John LeslieI can tell you Stripe uses Greenhouse for hiring before they have posted a job listing. I can tell...
I can tell you Stripe uses Greenhouse for hiring before they have posted a job listing. I can tell you GitHub runs Zendesk for support and Marketo for marketing automation. All from a single DNS query.
Every domain broadcasts its infrastructure to the world through DNS records, SSL certificates, and HTTP headers. Most people never look. I built DomainIntel — a free API that reads all of it in one call. No API key, no signup.
Try it on your own company right now:
curl "https://domainintel.vercel.app/api/lookup?domain=yourcompany.com"
Here is what it found on two companies everyone knows.
Mail provider: Google Workspace
SPF record reveals their outbound email stack:
spf1.stripe.com — transactional email (their own infrastructure)greenhouse-outbound-mail.stripe.com — Greenhouse (applicant tracking for hiring)_spf.qualtrics.com — Qualtrics (surveys and feedback collection)Three services. That is a deliberately lean setup for a company processing billions in payments.
DMARC policy: p=reject — the strictest setting possible. Any email claiming to be from stripe.com that fails authentication gets rejected outright, never delivered. This is what you want to see from a company handling your payment data.
Mail provider: Microsoft 365
SPF record tells a very different story:
spf.protection.outlook.com — Microsoft 365 (primary email)_netblocks.google.com — Google (likely legacy or marketing)mail.zendesk.com — Zendesk (customer support)_spf.salesforce.com — Salesforce (CRM)servers.mcsv.net — Mailchimp (newsletters)mktomail.com — Marketo (marketing automation)sendgrid.net — SendGrid (transactional email)Seven authorized email senders. Each one is a potential phishing vector — an attacker who compromises any of these services can send email that passes GitHub's SPF checks. This is the tradeoff of a large enterprise stack: more capability, more surface area.
DMARC policy: p=quarantine — suspicious emails get flagged but not rejected. Less strict than Stripe. For a company that is the target of constant phishing campaigns (fake GitHub security alerts are one of the most common phishing templates), this is a notable choice.
WHOIS: MarkMonitor registrar (the enterprise-grade registrar used by most Fortune 500 companies). Domain age: 18+ years, created October 2007.
SSL: Sectigo certificate with 75 days until expiry.
Stripe authorizes 3 email senders with a reject policy. GitHub authorizes 7 with a quarantine policy. This is not random — it reflects fundamentally different security philosophies. Stripe optimizes for minimum attack surface. GitHub optimizes for operational flexibility at the cost of a wider trust perimeter.
If you were evaluating either company as a vendor, this single API call tells you more about their security posture than their marketing page does.
Say you are evaluating a B2B SaaS company as a potential vendor. You run their domain:
curl "https://domainintel.vercel.app/api/lookup?domain=example-vendor.com"
What to look for:
none or missing — red flag, not protecting against email spoofingOne call, 5 data points, a much clearer picture than a LinkedIn search.
REST API (no auth, free):
curl "https://domainintel.vercel.app/api/lookup?domain=stripe.com"
MCP server for Claude, Cursor, or VS Code — add to your config:
{
"mcpServers": {
"domainintel": {
"url": "https://domainintel.vercel.app/api/mcp"
}
}
}
5 tools available: whois_lookup, dns_lookup, ssl_check, tech_stack, full_report
Free. No API key. Try it on any domain.