REVENUE LEAK DETECTED // LIVE

There's a revenue leak in your vendor stack.

Blackout shows you where it is, what it costs, and how to stop it.

0 sites scanned
0 vendors profiled
0K evidence rows
Scroll
01 // WHERE IT IS

Your vendors are taking more than you authorized.

Blackout scans your site and shows you exactly which vendors are collecting data, what data they're taking, and where they send it. Most companies find 15–30 data flows they didn't know existed.

BLACKOUT://VENDOR_FLOWS/EXAMPLE_CORPLIVE
VendorTakesGoes ToAuth?
6senseVisitor identity, page context, IPShared intent graph (340 companies)Not in DPA
HubSpotForm submissions, email engagementInternal CRM (expected)Authorized
CHEQBrowser fingerprint, device ID, sessionObfuscated endpointUndisclosed
BomboraContent consumption, account signalsCompetitor-accessible intent poolNot in DPA
HeapSession replay, click data, form inputContentSquare (parent company)Undisclosed parent
3 unauthorized / 1 undisclosed / 1 authorized// EXAMPLE

Example data drawn from Blackout's observation corpus. Your scan will show your stack.

02 // WHAT IT COSTS

This isn't a compliance problem. It's a revenue problem.

Your vendors aren't just collecting data. They're creating four measurable drains on your revenue. Nobody is quantifying them. Until now.
▸ Cost per lead
What you paid$500
What they paid$5
Leakage per lead$495
Competitive leakage

Your competitors are buying your data back.

Your intent data vendor pools your pipeline signals into a shared graph. Your competitors query that same graph. You paid to acquire the traffic. They pay pennies to intercept the lead. Blackout shows you which vendors share data and estimates the annual cost of competitive signal leakage.

▸ Conversion credit claimed
6sense
100%
Clearbit
100%
HubSpot
100%
Drift
100%
Apollo
100%
Total claimed500%
Actual conversions1 deal
Attribution distortion

Your attribution is lying to you.

Multiple vendors claim credit for the same conversion. Duplicate tracking scripts fire on every page. Your CAC metrics are inflated. Your budget decisions are based on numbers that can't be trusted. Blackout identifies overlapping vendors and estimates the attribution distortion.

DPA states
Runtime observed
EU data residency only
Egress to US + APAC
No browser fingerprinting
Canvas + WebGL fingerprint
Post-consent collection
Fires before consent banner
Anonymized identifiers
Email hashed in URL params
Divergence4 of 4 clauses
Contract vs runtime

Your contracts say one thing. Your vendors do another.

The gap between what vendors promise in their data processing agreement and what their code actually does at runtime is where regulatory questions get asked. Blackout documents the delta: timestamped, hashed, reproducible. Then identifies which regulatory clauses each behavior is addressed under.

▸ Dependency chain
your-site.com
└─6sense.jsdisclosed
└─cdn.6sense.com1st-party CNAME
└─trk.bombora.compartner
└─unknown-tracker.ioundisclosed
Depth5 levels / 1 undisclosed
Supply chain exposure

Your marketing stack is an unlocked door.

Every vendor script is a dependency you didn't audit. One compromised vendor compromises your entire site. Blackout maps the browser-loaded supply chain: who loaded whom, what's disclosed, what's undisclosed in the runtime. It identifies the attack surface your security team doesn't know exists.

03 // HOW TO STOP IT

Find it. Measure it.
Stop it.

BLACKOUT://SCAN58s
$ blackout scan example.com
▸ probing 600 vendor signatures
▸ capturing network requests
▸ mapping data flows
✓ 47 vendors found12 not in DPA
STEP 01

SCAN

Enter your domain. Blackout maps every vendor running in the browser on your site, what they transmit, and what it costs. 60 seconds. No agents. No code changes.

BLACKOUT://MONITORLIVE
14:32:186sense.js
$487
14:33:01unknown.io
$1,240
14:34:22bombora
$89
14:35:11rb2b.io
$1,847
Today$3,663
STEP 02

MONITOR

See what's leaving your environment in real time. Dollar values on every finding. Weekly digest delivered to your inbox. No changes to your stack required.

BLACKOUT://ENFORCEENFORCING
6senseBlocked
RB2BBlocked
CHEQBlocked
HubSpotAllowed
BomboraBlocked
Active4 blocked / 1 allowed
STEP 03

ENFORCE

When you're ready, flip the switch. One click per vendor. Reversible anytime. Evidence routes to your CISO. Dollar reports route to your CFO.

The vendor keeps working.
The extraction stops.

0
Vendors Profiled
0K
Evidence Rows
0
Sites Scanned
0
Detection Patterns

See what's on your site.

Primary

Scan Your Site

Enter your domain. 60 seconds. Free. See every browser-loaded vendor, what they transmit, and what it costs.

Start the scan

Methodology

How We Score Risk

Read the methodology behind the Revenue Risk Score. Four tracks. Conservative math. The numbers explained line by line.

Read the methodology