Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
12573 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Sg300 10pp | Cisco | 73 |
| Sg300 10pp Firmware | Cisco | 73 |
| Un43ru7100fxkr | Samsung | 73 |
| Un49nu7150 | Samsung | 73 |
| Dhi Hcvr7104h 4k Firmware | Dahua Technology | 72 |
| Dhi Xvr8816s Firmware | Dahua Technology | 72 |
| Dir 882 | D-Link | 72 |
| Dir 882 Firmware | D-Link | 72 |
| Ex7000 | NETGEAR | 72 |
| Ku85ua7000fxkr | Samsung | 72 |
| Lh43bechlgfxkr | Samsung | 72 |
| Lh50bechlgfxkr | Samsung | 72 |
| Nvr5232 4ks2 Firmware | Dahua Technology | 72 |
| Srx110h2 Va | Juniper Networks | 72 |
| Un32m4500 | Samsung | 72 |
| Un50mu6350 | Samsung | 72 |
| Un55k6200 | Samsung | 72 |
| Un55ru7100fxkr | Samsung | 72 |
| Xs Xvr6116 Vs2 Firmware | Dahua Technology | 72 |
| Yiqicms | Yiqicms Project | 72 |
- Offering pentesting services on an underground forum
- Access to Magento2 admin panel in New Zealand offered for sale
- macOS Stealer source code for sale, a stealer targeting macOS with full data collection capabilities
- Air Côte d'Ivoire attacked by INC Ransom ransomware group
- Graneles de Chile attacked by Qilin ransomware group
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.