
How Internal Scanning works: Q&A with Detectify’s product expert
Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …

Customers often tell us of instances where someone in their team spins up a new machine that isn’t using an approved geolocation, or that they see an unexpected spike in hosting from a particular country. These anomalies can put an organization at risk, especially since they are difficult to spot in an automated way.
It’s not uncommon that we hear from customers that someone spins up a new machine that isn’t using an approved geolocation or even a sudden spike in hosting from an approved country. These sorts of anomalies can put an organization at risk, especially since they are difficult to spot in an automated way. Therefore, having an easy way to keep track of them is critical.
With Detectify’s new IP view, customers can now see a complete list of all IPs they are pointing to across their entire attack surface. For each IP, we show what 1) hosting provider is used, 2) which country they are located, and 3) the ASN they have.
In addition to the above, we will also show both IPv4 and IPv6 addresses. In fact, we’ve learned that 73% of our customers are using Ipv6 addresses which reflects how quickly our customers’ digital footprint is expanding.
In order to help security teams spot anomalies quickly and communicate the state of their attack surface efficiently, we will include charts on the IP page that visualize key details about the state of your attack surface.
Here is a list of all new modules recently added from our community of ethical hackers. You can find a complete list of new vulnerabilities added to Surface Monitoring and Application Scanning by viewing the “What’s New?” section in-tool.

Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …

Maintaining a secure external attack surface is no longer just about finding vulnerabilities; it’s about proving your resilience to partners, auditors, and regulatory bodies. Today, …