Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
12375 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Netatalk | Netatalk Project | 47,896 |
| Xenforo | Xenforo | 47,679 |
| Image Optimizer | Ewww | 47,012 |
| Domino | Hcltech | 47,001 |
| Jenkins | Jenkins | 46,950 |
| Minio | MinIO | 46,075 |
| Icecast | Xiph.Org Foundation | 46,039 |
| Horizon | VMware | 45,289 |
| Gutenberg Template Library \& Redux Framework | Redux | 45,092 |
| N8n | N8n | 43,259 |
| Asterisk | Digium | 42,747 |
| Icewarp Server | IceWarp | 42,359 |
| Manageengine Adselfservice Plus | Zoho Corp | 42,178 |
| Pulse Connect Secure | Pulse Secure | 41,284 |
| Note Station | Synology | 40,395 |
| Django | Djangoproject | 39,607 |
| Symfony | Sensiolabs | 38,637 |
| Gitea | Gitea | 38,390 |
| Wildfly | Red Hat | 38,292 |
| Pimcore | Pimcore | 37,934 |
- Consolidated Sterilizer Systems Attacked By Akira Ransomware Group
- Suspect Danish Zulfiqar linked to major crypto thefts may be arrested
- UK government plans to expand police use of facial recognition technology
- Launch of a new anonymous phone service
- React2Shell vulnerability exploited by China-linked threat actors
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.