Networks
From the Networks page, view the networks we identified for your organization and determine where to focus your efforts to reduce vulnerabilities.
Networks table
The Networks table includes the IP address ranges we identified for your organization, and details such as how many IP addresses and ports are active within them. It also includes the origin for each. An origin is an organization that holds the rights to an IP address and connects it to the internet.
Use the information to narrow the scan results for your organization and identify where to focus your efforts. For example, filter the table to only include in-house networks with one or more vulnerabilities and then group the results based on origin to determine which organizations in your hierarchy hold the rights to the IP addresses in the networks.
We recommend sorting and filtering the data to find individual actions that will reduce or eliminate large numbers of vulnerabilities. For example, updating networks used for development so they're only accessible through a virtual private network (VPN).
For information about table options, see Tables.
Columns and filters
-
To add or remove information in the table, select Columns and choose the columns to view.
-
To view and manage networks that meet specific criteria, such as those with more than one vulnerability, select Filters and then select how to narrow the data.
Name | Description |
---|---|
Network | Range of IP addresses associated with one or more organizations within your root organization's hierarchy. |
Origin | Organization that holds the rights to the IP addresses in the network and connects them to the internet. Typically, it is the organization associated with the Autonomous System Number (ASN) for the network. |
Origin category tag | Type of connection the IP addresses in the network have to the internet. For details, see Tags. |
Autonomous system number (ASN) | Unique identifier associated with the organization that holds the rights to the IP addresses in the network and connects them to the internet. Regional internet registries (RIRs) assign identifiers to the networks of large organizations. |
IP address count | Number of active IPv4 and IPv6 addresses within the network. If an IP address is in more than one network, we include each network in the count. |
Port count | Number of open ports identified for each active IP address in the network, including ports in the system, registered, and private ranges. |
Vulnerability instance count | Number of vulnerability instances found across all the IP addresses in the network. An instance is a vulnerability with a CVE number related to a service, product, and version combination on an open port. If there are multiple instances of a combination running on multiple ports, we count the vulnerabilities for each port as additional instances. Note that the value in this column might not match any totals in the Vulnerabilities table it links to because of the way the vulnerabilities are dispersed across IP addresses and ports. For details, see Vulnerability instances. |
Organization count | Number of organizations within your root organization's hierarchy with rights to the network or one or more domains the network uses. |
Organization | Filter for finding networks associated with an organization from your hierarchy. |