EASM (Attack Surface)
External inventory: domains, subdomains, IPs, ports, services and changes over time.
Proactive Defender discovers exposed assets (IPs, domains, subdomains, ports), fingerprinting (banners/TLS/headers) and correlates CVEs to prioritize real risks. At this phase you don't need an API: after contacting us, we send you an Excel/PDF report with all findings.
Restrict public access + SSO.
Review auth/roles and hardening.
Reduce stack fingerprint.
Product
We send the result as a report (Excel/PDF). Later, it will be integrated via API.
External inventory: domains, subdomains, IPs, ports, services and changes over time.
Banners, TLS/certificates, headers and signals to infer product/version.
Fingerprint matching with CVEs + prioritization by exposure and criticality.
Discovered assets · Services/ports · Evidence (banners/TLS/headers) · Associated CVEs · Severity · Exploitability (when applicable) · Remediation recommendations.
The report is delivered after contact and scope validation. Formats adapt to your team (CTO/SOC/DevOps).
Demo
Paste a domain to update the visual example (it doesn't actually scan).
Representative output of Excel/PDF (simulated).
Service: nginx · Evidence: header/server · Action: update / patch.
Restrict by IP/VPN + SSO, review credentials and logs.
Block /docs in prod, auth in staging, rate limit.
priority, impact and concrete actions. That's what we send you in the report.
You'll receive an Excel/PDF: easy to share internally and execute a remediation plan.
How it works
No integrations at the start: you give us the scope, we do the work.
Domain(s), IPs, ranges or list of assets. We agree on what to analyze.
Quick · Controlled · Traceable
Assets → services → fingerprints → CVEs and operational risks.
Banners/TLS/headers · Deduplication
Technical Excel + Executive PDF with priorities and recommendations.
Actionable · Shareable · Historical
Pricing
You pay for analysis + Excel/PDF report delivery.
For a first snapshot of exposure.
Ideal to discover exposure and obvious risks.
To prioritize vulnerabilities with context.
The plan for teams who want a clear “to-do list”.
Large environments or recurring consulting.
Perfect if you need continuous operation without integrating yet.
*Indicative prices. You can add add-ons for frequency, evidence, or scope (IP range/ports).
After submitting the request, you'll receive an email with the payment link (card or transfer) and the proforma invoice. As soon as the payment is confirmed, we'll start the analysis and prepare your report.
Indicate the domain and scope.
Payment link + proforma invoice.
When payment is reflected, we start the analysis.
Report in PDF + full details in Excel.
Note: the report is generated exclusively with external exposure and fingerprinting data. We do not perform active exploitation unless explicitly authorized.
Tell us your domain and scope. We'll respond to confirm and send you the report.
Open your email client with the data pre-filled.
If you already have a list of IPs/subdomains, attach it to the email and we'll speed up the analysis.
FAQ
Clear, actionable and fast report.
No. At this stage we deliver the result as Excel/PDF after confirming the scope.
Assets, services, evidence, correlated CVEs, severity, priority, and recommendations per finding.
Executive summary: top risks, impact, and remediation plan ordered by priority.
By default we do light fingerprinting. If you want more active tests, they're agreed explicitly.