Attack Surface Intelligence

Browse to the recently updated, or search for an organization by name to get started.

Discover Exposed Systems

Using a vast array of OSINT sources and the power of the core engine's graph discovery, Intrigue provides unparalleled external asset visibility.

Find Exploitable Vulnerabilities

Intrigue makes it simple to identify exposed vulnerabilities in application stacks and their underlying hosts. Vulnerablity information can be easily exported for vulnerablity management teams.

Gain Visibility of Third Parties

Intrigue uses link analysis technology to identify third party links and relationships, allowing security teams to gain visiblity of third party risk.

Improve Cyber Hygiene

Intrigue helps security teams identify assets that are no longer used, but still present a risk to the organization. Stay in the know, while enabling your business to grow!

Stop Shadow IT

Shadow IT is a fact of life for most organizations, forcing security teams to scramble to find these assets. You can't secure what you don't know about. Intrigue can help identify and track down owners of Shadow IT systems.

Identified Assets

  • Applications
  • Domains
  • Hosts
  • Javascript Libraries
  • Network Ranges
  • Network Services
  • SSL Certificates

Vulnerability Intelligence

  • Exposed Database Services
  • Exposed TCP/UDP Services
  • Out-of-Date Javascript Libraries
  • Vulnerable Application Stacks
  • Associated Third Parties correlates information from a multitude of open and closed sources to provide intelligence about of attack surface, data exposure, and overall cyber hygiene to internal security teams.

Powered by Intrigue Core - The Open Security Intelligence Framework