External Attack Surface · CVE Intelligence · Report

Find exposed vulnerabilities
and get the report in Excel or PDF

Proactive Defender discovers exposed assets (IPs, domains, subdomains, ports), fingerprinting (banners/TLS/headers) and correlates CVEs to prioritize real risks. At this phase you don't need an API: after contacting us, we send you an Excel/PDF report with all findings.

PDF Report Excel Report Assets, services, evidence, CVEs, severity and recommendations.
External inventory IPs, domains, subdomains, ports
Real risk Exposure + evidence + context
Actionable Prioritized recommendations
Example output
ASSET api.company.com · 443
TLSIssuer R3 · CN=api.company.com
BANNERnginx · server header
HIGH
Exposed admin panel

Restrict public access + SSO.

MEDIUM
Exposed sensitive endpoint

Review auth/roles and hardening.

LOW
Header improvements

Reduce stack fingerprint.

Global risk HIGH

Product

Continuous visibility of your external exposure

We send the result as a report (Excel/PDF). Later, it will be integrated via API.

EASM (Attack Surface)

External inventory: domains, subdomains, IPs, ports, services and changes over time.

Fingerprinting

Banners, TLS/certificates, headers and signals to infer product/version.

CVE Correlation

Fingerprint matching with CVEs + prioritization by exposure and criticality.

What's included in the report (Excel/PDF)

Discovered assets · Services/ports · Evidence (banners/TLS/headers) · Associated CVEs · Severity · Exploitability (when applicable) · Remediation recommendations.

The report is delivered after contact and scope validation. Formats adapt to your team (CTO/SOC/DevOps).

Demo

This is how your report would look (simulated)

Paste a domain to update the visual example (it doesn't actually scan).

Example results

Representative output of Excel/PDF (simulated).

Discovering subdomains… Resolving IPs and services… Fingerprinting (banners/TLS/headers)… Correlating CVEs… Generating Excel/PDF report…

Assets

ASSET api.company.com · 203.0.113.10
ASSET app.company.com · 203.0.113.11
ASSET admin.company.com · 203.0.113.12
ASSET staging.company.com · 203.0.113.13
ASSET mail.company.com · 203.0.113.14

Services & evidence

HTTPS 443 nginx · TLS issuer R3
WEB 3000 Grafana public login
API 8080 Swagger/OpenAPI accessible
SSH 22 OpenSSH fingerprint

Vulnerabilities (excerpt)

Full version in Excel/PDF
HIGH
CVE correlated by fingerprint (example)

Service: nginx · Evidence: header/server · Action: update / patch.

HIGH
Exposed admin panel

Restrict by IP/VPN + SSO, review credentials and logs.

MEDIUM
API documentation accessible

Block /docs in prod, auth in staging, rate limit.

Data without prioritization

Example
IP 203.0.113.10 :443
BANNER HTTP/1.1 200 OK · server: nginx
TLS issuer=R3 · CN=api.company.com
IP 203.0.113.12 :3000
BANNER Grafana · login
IP 203.0.113.13 :8080
BANNER Swagger UI
What's missing:

priority, impact and concrete actions. That's what we send you in the report.

You'll receive an Excel/PDF: easy to share internally and execute a remediation plan.

How it works

We analyze you and return a ready-to-act report

No integrations at the start: you give us the scope, we do the work.

1

You give us the scope

Domain(s), IPs, ranges or list of assets. We agree on what to analyze.

Quick · Controlled · Traceable

2

We discover and correlate

Assets → services → fingerprints → CVEs and operational risks.

Banners/TLS/headers · Deduplication

3

We deliver the report

Technical Excel + Executive PDF with priorities and recommendations.

Actionable · Shareable · Historical

Pricing

Plans per report

You pay for analysis + Excel/PDF report delivery.

Basic Report

For a first snapshot of exposure.

€249
+ VAT / report
Request
  • Up to 1 domain + subdomains
  • Discovery + ports/services
  • Fingerprinting (HTTP/TLS)
  • Delivery: Excel + PDF

Ideal to discover exposure and obvious risks.

Enterprise Report

Large environments or recurring consulting.

Custom
Contact
  • Assets and scope to measure
  • Historical retention + comparatives
  • Recurring deliveries (monthly/weekly)
  • Adapted format to SOC/CTO/Compliance

Perfect if you need continuous operation without integrating yet.

*Indicative prices. You can add add-ons for frequency, evidence, or scope (IP range/ports).

Payment method

After submitting the request, you'll receive an email with the payment link (card or transfer) and the proforma invoice. As soon as the payment is confirmed, we'll start the analysis and prepare your report.

1
Request the report

Indicate the domain and scope.

2
Receive payment email

Payment link + proforma invoice.

3
Confirmation

When payment is reflected, we start the analysis.

4
Delivery

Report in PDF + full details in Excel.

Note: the report is generated exclusively with external exposure and fingerprinting data. We do not perform active exploitation unless explicitly authorized.

Request your Excel/PDF report

Tell us your domain and scope. We'll respond to confirm and send you the report.

View pricing 📥 Download Sample PDF

Form (send via email)

Open your email client with the data pre-filled.

After confirming the scope, we'll send you the Excel/PDF report with assets, services, evidence, vulnerabilities (CVEs) and prioritized recommendations.

What you'll receive

  • Excel with assets, ports, banners, CVEs, severity and recommended action
  • PDF executive summary with overview, top risks and remediation plan
  • Minimal evidence (hashes, TLS info, relevant headers)
  • Prioritization: High / Medium / Low
Tip:

If you already have a list of IPs/subdomains, attach it to the email and we'll speed up the analysis.

FAQ

Common questions

Clear, actionable and fast report.

Do I need to integrate an API? +

No. At this stage we deliver the result as Excel/PDF after confirming the scope.

What's included in the Excel? +

Assets, services, evidence, correlated CVEs, severity, priority, and recommendations per finding.

And the PDF? +

Executive summary: top risks, impact, and remediation plan ordered by priority.

Is it an intrusive scan? +

By default we do light fingerprinting. If you want more active tests, they're agreed explicitly.