
How Internal Scanning works: Q&A with Detectify’s product expert
Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …
Detectify

Most tools will just tell you that a port is open. We’ve decided that’s not enough.
TLDR: We’ve launched Protocol Discovery, a custom-built engine designed to move beyond simple port scanning by identifying the specific services communicating behind your open ports. Our engine is optimized for the speed of modern cloud environments-scanning assets in under 10 seconds. From detecting multiplexed protocols like SOCKS5 to uncovering high-risk services on non-standard ports, we’re providing the granular visibility needed to secure a complex attack surface.
You might have an exposed Redis database, a Cisco ASA VPN appliance, or even a Minecraft server (yes, we have actually seen this) sitting on your surface. Your tools might see 443/tcp, some tools will send a HTTP probe over TLS and happily announce “https”, but our new engine can dig even deeper to find the SOCKS5 protocol multiplexed along https, identify SSH running on non-standard ports (which we find just as often as port 22), or even negotiate TLS over TLS to find even greater (previously invisible) attack surface. We believe that simply knowing a port is “open” isn’t enough. To truly secure your attack surface, you need to know exactly what is communicating over that port.
Recently, we launched Protocol Discovery, a core enhancement to Surface Monitoring. This isn’t just another port scanner; it is a custom-built, in-house discovery engine designed to give you unprecedented visibility into your exposed services.
A key part of what we do at Detectify is building unique solutions that provide significantly more value to your team than standard tooling. Building on the principles pioneered by open-source classics like Nmap, our new engine is tailored for the specific speed and demands of the modern cloud:
Our new probes cover everything from modern web services to legacy enterprise and industrial systems:
We’ve integrated this data directly into your workflow to make it actionable:
The best way to understand your exposure is to see it. Navigate to Attack Surface > Protocols in your Detectify dashboard to explore the services running across your assets. Book a demo to talk to our experts or start a 2-week free trial to see it in action.

Security doesn’t stop at the perimeter. The “inside” of your network often harbors many overlooked risks. To address this, ealier this year we launched Detectify Internal …

Maintaining a secure external attack surface is no longer just about finding vulnerabilities; it’s about proving your resilience to partners, auditors, and regulatory bodies. Today, …