Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
12573 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Ip8m 2496e Firmware | Dahua Technology | 68 |
| Ipc Hdbw1230e Firmware | Dahua Technology | 68 |
| Ipc Hfw1220s Firmware | Dahua Technology | 68 |
| Kq65qna85afxkr | Samsung | 68 |
| Ku55ua7000fxkr | Samsung | 68 |
| Lhv5116 Firmware | Dahua Technology | 68 |
| Sg300 20 | Cisco | 68 |
| Sg300 20 Firmware | Cisco | 68 |
| Srx210he2 | Juniper Networks | 68 |
| Telerik Report Server | Progress Software | 68 |
| Vto2101e Firmware | Dahua Technology | 68 |
| Xvr1b16h Firmware | Dahua Technology | 68 |
| Zywall 1100 | Zyxel | 68 |
| Zywall 1100 Firmware | Zyxel | 68 |
| Nport 5210a | Moxa | 68 |
| Nport 5210a Series Firmware | Moxa | 68 |
| Dir 859 | D-Link | 67 |
| Dir 859 Firmware | D-Link | 67 |
| Ku65ua7000fxkr | Samsung | 67 |
| Rs3618xs | Synology | 67 |
- RTC attacked by Medusa ransomware group
- Colonial Van Lines attacked by Medusa ransomware group
- Offering pentesting services on an underground forum
- Access to Magento2 admin panel in New Zealand offered for sale
- macOS Stealer source code for sale, a stealer targeting macOS with full data collection capabilities
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.