Detect the technology stack of a target, in one call.

Pass a URL. Get back the full technology stack detected: web server, language, framework, CDN, analytics, CMS, and the version inferences underneath each finding.

WHAT THIS API RETURNS

Technology fingerprinting, at version granularity.

The Technology Lookup API runs the same fingerprinting pipeline that drives Deepinfo's vulnerability matching. Pass a target URL and the API returns the technology stack detected on the page along with version inferences for each technology where confident.

Detected technologies span web server, programming language and runtime, framework, CMS, CDN, analytics, tag manager, and JavaScript libraries. Each finding carries a confidence signal, the evidence used to infer it (header, body content, fingerprint pattern), and a version inference where the evidence supports one.

Use this when the target URL is in scope and the question is about its technology footprint. Pair with Vulnerability Finder for end-to-end CVE discovery.

REQUEST

One endpoint, one required parameter.

Endpoint:

GET https://api.deepinfo.com/v1/lookup/technology?url={url}

Parameters (placeholder, awaiting confirmation):

Name In Type Required Description
url query string Yes A target URL such as https://www.example.com.

Authentication is by API token in the request header. See docs.deepinfo.com for the full request reference.

SAMPLE RESPONSE

See what the API returns.

Real response structure for the Detect the technology stack of a target, in one call endpoint. Field coverage may vary based on query parameters and data availability.

JSON RESPONSE
{
  "url": "https://www.example.com",
  "check_date": "2026-05-02T08:30:11Z",
  "technologies": [
    {"name": "nginx", "category": "web_server", "version": "1.18.0", "confidence": 0.98, "evidence": "Server header"},
    {"name": "PHP", "category": "language", "version": "8.1.12", "confidence": 0.92, "evidence": "X-Powered-By header"},
    {"name": "WordPress", "category": "cms", "version": "6.1.0", "confidence": 0.96, "evidence": "Generator meta tag"},
    {"name": "Cloudflare", "category": "cdn", "version": null, "confidence": 0.99, "evidence": "Server header"},
    {"name": "Google Analytics", "category": "analytics", "version": "GA4", "confidence": 0.94, "evidence": "Inline script"}
  ]
}
STRUCTURED VIEW
Fields
Url
https://www.example.com
Check date
2026-05-02T08:30:11Z
Technologies
Count
5
First name
nginx
First category
web_server
First version
1.18.0
First confidence
0.98
First evidence
Server header

Sample response shown. Real responses depend on query parameters, data availability, and API version. Talk to us for full schema documentation.

“Stack detection for vulnerability scoping pulls into our exposure scoring directly. Version inference under each detected technology is the depth most fingerprinting libraries don't reach.”

— Principal Engineer, Vulnerability Management Vendor
GET STARTED

Run a sample call, or batch lookup your asset set.

We'll set up token access and answer schema questions on a call.

Talk to us Browse API docs