Information about our security assessment infrastructure and scanning practices
Recon Wave utilizes advanced infrastructure to perform comprehensive security assessments and scanning on behalf of our customers. Our platform conducts authorized security evaluations exclusively for resources that have been explicitly requested by our customers as part of their attack surface management and security monitoring services.
All scanning activities are performed with proper authorization and are limited to the scope defined by our customers' service agreements. We do not conduct unauthorized scanning or testing of any systems.
Our scanning infrastructure operates from multiple regions and cloud providers worldwide to ensure comprehensive coverage and realistic testing conditions. This distributed approach allows us to identify potential vulnerabilities and exposures from various global perspectives.
All our scanning infrastructure maintains proper PTR (Reverse DNS) records pointing toreconwave.com. This ensures that our scanning activities can be easily identified and attributed to Recon Wave.
When performing HTTP-based security checks and web application assessments, our scanners use a distinctive User-Agent string that contains:
A typical full User-Agent string from our scanners looks like:
This identifier allows system administrators and security teams to easily recognize traffic originating from our security assessment platform in their logs and monitoring systems.
If you wish to opt out from all Recon Wave security checks and scans, you can submit a request to our dedicated opt-out email address.
Contact for opt-out requests:
[email protected]Please include in your request:
If you have any questions about our scanning practices or need additional information, please don't hesitate to contact our team.
Contact Support