FortWatch

Automated Asset Discovery

Find what you didn't know you had. Auto-detect subdomains, services, technologies, and shadow IT across your infrastructure.

Discovered assets

73 new this week · 412 total

Export list
  • api.example.com

    NginxCloudflareNode.js
    New
  • staging-v2.example.com

    NginxReactNode.js
    New
  • forgot.example.com

    ApachePHP 7.4MySQL
    Shadow IT
  • legacy-crm.example.com

    IISASP.NETMSSQL
  • cdn-eu.example.com

    CloudflareHTTP/2Brotli
  • portal.example.com

    NginxDjangoPostgres
    Findings: 3

Subdomain enumeration

Automatically discover all subdomains associated with your root domains. Find forgotten staging servers, legacy apps, and shadow IT before attackers do.

  • Automated subdomain discovery from multiple data sources
  • DNS resolution and validation of discovered subdomains
  • Continuous monitoring for newly created subdomains

Technology detection

Know exactly what's running on every asset. FortWatch identifies frameworks, servers, CMS platforms, and third-party services automatically.

  • Web Frameworks:React, Angular, Vue, Django, Rails, Express, and more
  • Web Servers:Nginx, Apache, IIS, Caddy — with version detection
  • CMS Platforms:WordPress, Drupal, Joomla, and their plugin ecosystems
  • Analytics & Marketing:Google Analytics, Tag Manager, HubSpot, and tracking scripts

Service fingerprinting

Detect running services and their versions across all open ports. Know exactly what's exposed to the internet and whether it's up to date.

  • Service detection across all discovered open ports
  • Version identification for known services (SSH, FTP, SMTP, etc.)
  • Banner grabbing and protocol analysis
FortWatch risk score dashboard with prioritized findings list and severity breakdown
FortWatch compliance overview showing device inventory, in-compliance count, and data usage trends
FortWatch AI assistant explaining security findings with suggested prompts for critical CVEs and severity rationale

CDN & WAF detection

Identify which assets are protected by CDNs and web application firewalls, and which are directly exposed to the internet.

  • Detect Cloudflare, AWS CloudFront, Akamai, and other CDN providers
  • Identify WAF presence and provider (Cloudflare, AWS WAF, ModSecurity)
  • Flag unprotected assets that lack CDN or WAF coverage

Complete asset inventory

Build a comprehensive inventory of everything in your infrastructure. Know what you have, what it runs, and how it's exposed.

  • Unified view of all domains, subdomains, and IP addresses
  • Technology stack summary for every asset
  • Automatic updates as new assets are discovered

Frequently asked questions

Answers to the most common questions about asset discovery, subdomain enumeration, and shadow IT.

How does FortWatch discover subdomains?+

FortWatch combines multiple passive and active techniques to enumerate subdomains: certificate transparency logs, public DNS datasets, search-engine indexes, reverse DNS, NSEC/NSEC3 walking where applicable, and brute-force resolution against curated wordlists. Every candidate is then validated with live DNS resolution and HTTP probing so your inventory only contains subdomains that actually exist and respond.

Will FortWatch catch shadow IT that my team set up without telling security?+

That's exactly the problem asset discovery solves. Marketing spins up a landing-page subdomain, an engineer ships a staging environment on a personal cloud account, a contractor provisions a tool on your root domain — FortWatch surfaces these the next time certificate transparency or passive DNS sees them. You get a feed of newly discovered assets with provenance, so you can decide whether to take them over, secure them, or shut them down.

How often does FortWatch re-discover assets?+

Continuously. Discovery runs on a schedule per root domain, and passive sources (certificate transparency, DNS telemetry) are monitored in near real time for new hostnames. When a new subdomain appears, it's added to your inventory, fingerprinted, and queued for vulnerability scanning — usually within minutes of the underlying change.

Can FortWatch discover cloud assets like S3 buckets, Azure blobs, and exposed storage?+

Yes. In addition to DNS-based discovery, FortWatch looks for cloud-hosted assets linked to your domains and brand: S3 buckets, Azure storage endpoints, Google Cloud Storage buckets, and other common cloud surfaces. These are fingerprinted, checked for public exposure, and flagged when they accept anonymous access or list contents.

Does FortWatch scan GitHub and public code for leaked assets or secrets?+

FortWatch watches public code and paste sites for references to your domains, subdomains, and identifiers. When a new repository or gist mentions your infrastructure, it's linked to the relevant asset so you can investigate leaked credentials, exposed internal hostnames, or code referencing shadow systems before attackers find them.

Which data sources does FortWatch use for discovery?+

Certificate transparency (CT) logs, passive DNS datasets, public DNS zone files, search engines, reverse DNS lookups, WHOIS and RDAP records, ASN ranges, cloud provider metadata, and active DNS brute-forcing with curated wordlists. The combination matters — no single source is complete, and attackers use all of them, so FortWatch does too.

How accurate is the discovered inventory? Will I get a lot of false positives?+

Every discovered host is validated before it lands in your inventory: DNS must resolve, and the host must respond on at least one protocol. Wildcard DNS is detected and filtered so a single wildcard record doesn't inflate your inventory with thousands of phantom subdomains. You can also mark assets as out of scope, and FortWatch will suppress them on future discoveries without forgetting they exist.

Can I exclude specific subdomains or IP ranges from discovery?+

Yes. You can mark any discovered asset as out of scope, exclude entire subdomain patterns, or restrict discovery to specific IP ranges and ASNs. Excluded assets are still tracked so you see them on the inventory, but they're skipped for active probing and vulnerability scanning until you bring them back in scope.

Ready to secure your stack?

Secure your entire stack today

Start scanning in under 5 minutes. No credit card required. 14-day free trial included.