Protect Your
Attack Surface

Monitor your digital footprint with External Attack Surface Management (EASM) platform Recon Wave.

Infrastructure monitoring

Agentless
No installation, none internal access. We already know everything.
Instant
Get an account and observe your infrastructure instantly.
Visible
View all your assets across multiple providers simultaneously.
Continuous
Track all dynamic changes in your infrastructure in real time.
Safe
Identify deployed vulnerabilities with an associated risk score.
Relevant
Know your infrastructure and receive only actionable insights.

How?

We're scanning the whole Internet so you can be safe

  • Recon Wave periodically scans the Internet and collects data from various OSINT sources to discover and link all your online assets automatically and instantly.
  • We continuously update our vast dataset and track changes of each asset to notify you about changes or suspicious anomalies.
  • We will automatically scan any selected part of your infrastructure for actionable vulnerabilities and misconfigurations.
Domain
IP
Timestamp

Recon Wave Search

Explore our DNS Dataset

Unlock the power of Recon Wave Search that gives you access to our DNS dataset with more than 4 billion data points.
Subdomains
List known subdomains of any domain
History Records
See how the records evolved over time
Reverse Search
Search domains based on IP address, TXT or NS query
DNS types
Multiple DNS types such as A, AAAA, TXT, NS

Detect everything,

expose nothing

Assets Discovery

Recon Wave discovers all your root domains, subdomains and whole infrastructure automatically.

No need to configure anything. Recon Wave already knows everything about you thanks to reverse DNS dataset and other OSINT sources.

Learn more

Continuous Monitoring

Monitor your digital footprint continuously.

Recon Wave monitors your infrastructure 24/7. Is there a new domain created or did any of your DNS record change? We let you know.

Learn more

Scan Open Ports

Have constant visibility over all your exposed ports.

Recon Wave checks open TCP ports on up-to daily basis. All 0-65535 ports are scanned to provide a complete coverage.

Learn more

Application Vulnerability Scanning

Identify and mitigate security weaknesses using our managed vulnerability scanning.

Prevent data leaks before they happen. Scan for vulnerabilities and use our vulnerability management platform with ease.

Simplify Compliance

Take proactive steps to meet your compliance requirements with NIS2 directive and SOC 2.

Recon Wave automatically discovers your infrastructure, tracks changes as they happen and creates comprehensive asset inventory.

Risk Scoring

Do not waste time, see only important part of your attack surface.

Our algorithms assign a risk level to each identified asset and vulnerability, enabling you to prioritize your security efforts efficiently.

Advanced Reporting

Prevent any security breach by acting on time.

Get real-time alerts enhanced with AI and mitigation steps in our platform or using one of many 3rd party integrations.

Prevent Subdomain Takeovers

Do not give anyone a chance to steal your domain because of outdated DNS records

Stay informed with up-to-date details about the hosting and cloud providers for all your domains and their corresponding IP addresses.

Discover Dangling VHOSTS

Ensure that none of your outdated applications are accessible.

Recon Wave verifies that your web servers are not exposing outdated or internal applications, even if their public DNS records no longer exist.

Pricing

Pay Only for the Features You Need

Pricing depends on features and how often we scan your infrastructure for vulnerabilities.

Startup

The essentials to see what you need to monitor.

  • DNS Monitoring
  • Infrastructure Changes Detection
  • Basic analytics
  • Up to 1,000 domains
  • Up to 500 IPs
Get a Quote

Business

Most popular

Plan with payload based vulnerability scanning for your applications

  • DNS Monitoring
  • Infrastructure Changes Detection
  • Application Vulnerability Scanning
  • Anomaly Detection
  • Up to 50,000 domains
  • Up to 5,000 IPs
  • 24-hour support response time
  • API Automations / Notifications
  • Port Scanning
Get a Quote

Enterprise

Dedicated support and advanced analytics for large attack surfaces.

  • DNS Monitoring
  • Infrastructure Changes Detection
  • Application Vulnerability Scanning
  • Anomaly Detection
  • Unlimited domains
  • Unlimited IPs
  • SSO
  • Dedicated Infrastructure
  • 1-hour, dedicated support response time
  • API Automations / Notifications
  • Port Scanning
  • Detection of Dangling VHOSTS
Get a Quote

Ready to be more secure?