Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
12675 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Backup Exec Agent | Veritas | 1,831 |
| Dhi Xvr5108hs Firmware | Dahua Technology | 1,828 |
| Dcs 2530l | D-Link | 1,825 |
| Dcs 2530l Firmware | D-Link | 1,825 |
| Xvr4104hs S2 Firmware | Dahua Technology | 1,818 |
| Prosafe Firmware | NETGEAR | 1,802 |
| Airdroid | Airdroid | 1,798 |
| E107 | E107 | 1,762 |
| Gitblit | Gitblit | 1,747 |
| Papercut Mf | PaperCut | 1,745 |
| N Central | N Able | 1,711 |
| Octoprint | Octoprint | 1,694 |
| Ds115j Firmware | Synology | 1,691 |
| Ds115j | Synology | 1,688 |
| Dcs 930l | D-Link | 1,685 |
| Dcs 2670l | D-Link | 1,685 |
| Dcs 2670l Firmware | D-Link | 1,685 |
| Silverstripe | Silverstripe | 1,683 |
| Dir 818l | D-Link | 1,672 |
| Dir 818l Firmware | D-Link | 1,672 |
- Chemaballester.Com Attacked By Qilin Ransomware Group
- Watermarkbeachresort.Com Attacked By Qilin Ransomware Group
- Hackers hijack state government websites to push AI porn ads
- Cybercriminals use fake Microsoft Teams and Google Meet downloads to spread Oyster backdoor
- Google updates AI Try-On feature for virtual clothing fitting
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.