Technologies page


The technologies page is the place for being able to understand which web technologies you have on your attack surface. Finding outliers in this data is crucial for finding shadow IT, outdated or vulnerable software.

Each observation will have a state saying if that is still active on your attack surface or whether it is inactive. There will also be a date saying when it was first found and a disappeared timestamp if it is no longer active on the surface.

Grouping the technology data

o allow you to look at this data on any level of detail, the table can be grouped on some key dimensions.

Group by None

This is the most detailed view of the technology data. Each row is a unique observation of a technology and its version, and what domain and port it was found on. The status shows whether this technology still exists on that particular domain and on that port, if it is active it still exists and if it is inactive we have stopped finding it. The dates show when that observation was first discovered and, if it has since disappeared, when that technology disappeared from that domain and port.

This view can be used to quickly find all domains running a particular technology and version. Simply filter on the technology and version you are interested in. A pro tip is that the "Is any of" filter for the Technology column will show you a unique list of all different technologies found across your attack surface.

Group by Version

With this grouping, you will immediately see each unique technology and its version you have on your attack surface and how many assets are associated with it. Clicking the number of assets will navigate you to the group by None view and filter on this technology. The status shows whether that particular provider is currently in use by any of your assets and the timestamps show when it was first found and when it disappeared (if applicable). Use this grouping to:

  • quickly overview all different technologies and their versions,
  • find all different versions of a technology so that you can keep your software up-to-date and secure,
  • find your most commonly used technologies and your least used technologies.