Skip to main content

Tags

A tag is a label we add to scan data to help you quickly identify areas within your network that might require attention. We add tags to:

  • IP addresses and domains we suspect are private and not intended for the public internet. For example, if we find a domain with a term like laptop, we add a personal device tag.

  • Services when we identify that they’re potentially vulnerable, such as those that could enable remote access into your networks.

  • Origins to help you understand how a network connects to the internet.

  • Vulnerabilities to help you identify which pose the highest threats to your organization.

IP address and domain tags

To determine whether IP addresses and their domains are likely meant to be private, we use forward and reverse DNS lookups, compare domain names against keywords, and then assign tags as appropriate:

TagDescription
Personal deviceLikely associated with a device for a specific individual, because the domain includes terms such as iphone, Macbook, or laptop.
Dev environmentLikely used for development, staging, or testing purposes.
Code repositoryLikely associated with source code, because the domain includes terms such as git, repo, or bitbucket.
Internal nodeIP address without a domain.

To filter by tag for IP addresses, navigate to the IP addresses page and select Filters from the IP addresses table. Next, choose IP address tags and the tag to use as a filter.

For domains, navigate to the Attack surface page, select Filters from the Domain table. Next choose Domain tags and the tag to use as a filter.

Origin category tags

An origin is an organization that holds the rights to an IP address and connects it to the internet. Typically, it is the organization associated with the Autonomous System Number (ASN) for the network the IP address is in.

To determine the type of organization that connects an IP addresses to the internet, we compare the ASN of network the IP address is in against a list of predetermined ASNs, ASNs for cloud providers, and names of organizations from your hierarchy. Next we assign the a category:

CategoryDescription
CloudConnect through a cloud service provider such as Amazon or Digital Ocean.
In-houseConnect through the root organization or one of its descendant organizations.
OtherConnect through a vendor or other provider.

To filter by origin categories, navigate to the Networks page and select Filters from the Networks table. Next, select Origin category tag and the category to use as a filter.

Service tags

To determine whether services are potentially vulnerable, we compare the service and product names against keywords, and then assign tags as appropriate:

TagDescription
DatabaseLikely a database because the name includes terms such as Postgres, Sql, or Redis.
Branded servicesPublished by a high-value brand, company, or vendor, such as Microsoft or Oracle, making it highly visible to attackers and more likely for them to target.
Remote accessEnables remote access to its host or other hosts in the network, such as rdp and ssh.
Known active exploitIncludes a vulnerability in the U.S. Cybersecurity & Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog. The catalog lists vulnerabilities your organization should immediately address because they meet specific criteria, including being exploited by threat actors and causing damages to victims, or on highly available and highly distributed systems like Microsoft Internet Information Services or a Remote Authentication Dial-In User Service (RADIUS) server.

To filter by tag for services, navigate to the Services page and select Filters from the Services table. Next, choose Service tags and the tag to use as a filter.

Vulnerability intel tags

To determine the type of threats associated with the vulnerabilities found for service, product, and version combinations in your networks, we use industry measures such as the Known Exploited Vulnerabilities (KEV) catalog, Exploit Prediction Scoring System (EPSS), and the Common Vulnerability Scoring System (CVSS).

For more information about the industry measures we reference, see CVE program.

TagDescription
Known active exploitListed in the KEV catalog. The catalog lists vulnerabilities your organization should immediately address because they meet specific criteria, including being exploited by threat actors and causing damages to victims or on highly available and highly distributed systems like Microsoft Internet Information Services or a Remote Authentication Dial-In User Service (RADIUS) server.
Predicted exploitHas an EPSS score greater than 0. The EPSS score, ranging from 0 to 1 (0 to 100% exploitation chances), estimates the probability that a threat actor will exploit a vulnerability within the next 30 days.
Imminent threatHas an EPSS score greater than 0.9. For more information, see Exploit Prediction Scoring System (EPSS).
Remote exploitIs remotely exploitable according to the metrics used to determine its CVSS score. The CVSS assesses the severity of vulnerabilities and assigns scores to them using a formula that measures the ease and impact of exploitation.

To filter by tag for vulnerabilities, navigate to the Vulnerabilities page and select Filters from the Vulnerabilities table. Next, select Vulnerability tags and the tag to use as a filter.