Network view makes it easy to see exactly what's going on with your perimeter: showing you active and unresponsive targets; changes since the last scan; expiring certificates; and those ports, services and protocols you expect (but more importantly, don't expect) to be exposed to the internet.
What does it look like?
You can see a list of your targets with a filtering pane on the left to allow you to get the information you need.
For each target, you can also see a screenshot of what can be seen when a user navigates to that service on this target. This helps when trying to identify what is running on a specific port e.g. by examining the login screen.
You can also make this screenshot bigger by clicking on the thumbnail image (highlighted in red above). You can then scroll through the screenshots using the arrow in the bottom right:
On the far right, you can also see the date in which the service on each target was first observed and also when it was last observed.
How do I use it?
You can keep it simple with these high-level filters:
Use the top one to search and select IP addresses, domains and/or subdomains that you have added to your portal.
Use the second one to search and select groups of targets (if that's how you use tags).
Use the third dropdown to search and select via the IP address that your hostname target resolves to.
Or get more granular, by selecting a combination:
You can also download a CSV file of these filtered targets by clicking the Export button in the top right corner.
Why is some data missing from my Network view?
If the target listed sits behind a CDN (such as Cloudflare or Cloudfront), we deliberately omit the network data because it actually references the CDN's infrastructure and not your own. If you'd like to know more, please have a read of this article.
Curious to see more?
If you're interested in what this all looks like in action, either sign up for a free trial today; or, if you're already signed up to the Pro, Premium or Vanguard, head straight over to the Network page.