs on-demand only. For continuous monitoring with alerts, use a dedicated uptime service. Some specifically monitor security platforms (DownDetector, IsItDownRightNow, UpDownRadar) and may send notifications for major outages of well-known services.
No — the checks happen entirely in your browser, so there is no server-side API to call. If you need programmatic uptime data, the right pattern is running your own monitoring (UptimeRobot has a free tier with REST API, BetterUptime has webhooks) and integrating that into your tooling. For one-off verification of "is service X up right now", this hub is the fastest path.