Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
EXTERNAL ATTACK SURFACE MANAGEMENT · EASM · CONTINUOUS INTERNET RECONNAISSANCE

See your organizationthe way attackers see it.Before they do.

Spakto continuously maps every internet-exposed asset, forgotten domain, misconfigured service, and shadow infrastructure — giving you the attacker's view of your external attack surface before threat actors exploit it.

External Attack Surface Management

Your biggest risks are
assets you forgot existed.

Traditional inventory lists what IT manages. Spakto EASM maps what the internet can see — shadow IT, expired subdomains, leaked credentials, and misconfigured cloud services no one monitors. Attackers run recon 24/7. Now you do too.

IT Asset Inventory — Known AssetsINTERNAL VIEW
www.acme.comMANAGED
app.acme.comMANAGED
api.acme.comMANAGED
admin.acme.comMANAGED
mail.acme.comMANAGED
…5 assets tracked — inventory complete
You see 5 assets. Attackers find 312.
Spakto EASM — Live Discovery StreamLIVE
12,400+
Assets Discovered
~4 min
Avg Discovery Time
68%
Previously Unknown
No Agents Required
Pure internet-perspective recon — no firewall changes, no internal access
Attacker-Speed Recon
Same techniques as threat actors: CT logs, passive DNS, GitHub, Shodan
Continuous Coverage
New assets discovered within minutes — not quarterly when auditors visit
Discovery Coverage

Everything visible
to an attacker.

Six attack surface categories. Every asset discoverable from the internet — whether you know it exists or not.

Domains & DNS847 ASSETS TRACKED

Continuous DNS enumeration using certificate transparency logs, passive DNS replication, zone transfer attempts, and brute-force permutation — discovering every resolvable hostname under your apex domains.

CT Log Monitoring
cert-manager.io, crt.sh, Facebook CT — zero-day subdomain detection
95%
Passive DNS
Historical resolution data, cloud-hosted PDNS feeds
88%
Subdomain Takeover
CNAME dangling to S3, GitHub Pages, Heroku, Netlify endpoints
100%
Permutation Engine
Wordlist + pattern expansion: api-, dev-, stage-, legacy-, -backup
79%
Wildcard Detection
Wildcard certs leaking internal subdomain names via SAN analysis
84%
4,176 total assets under continuous monitoring across 6 attack surface categories — updated in real-time
Attacker Reconnaissance Simulation

What attackers see
before they strike.

This is the actual recon playbook attackers run against organizations. Spakto runs it first, continuously — so you find exposures hours before threat actors do.

Passive Recon — Key Findings
847 subdomains via certificate transparency logs
dev.internal.acme.com — resolves, unmonitored
old-vpn.acme.com — last SSL renewal: 47 days ago
stage-api.acme.com — staging environment, internet-exposed
3 CNAME records pointing to deprovisioned S3 buckets
Spakto finds this before attackers reach 0 – 30 min
spakto-recon — passive
How It Works

Continuous internet recon
on your behalf.

Step 1 / 4

Seed

Define your known starting points

  • Input your known apex domains, IP ranges, ASN numbers, and company names
  • No agents, no firewall rules, no internal network access required
  • Works from a single domain — discovery expands automatically
  • M&A mode: add target company name and let EASM discover everything
spakto-easm — seed
EASM vs Traditional Asset Inventory

Inventory shows what you manage.
EASM shows what attackers see.

Your IT inventory scores 100% — 5 of 5 known assets are healthy. Meanwhile attackers find 307 more assets you never knew existed. Compliance ≠ security.

IT Asset Inventory — Managed AssetsINTERNAL
Score: 5/5 healthy — inventory complete ✓
307 internet-facing assets not in inventory
Spakto EASM — Attack Surface FindingsLIVE
Scanning attack surface...
Capability
IT Asset Inventory
Spakto EASM
Tracks known managed assets
Discovers unknown/shadow assets
Attacker perspective view
Continuous external monitoring
Shadow IT discovery
Subdomain takeover detection
Credential leak monitoring
Third-party & supply chain exposure
Certificate expiry monitoring
M&A target surface assessment
Threat Intelligence

Real-time threat signals
from 6 intelligence feeds.

Spakto aggregates live signals across certificate transparency, breach databases, dark web feeds, passive DNS, and code repositories — correlating everything to your attack surface in real-time.

Threat Intelligence FeedLIVE
4
CRITICAL
9
HIGH
23
MEDIUM
11
INFO
Intelligence Sources
GitHub / GitLab
47
Shodan / Censys
312
CT Logs
847
Breach Databases
94
Passive DNS
1,104
Dark Web
12
Total intelligence signals
2,416
correlated to your specific attack surface — updated every 4 minutes
Reconnaissance Techniques

8 recon methods.
All running continuously.

These are the exact techniques professional threat actors use to map your infrastructure. Spakto runs all 8 simultaneously — giving you attacker-equivalent reconnaissance coverage before they do.

Certificate TransparencyPASSIVE

Every SSL/TLS certificate issued anywhere on the internet is logged publicly in CT logs. Spakto monitors these logs in real-time, discovering new subdomains seconds after their certificate is issued — before the DNS even propagates.

Security Impact

Discovers 60–80% of all subdomains — including internal names leaked via wildcard SAN fields

Sample Findings
dev-internal.acme.com via Let's Encrypt CT log (4h ago)
staging-api.acme.com — wildcard cert SAN leaks 12 subdomains
legacy-erp.acme.co.uk — expired cert on forgotten subdomain
Certificate
Passive
BGP
Code
Shodan
Web
Lookalike
Employee
— all running 24/7
Use Cases

Who uses External
Attack Surface Management.

From SOC teams needing real-time alerts to M&A advisors assessing acquisition targets — Spakto gives every security role the external attacker view they've been missing.

SecOps teams use Spakto EASM as their continuous external watchdog — replacing quarterly pen tests and manual surface reviews with an always-on attacker-perspective feed that integrates directly into existing SOC workflows.

Key Capabilities
  • Instant Slack / PagerDuty / Jira alerts when new exposure appears
  • New subdomain with open admin panel — alerted within 4 minutes
  • Credential leak in GitHub triggers automatic asset correlation
  • SIEM integration: findings as structured events with IOC context

We found a Jenkins instance with default credentials on a subdomain we didn't know existed. It had been there for 11 months.

Lead Security Engineer, FinTech Scale-up

Outcomes
< 4 min
Mean time to detect
147
New assets found/mo
94%
Alert accuracy
−89%
MTTD improvement

External Attack Surface Management FAQs

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question