Industry-leading coverage spanning the complete internet landscape:
• 24 Billion Internet Services: Comprehensive service mapping across all protocols
• 660 Million IP Addresses: Complete IP space coverage and monitoring
• 65,535 Ports: Full port range scanning and service identification
• 239 Countries: Global geographic coverage
• 97% ASN Coverage: Nearly complete autonomous system network mapping
Maintain current awareness with industry-leading data freshness:
• Complete Global Refresh: Full internet re-scan every 14 days
• Accelerated China Refresh: Complete China coverage updated every 4 days
• 310 Million Daily Service Updates: Real-time service change tracking
• 48 Million Daily IP Updates: Continuous IP infrastructure monitoring
Advanced scanning and mapping capabilities providing comprehensive internet awareness:
• Full Port Range Coverage: Complete scanning of ports 0-65,535
• Rich Service Context: Protocol, banner, certificate, and network metadata
• Precision Targeting: Query by CIDR, ASN, organization, country, port, protocol, and time
• Continuously Updated Graph: Real-time relationship mapping and change detection
Flexible integration options designed for large-scale operations:
• API Access: Real-time lookups for ASM, threat intelligence, and incident response
• Bulk Feeds: Daily or continuous data streams in JSON, CSV, or Parquet formats
• Managed Sync: Curated rolling windows to optimize storage while preserving context
• Custom Slices: Geography, vertical, ASN, or protocol-focused datasets
Continuously discover internet‑facing assets (known, unknown, shadow) and prioritize exposures before attackers do.
Hunter is the industry leader in brand threat intelligence and lightening fast takedown services, offering unmatched protection for your most valuable digital assets.
Score vendors and subsidiaries using independently observed exposure data—no questionnaires required.
Pivot across protocols, ports, banners, and ASNs to find look‑alikes, C2 infrastructure, and high‑risk changes.
Track drift across clouds, regions, and accounts; spot risky services that slip past guardrails.
When alerts fire, validate externally exposed services in seconds and see what changed since yesterday.