What is the attack surface view?
The attack surface view aggregates data from your scan results into an inventory of discovered assets. It is not an autonomous discovery engine.All attack surface data lives inside your current workspace. Every IP, hostname, port, URL, and technology entry keeps a link back to the scan and tool that produced it, so you can jump directly to the originating results.
How data gets into the attack surface
The attack surface view is populated in two ways:- Adding targets: When you add a target or asset to your workspace, it appears in the attack surface view as a bare IP or hostname.
- Running scans: When you run scans with the four supported tools listed below, results are automatically merged into your attack surface inventory.
Only scans initiated from the UI or by scan robots populate the attack surface. API-initiated scans do not add data to the attack surface view.
Supported tools and what they contribute
| Tool | Data added to attack surface |
|---|---|
| Port Scanner (TCP or UDP) | IPs, hostnames (via reverse DNS), open ports (TCP/UDP), service names, service versions, OS detection |
| Website Scanner | Technologies (name and type), URLs, screenshots |
| Website Recon | Technologies, URLs, screenshots. For IP targets: also hostnames and ports |
| Network Scanner | Ports, protocols, services, OS, technologies |
If a scan finds an additional port, the attack surface view adds that port to the existing IP/host entry. Other ports and technologies already recorded are preserved.
Asset types tracked
The attack surface tracks the following asset types:- IP addresses: with OS information where detected
- Hostnames: linked to their resolved IP addresses
- Ports and services: port number, type (TCP/UDP), protocol, server name and version
- URLs: scheme, path, HTTP status code, page title, and screenshots
- Technologies: name and type (e.g., web framework, CMS, server software)
Grouping and navigation
Use Group by to organize results by any of six views:- IP address
- Hostname
- Port
- Protocol
- Service
- Technology
Continuous monitoring
The attack surface view does not run background scans on its own. To monitor your attack surface over time:- Schedule recurring scans using the four supported tools (Port Scanner, Website Scanner, Website Recon, Network Scanner).
- Set up notifications to be alerted when new assets, ports, or technologies are discovered.
Exports
You can export the current attack surface at any time:- CSV: full data (IPs, hosts, ports, protocols, services, URLs, technologies)
- CSV (network only): network-layer fields only (no URLs or technologies)
- JSON: structured export of the full dataset
Getting started
Run scans with supported tools
Run Port Scanner, Website Scanner, Website Recon, or Network Scanner against your targets.
Review the attack surface view
Open the attack surface view to see aggregated results grouped by IP, hostname, port, or other dimensions.