How does this scan work?

Created by Charley Downey, Modified on Fri, 22 Mar at 1:03 PM by Charley Downey

We monitor these communications, store them in our database and alert our users if we find indications of reconnaissance, an attack or post-attack hacker activity on companies they have scanned.


Due to the nature of hacker communications, we will not always know if a company was hacked or not. The company scanned may need to investigate our findings to see if a breach occurred or if the hack attempt was stopped by their security controls.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article