Protect Your Digital Attack Surface

Automatically discover and track changes of your infrastructure exposed to the Internet. Elevate your security posture with Recon Wave by identifying blind spots, vulnerable services and shadow infrastructure.

App screenshot

Identify weak spots before hackers do

Hackers focus on shadow IT and forgotten assets as those represent easy entry points to companies' networks and are impossible to protect. Recon Wave automates the reconnaissance process with advanced techniques to provide you visibility over your assets.

Assets Discovery

Recon Wave discovers all your online assets automatically and instantly. No need to configure anything.

Learn more

Vulnerability Scanning

Identify and mitigate security weaknesses using our vulnerability scanning before attackers can exploit them.

Available Soon

Simplify Compliance

Take proactive steps to meet your compliance requirements of NIS2.

Available Soon

Risk Scoring

Assigned a risk level to each identified asset and vulnerability, enabling you to prioritize your security efforts efficiently.

Available Soon

Continuous Monitoring

Keep a vigilant eye on your infrastructure 24/7. Is there a new domain created or did any of your DNS record change? We let you know.

Learn more

Advanced Reporting

Find real-time alerts enhanced with AI and mitigation steps in our platform or using one of many 3rd party integrations.

Available Soon

How? We're scanning the whole Internet so you can be safe

  • Recon Wave periodically scans the Internet and collects data from various OSINT sources to discover and link all your online assets automatically and instantly.
  • We continuously update our vast dataset and track changes of each asset to notify you about changes or suspicious anomalies.
  • We will automatically scan any selected part of your infrastructure for actionable vulnerabilities and misconfigurations.

Recon Wave Search

Explore our DNS Dataset

Unlock the power of Recon Wave Search that gives you access to our DNS dataset with more than 4 billion data points.

Subdomains
List known subdomains of any domain
History Records
See how the records evolved over time
Reverse Search
Search domains based on IP address, TXT or NS query
DNS types
Multiple DNS types such as A, AAAA, TXT, NS

391

Unique Data Points

We run anomaly detection on your infrastructure to uncover misconfigurations and obsolete infrastructure.

4.2 billion

Unique domains tracked

Our DNS database contains 4.2 billion unique domains with corresponding historical DNS records.

We use passive and reverse DNS data to discover anomalies and forgotten configurations in your infrastructure. It also allows us to discover your new assets as soon as they are created.

240,830

Vulnerabilities Tracked

Recon Wave uses payload based vulnerability scanning to discover vulnerable applications.

Pricing

Pay Only for the Features You Need

Choose a plan that works for you.

Pricing depends on features and how often we scan your infrastructure for vulnerabilities.

Startup

The essentials to see what you need to monitor.

  • DNS Monitoring
  • Infrastructure Changes Detection
  • Basic analytics
  • Up to 1,000 domains
  • Up to 500 IPs
Get a Quote

Business

Most popular

Plan with payload based vulnerability scanning for your applications

  • DNS Monitoring
  • Infrastructure Changes Detection
  • Application Vulnerability Scanning
  • Anomaly Detection
  • Up to 50,000 domains
  • Up to 5,000 IPs
  • 24-hour support response time
  • API Automations / Notifications
Get a Quote

Enterprise

Dedicated support and advanced analytics for large attack surfaces.

  • DNS Monitoring
  • Infrastructure Changes Detection
  • Application Vulnerability Scanning
  • Anomaly Detection
  • Unlimited domains
  • Unlimited IPs
  • SSO
  • Dedicated Infrastructure
  • 1-hour, dedicated support response time
  • API Automations / Notifications
Get a Quote

Ready to be more secure?