# urlscan Pro - Use Cases

Users of the urlscan Pro platform typically have very similar requirements and
ways of working with the platform. On this page we explain some common use
cases that we have observed from talking to users and from our own experience
using the platform.

A good starting point is to look at Help Section on Data Sources which talk
about the various data sources available on urlscan Pro and what purposes these
could be used for.

## Use Case: Suspicious website hunting

Our Website Scans database can be used to hunt for new and historical website
scans of interest that might have been submitted by one of our customers or the
community on urlscan.io. What is considered to be of interest depends on
the position of the user, but these are common examples of things users might
look for:

* Use our brand and phishing detection to get a tailored feed of detections for their own brands.
* Use hunting searches for their brand name in the title of websites or within the URL.
* Use hunting searches that are looking for known malicious behavior based on existing historical scans.
* Use Visual Search to find other scans based on the visual appearance of the screenshot.


urlscan.io detects thousands of phishing sites every day, but there are many
more submissions that are either not yet detected by us or that would not be
considered outright phishing yet still are behaviour that should tracked.

## Use Case: Hunting for suspicious domains

Our Hostnames & Domains database is made for hunting for newly observed domains and hostnames matching certain patterns.

Commonly, users will ...

* Use the database to search for newly seen registered domains (apex domains) containing their brand keyword.
* Use Saved Searches to save interesting hunting rules on urlscan Pro.
* Set up a Subscription to receive notifications for new domains and hostnames via email and webhook.
* Use Incidents from urlscan Observe to automatically monitor new domains and hostnames that were observed as part of a subscription.


## Use Case: Lightweight attack surface discovery

Our Hostnames & Domains database can also be used to look at specific known pieces of infrastructure.

You could ...

* Search for all newly observed hostnames under a specific domain.
* Search for all hostnames and domains that resolve to a specific IP address, IP subnet, or ASN.
* Search for all domains that use a specific nameserver (NS) or mailserver (MX) record.


## Use Case: Interactive phishing site investigation

Our Live Scanning feature is a unique tool that you can use to quickly
investigate suspicious URLs using more granular controls about how and from
where the URLs are analyzed.

You could use Live Scanning to ...

* Scan a suspicious URL from multiple geographical locations simultaneously to check whether it behaves differently between these locations.
* Scan suspicious URLs with both VPN-based scanners as well as proper residential IPs to check for potential differences.
* Download files from the Internet through our Live Scanner instead of directly downloading it yourself.
* Scan Onion websites on the TOR network.