Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
12573 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Un50ju6400 | Samsung | 66 |
| Vision1210 | Unitronics | 66 |
| Vision1210 Firmware | Unitronics | 66 |
| Xs 6116 Vs2 Firmware | Dahua Technology | 66 |
| Proton | Optergy | 66 |
| Kq75qb67afxkr | Samsung | 65 |
| Un55j6200 | Samsung | 65 |
| Un55ru7190fxkr | Samsung | 65 |
| Windows Server 2022 | Microsoft | 65 |
| Dcs 5025l | D-Link | 65 |
| Dcs 5025l Firmware | D-Link | 65 |
| Amdvtenl16 H5 Firmware | Dahua Technology | 64 |
| Cn6132 Firmware | Dahua Technology | 64 |
| Dh Ipc Hfw1230sp 0280b Firmware | Dahua Technology | 64 |
| Dhi Xvr5208an 4kl 8p Firmware | Dahua Technology | 64 |
| Dnr832 Firmware | Dahua Technology | 64 |
| Dva1622 | Synology | 64 |
| Dva1622 Firmware | Synology | 64 |
| Ip4m 1026w Firmware | Dahua Technology | 64 |
| Kq65sc9safxkr | Samsung | 64 |
- RTC attacked by Medusa ransomware group
- Colonial Van Lines attacked by Medusa ransomware group
- Offering pentesting services on an underground forum
- Access to Magento2 admin panel in New Zealand offered for sale
- macOS Stealer source code for sale, a stealer targeting macOS with full data collection capabilities
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.