Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
12573 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Kq75qb70afxkr | Samsung | 64 |
| Nvr2104hs 4ks2 Firmware | Dahua Technology | 64 |
| Nvr7000k Firmware | Dahua Technology | 64 |
| Un50hu7000 | Samsung | 64 |
| Un60ks8000 | Samsung | 64 |
| Un65du6900fxza | Samsung | 64 |
| Wcdxvr1624 Firmware | Dahua Technology | 64 |
| Xs Xvr6108a Vs2 Firmware | Dahua Technology | 64 |
| Xvr5104hs 4m Firmware | Dahua Technology | 64 |
| Dcs 2210l | D-Link | 64 |
| Dcs 2210l Firmware | D-Link | 64 |
| Magicinfo 7 Server | Samsung | 64 |
| Papercut Ng | PaperCut | 64 |
| Goobi Viewer Core | Intranda | 63 |
| Qe65q70batxxc | Samsung | 63 |
| Qn55q80rafxkr | Samsung | 63 |
| R6700 | NETGEAR | 63 |
| Sf300 08 | Cisco | 63 |
| Sf300 08 Firmware | Cisco | 63 |
| Ue55au8072uxxh | Samsung | 63 |
- RTC attacked by Medusa ransomware group
- Colonial Van Lines attacked by Medusa ransomware group
- Offering pentesting services on an underground forum
- Access to Magento2 admin panel in New Zealand offered for sale
- macOS Stealer source code for sale, a stealer targeting macOS with full data collection capabilities
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.