View in real-time our firehose of worldwide scans. Our real-time stream will provide you with a simple way to view the data that we produce by scanning the entire internet, you can also have your custom stream with the jobs you request.
Submit your own custom modules
If you want to acquire data about some specific use case or test your perimeter for the latest vulnerability, you can submit custom modules which we can deploy on our platform. Currently we acquire data from scanning, torrent downloads, public data leaks, and much more...
If you don’t want to consume data via a stream you can request scans and get them in your own personal archive. You can also query our platform for all information about a specific IP address or port.
To learn a bit more about the 40FY platform watch these videos of presentations we have done about the service.
Security Metrics, when used correctly can help you paint a picture on the status of ur Security, they can also help you make security decisions so that you can prioritize and reduce the risk when making these decisions.
In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scann ing and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way
"Misconfigured Big Data apps are leaking data like sieves
BinaryEdge concludes that it found close to 1,175 terabytes (or 1.1 petabytes) of data exposed online, after looking into just four technologies as part of an online scan"
- Companies leaking big data troves onto the internet
"Binaryedge said it discovered almost 200,000 big data systems that were publicly addressable. Such systems were found running on a wide range of companies, from start-ups to Fortune 500 businesses."