On April 17, 2023, Criminal IP's beta service will end and the official service will be launched!
Cybersecurity Search Engine | Criminal IP

Attack Surface Management

Solutions Based on Threat Intelligence

Criminal IP ASM’s Attack Surface Management

Provides dashboard access to auto-monitored assets exposed to attack surfaces. Criminal IP's paid plan members can access Attack Surface Management dashboards for free.

Criminal IP ASM's ComprehensiveAttack Surface Management Services

  • New Assets

    Enterprise

    Auto-detects added or changed assets.

  • IP Assets

    Scans open port information provided by registered IP addresses.

  • Domain

    Provides subdomain information for registered domains.

  • Certificate

    Provides certificate information applied to registered domains.

  • Risk

    Detects vulnerabilities in all assets such as domain, IP addresses, SSL certificates, applications etc.

  • Intelligence Search Result

    View details regarding a particular asset's attack surface exposure levels and vulnerabilities.

  • Dashboard

    Provides a dashboard containing statistics, location, vulnerabilities status and graphs for all registered assets.

  • Report

    Auto-generates Attack Surface Management status for new assets and vulnerabilities.

Risks

Detected threat vectors in registered IT assets (IP, Domain) are automatically added to the Risk page for easy access.

Domain /Certificate

Provides comprehensive threat intelligence of registered IP addresses and domains from Criminal IP's systems in visuals.

Dashboard

Provides effective Attack Surface Management with Criminal IP's full threat intelligence information, all through a visualized dashboard.

IP Assets (Application)

View information regarding registered IP Assets (categorized by risk score, AS Name, location information, vulnerability). Clicking on the IP address provided will direct you to the results page of Criminal IP Asset Search.

Risks

Detected threat vectors in registered IT assets (IP, Domain) are automatically added to the Risk page for easy access.

Domain /Certificate

Provides comprehensive threat intelligence of registered IP addresses and domains from Criminal IP's systems in visuals.

Dashboard

Provides effective Attack Surface Management with Criminal IP's full threat intelligence information, all through a visualized dashboard.

IP Assets (Application)

View information regarding registered IP Assets (categorized by risk score, AS Name, location information, vulnerability). Clicking on the IP address provided will direct you to the results page of Criminal IP Asset Search.

Criminal IP ASM employs a comprehensive method of analyzing all attack surfaces regardless of complexity.

There's no need to busy yourself with looking for scattered assets. Criminal IP ASM employs real-time detection, all displayed on our comprehensive web-access dashboard. Assets on attack surfaces and vulnerabilities can now be easily detected and countered according to the latest cybersecurity trends.

Threat Intelligence Search Engine as Add-on

Access to additional features in Criminal IP CTI (Cyber Threat Intelligence), with integrated API functions and added Search Intelligence services.

Stay on top of the latest trends with our rich analysis reports and thorough statistics data on global cybersecurity threats.

Auto-detect online assets

One of the key aspects of attack surface management is identifying known and unknown asset vulnerabilities.

Criminal IP ASM scans the entire internet for all assets belonging to the user, even those that were previously unknown, by detecting all running applications and domains.

SaaS Platform

Criminal IP ASM is a Software as a Service (Saas) platform.

We provide Attack Surface Management solutions made easy to access through a web interface.

Enterprise

You’re one step away from implementing Criminal IP ASM

All you need is a single domain address of a particular company asset, and our services can automatically identify all corporate assets distributed across the world wide web. From there on, your IT assets can be viewed through Criminal IP ASM's superior automated attack surface management.

Register a primary domain, Search for associated domains, Search for Complex Amplifications, Match feature information classifications, Automatic Extraction of IPs and Domains in Possession

ATTACK SURFACE MANAGEMENT

What is Attack Surface Management (ASM)?

Companies employ a myriad of network equipment, databases, servers, and applications necessary to run a business. Attack Surface Management is a proactive approach to detecting possible attack vectors from malicious hackers through identifying open ports, server vulnerabilities, phishing attempts, malicious code distribution, etc.

Criminal IP BlogAttack Surface Management: Monitoring Unknown Assets and Vulnerabilities

Check out our Best Practice articles to learn more about managing attack surfaces based on threat intelligence, as well as the available range of detectable attack surfaces.

FAQ for Criminal IP ASM'sAttack Surface Management services

Q.
How do I gain access to Criminal IP ASM?
A.

(Coming soon) Register for Criminal IP's paid services  (Starter, Professional, Premium) to access your Criminal IP ASM dashboard. Contact us to discuss any possible upgrades for your personal plan or to purchase an Enterprise plan.

Q.
What kind of assets can Criminal IP ASM detect automatically?
A.

By scanning open ports of registered IP addresses, Criminal IP ASM can detect the applications associated with said IP, and detect hosts such as domains, SSL certificates, IoTs, MySQLs and Printers. Detected assets are classified by geographic and cloud information, ASN, APP data. Collected information are all visualized on our comprehensive ASM dashboard.

Q.
How are asset vulnerabilities mapped automatically?
A.

Criminal IP scans IP address ports around the world in real-time. If an exploitable port or a vulnerability is detected, they are classified as a dangerous element on the attack surface and displayed as such on the Criminal IP ASM dashboard. More information about detected vulnerabilities can be found by clicking the  Search Analysis Data Results page on Criminal IP.

Q.
What's the difference between personal and enterprise versions of Attack Surface Management?
A.

The biggest difference between personal and enterprise versions of our services are in the presence of asset auto-detection.
Personal Attack Surface Management (coming soon)
Personal ASM services require users to manually register IP addresses and Domains. While scan data for registered assets can be viewed in your dashboard, it does not mean that your unregistered assets, such as IP bands or parent domain assets can be detected automatically.
Enterprise Attack Surface Management
Enterprise Criminal IP ASM services can automatically detect all relevant IP addresses or sub-domains from the IP address registered. Furthermore, additional assets are also automatically detected. Enterprise Criminal IP ASM allows users to discover previously unknown assets.

Q.
How many assets in total can I monitor on my Criminal IP ASM dashboard?
A.

Your Criminal IP plan determines the number of assets monitored. This number is determined as the sum of both IP addresses, domains and sub-domains. · Starter - 10,000 assets
· Professional - 100,000 assets
· Premium - 500,000 assets
(Coming Soon)
For enterprise users, please Contact us for the precise number and pricing information regarding assets monitored by Criminal IP ASM.

Q.
Can I manually add assets to my Attack Surface Management?
A.

Personal ASM users can add assets only through manual means. Enterprise ASM users do not often need to add assets manually as Criminal IP ASM has auto-asset detection. User can add new domains gained from Mergers and Acquisitions (M&A), security audits of isolated subsidiaries.

Q.
Is there anything I need to install or set up after purchasing Criminal IP ASM?
A.

Simply log into Criminal IP ASM on your web browser to access all ASM features immediately. Personal ASM users need to register all their assets manually to scan the assets needed, while Enterprise ASM users need to only register one asset and all related assets will be registered on the ASM dashboard within 2-3 days.

Q.
Is there a trial version of the Criminal IP Attack Surface Management?
A.

Users can access personal Criminal IP ASM by registering for Criminal IP's Starter Plan. (Coming Soon). Corporate users can request a free demo by Contact us at any time.