Deploy lightweight agents and collectors for distributed scanning, network discovery, honeypots, and NetFlow v9 traffic monitoring.
External domain scans with automatic subdomain population. Discover your entire attack surface from an external perspective.
Onsite dedicated agent devices for network discovery and honeypot deployment. Capture real attacker behavior.
Cross-platform agents for Windows, Linux, and macOS workstations and servers. Quick and deep scan modes.
Enable NetFlow v9 export from supported firewalls/routers to gain "who-talked-to-who" visibility across WAN and LAN. Use traffic patterns to flag suspicious behavior such as:
Why it matters: Vulnerabilities show what could be exploited; NetFlow shows what is actually happening.
Agents automatically discover network devices every hour using ARP table analysis and IP range scanning, identifying new assets as they appear.
Trigger on-demand vulnerability scans remotely via the platform. Scans are scheduled and queued, giving you full control.
Fully interactive fake services: HTTP admin panels, phpMyAdmin, WordPress, FTP with fake filesystems, Telnet shells, and SSH authentication.
Honeypot services capture actual attacker credentials, commands, and techniques in real-time for threat intelligence analysis.
Deploy via custom ISO images generated by the platform, pre-configured with enrollment tokens, network settings, and honeypot configs.
All agent-to-server communication uses encrypted channels with JWT authentication and heartbeat monitoring for status tracking.
Agent-to-server communication uses encrypted channels with JWT authentication and heartbeat monitoring.
Honeypot credential capture is stored hashed (SHA256) for security.
Agents self-update regularly with rollback on failure.
Error tracking and alerting for scan failures and connectivity issues.
Uses flow telemetry (connection metadata) to detect suspicious patterns and correlate with assets.