Skip to main content
Version: 2.0.0

Subdomains and IP Addresses

This section displays all the subdomains and IPs that have been detected for the chosen target.

Subdomains and IPs

Each tile in this section provides an overview of the subdomain and IP addresses by displaying the following info:

  • Name of the subdomain/ IP address
  • Technologies found
  • Total vulnerabilities
  • Risk probability

Subdomains

Subdomain tile

Clicking on the 'Open' button on a Subdomain tile would provide the user with the following details about the vulnerabilities, in a tabular format:

  • Risk probability
  • Type of vulnerability
  • Name
  • Description
  • Severity
  • Host
  • Endpoint
  • Timestamp.
NOTE

The severity of the risks is based on the below colour code:

Total Vulnerabilities
Risk probability

Subdomain details

This tabular info can be downloaded as a .csv file by clicking on the download button at the top right corner.

Subdomain details download

IP addresses

IP tile

Clicking on the 'Open' button on an IP address tile would provide the user with the following details about the vulnerabilities:

  • Risk probability
  • CVEs (for each CPE)
  • Open ports
  • Tags
  • Hostnames
  • IP address
  • Possible CVEs
NOTE

The severity of the risks is based on the below colour code:

Total Vulnerabilities
Risk probability

IP Details

AspectCPES (Common Platform Enumeration)CVEs (Common Vulnerabilities and Exposures)
Descriptionfocuses on system configurations, detailing the setup and components of hardware and software.specific identifiers assigned to vulnerabilities in software systems. These IDs are used to discuss and track security issues.
ExampleExample CPES: cpe:/o:microsoft:windows:10Example CVE: CVE-2023-12345
Focusemphasizes identifying different system components and their versions.highlight individual vulnerabilities within software systems, pinpointing security risks.
Use Caseused to determine affected systems based on configurations.employed to reference and discuss vulnerabilities, enabling security conversations.
Link to Issuesassociated with configuration data, aiding in assessing system setup.directly linked to detailed information about vulnerabilities, assisting in risk assessment.
Mitigation Usagehelps identify impacted systems, allowing for targeted security measures.provide information about specific vulnerabilities, aiding in devising mitigation plans.

In the CPES section the user can view in detail about the different CVEs that are identified for each CPE. The user can choose between different CPES by clicking on the drop down given on the top left of this section.

CVE list

Clicking on a particular CVE provides more details about it.

CVE Details

The ports section shows the ports which are open and the protocols they follow.

Ports

The list of open ports can be downloaded as .csv file by clicking on the download icon on the top right of this section.

Ports Download

The tags section marks the tags which would connect with the CVEs listed for this IP.

Tags

The hostnames section contains the name(s) of the host(s) from which the IP address was found.

Hostnames

The IP section gives the IP address whose details are listed here.

IP

The possible CVEs indicates which CVEs can possibly be exploited.

Possible CVEs