Most cyber risk tools repackage third-party data. Aegisnode operates its own global sensor network — scanning external attack surfaces and reporting what it finds.
How it works
Enter a domain or IP. Aegisnode maps the external attack surface.
Distributed sensors scan for open ports, services, certificates, DNS issues, and known CVEs.
Findings scored, categorized, and ready to export. JSON, CSV, or API.
Capabilities
Discovers internet-facing assets. Finds what you didn't know was exposed.
Identifies open ports and running services. Updated with each scan cycle.
Maps services against known CVEs. Prioritized by severity and exploitability.
Tracks SSL/TLS certificates. Flags expirations, weak ciphers, and misconfigurations.
Analyzes records, subdomains, and zone configurations. Detects takeover risks.
Scheduled scans detect changes over time. Alerts on new exposures.
Aegisnode was built to solve a problem its founder encountered firsthand: cyber risk data that was expensive, stale, or locked behind enterprise sales cycles.
Claims Verification
Paste any vendor's security claims from their website, questionnaire, or RFP response. Aegisnode cross-references each claim against real scan data and tells you what's confirmed, what's contradicted, and what can't be verified.