Bitsight's Groma scanning engine maintains a continuous global survey of the public-facing Internet. Here you’ll find daily updates to an aggregated view of the Internet’s vendors, products, and vulnerabilities observed over the prior 30 days. These software observations are identified by an address, port, and domain name.
Software Product List
Browse Software by Product
13699 Products Found
| Product | Vendor | Observations Sort ascending |
|---|---|---|
| Bizhub C450i Firmware | Konicaminolta | 2 |
| Color Laserjet Pro M252dw | HP | 2 |
| Color Laserjet Pro M252dw Firmware | HP | 2 |
| Color Laserjet Pro M252n | HP | 2 |
| Color Laserjet Pro M252n Firmware | HP | 2 |
| Laserjet Pro M148dw | HP | 2 |
| Laserjet Pro M148dw Firmware | HP | 2 |
| Bizhub C301i | Konicaminolta | 2 |
| Bizhub C301i Firmware | Konicaminolta | 2 |
| C925 | Lexmark | 2 |
| C925 Firmware | Lexmark | 2 |
| Qn85ls03dafxza | Samsung | 2 |
| Bizhub C3351i | Konicaminolta | 2 |
| Bizhub C3351i Firmware | Konicaminolta | 2 |
| Un55u8000ffxzx | Samsung | 2 |
| E1550 | Linksys Dd Wrt | 2 |
| E1550 Firmware | Linksys Dd Wrt | 2 |
| Ea6200 | Linksys Dd Wrt | 2 |
| Ea6200 Firmware | Linksys Dd Wrt | 2 |
| Ea6300 | Linksys Dd Wrt | 2 |
- Data breach of hris.qualita-indonesia.net database in SQL format
- United Kingdom payroll data breach involving 1,563 records
- Sale of access to USA Forti VPN with revenue details
- Underground forum post offers access to a French business service network
- TheSweetNight claims successful attack on Automatic Systems Co. SCADA system under #OpsShadowStrike
Your attack surface is expanding—know exactly how it looks
Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.