Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
13652 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Xs Ipdm1h 2l Ez Firmware | Dahua Technology | 2 |
| Xs Ipdm741 2 Firmware | Dahua Technology | 2 |
| Xs Ipdm741 3 Firmware | Dahua Technology | 2 |
| Xs Ipdm843w 4 Firmware | Dahua Technology | 2 |
| Xs Ipdm844v 2 Firmware | Dahua Technology | 2 |
| Xs Ipdm844vzw 4 Firmware | Dahua Technology | 2 |
| Xs Ipdm844zwh 5 Firmware | Dahua Technology | 2 |
| Xs Ipdm985zw 3 Firmware | Dahua Technology | 2 |
| Xs Ipsd4604wh 4 Firmware | Dahua Technology | 2 |
| Xs Nvr2104 4kh W Firmware | Dahua Technology | 2 |
| Xs Nvr3432 4k16p Firmware | Dahua Technology | 2 |
| Xs Nvr6208 4k8p Epoe Firmware | Dahua Technology | 2 |
| Xs Nvr6432 4k16p Epoe Firmware | Dahua Technology | 2 |
| Xs Xvr6432a H Firmware | Dahua Technology | 2 |
| Xvr04x Firmware | Dahua Technology | 2 |
| Xvr2b32h Firmware | Dahua Technology | 2 |
| Xvr404c X1 Firmware | Dahua Technology | 2 |
| Xvr4108he Firmware | Dahua Technology | 2 |
| Xvr5104c S2 Uk Firmware | Dahua Technology | 2 |
| Xvr5104he Firmware | Dahua Technology | 2 |
- Selling a list of vulnerable WordPress WooCommerce sites with SQL database access
- Sale of access to a retail company in Portugal for $6 million
- Underground forum post offers access to a retail network in Portugal for sale
- Egoz Unit attacked by Handala ransomware group
- Umiles Group data breach exposes 147GB of sensitive corporate data
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.