Your Competitors Can See Your Attack Surface. Can You?
Right now, anyone with a basic security tool and your company's domain name can see your internet-facing infrastructure, exposed services, and leaked credentials. The question is whether you can see it too.

Right now, anyone with a basic security tool and your company's domain name can see your internet-facing infrastructure, your exposed services, your SSL configuration, and in many cases your leaked credentials. Your competitors know this. Your insurers know this. Attackers definitely know this. The question is whether you do.
Here is an experiment you can run right now. Open a browser. Type your company's domain into Shodan, Censys, or any of the dozens of publicly accessible internet scanning databases. Within seconds, you will see a detailed map of every IP address, open port, web service, SSL certificate, and network device associated with your domain that is accessible from the internet.
This is not a security research tool. It is publicly accessible information that anyone can query, for free, with no authentication and no technical skills. Every attacker who targets your company starts here. So does every cyber insurance underwriter who is about to quote your renewal. So do your competitors, if they want to understand your technical infrastructure. So do the hackers who are right now running automated scans of every domain on the internet, looking for the path of least resistance.
The question is not whether this information is available. It is. The question is whether you know what it says.
What the Outside World Can See About Your Organisation
The external view of your organisation, what is sometimes called your external attack surface, is more detailed than most people expect. Here is a category-by-category breakdown of what is visible from the internet about any company with a web presence:
Your Internet-Facing Infrastructure
Every server, cloud instance, load balancer, and network device that has an internet-accessible IP address is visible in public scanning databases. This includes things your IT team knows about, your main website, your email server, your VPN gateway, and things they may not: old development servers, forgotten test environments, cloud resources provisioned by a developer three years ago and never taken offline.
The average organisation has 30% more internet-facing assets than its IT team is aware of. Each of those unknown assets is potentially unpatched, unmaintained, and outside the scope of your security controls, but it is visible to anyone scanning your IP ranges.
Your Open Ports and Services
Every open port on every internet-facing server is visible. More importantly, the service running on each port is often identifiable, not just "something is running on port 22" but "OpenSSH version 7.4 is running on port 22." That version number is exactly what an attacker needs to look up whether there are known vulnerabilities in that specific version and whether public exploits exist for them.
Common services visible in external scans that organisations frequently do not expect:
- RDP (Remote Desktop) on port 3389, intended for internal use but accidentally left internet-facing
- Admin panels on non-standard ports (8080, 8443, 9090), test environments, CI/CD tools, monitoring dashboards
- Database ports (3306 for MySQL, 5432 for PostgreSQL, 27017 for MongoDB), sometimes exposed due to misconfigured cloud security groups
- FTP and legacy file transfer services, often left running on infrastructure that nobody remembers to decommission
Your SSL Certificates, And What They Reveal
SSL certificate transparency logs are public by design, they were created to help browsers verify that certificates are legitimate. As a side effect, they are also a complete historical record of every SSL certificate ever issued for every domain and subdomain associated with your organisation.
This is useful for attackers because subdomains often reveal internal infrastructure: `dev.yourcompany.com`, `staging.yourcompany.com`, `admin-portal.yourcompany.com`, `vpn.yourcompany.com`. Certificate transparency logs surface these even when the subdomains are not linked from your main website. Attackers use certificate transparency data specifically to discover subdomains, and then scan those subdomains for vulnerabilities.
Your Email Configuration
Your email security configuration, SPF, DKIM, and DMARC DNS records, is publicly queryable. An attacker can determine in seconds whether your domain is susceptible to email spoofing (someone sending an email that appears to come from your domain). A missing or misconfigured DMARC record is an invitation to business email compromise attacks using your brand.
Your Software Versions
Web servers, CMS platforms, and many other web-facing applications reveal their software version in HTTP response headers or in predictable URL patterns. A WordPress site typically reveals its version number in multiple locations. A web server often announces whether it is Apache or Nginx, and which version. This information tells an attacker exactly which known CVEs apply to your systems.
Your Leaked Credentials
Dark web breach databases, stealer log repositories, and paste sites are not fully public in the same way as port scanning data, but they are accessible to anyone willing to pay for access, which costs as little as $10 per month. These databases contain email addresses and passwords associated with your domain from every third-party breach, every infostealer malware infection, and every phishing campaign that has ever targeted your employees.
This information is available to attackers. It should also be available to you.
The visibility asymmetry: The average attacker, the average cyber insurance underwriter, and the average enterprise security team all have significantly more information about your external attack surface than your internal security team does, unless you actively monitor it. This is the asymmetry that external attack surface management is designed to correct.
What Attackers Do With This Information
Understanding what is visible is only useful if you understand what an attacker does with it. The typical attack lifecycle for an opportunistic attacker (the most common type, not a nation-state APT, just someone running automated scans looking for easy targets) looks like this:
Step 1, Reconnaissance (Minutes): Automated tools query certificate transparency logs, DNS records, and port scanning databases to build a complete picture of your external infrastructure. This takes minutes and requires no technical skill, the data is pre-indexed and searchable.
Step 2, Vulnerability Identification (Hours): Software versions discovered in step 1 are cross-referenced against CVE databases. Open ports are probed to confirm service versions. The attacker now has a list of potential entry points ranked by known exploitability.
Step 3, Credential Collection (Hours to Days): Domain email addresses are queried against breach databases. Credential stuffing attacks test commonly-used password patterns against exposed services. High-value accounts (IT staff, executives, finance) are prioritised.
Step 4, Exploitation or Sale (Days to Weeks): If a working entry point is found, an exploitable vulnerability, a working credential, an accessible admin panel, the attacker either exploits it directly for their goal (ransomware, data theft) or sells authenticated access to an initial access broker who will sell it to a ransomware group.
The Competitive Intelligence Dimension
Attackers are not the only ones looking. Sophisticated competitors, prospective acquirers, and due diligence firms routinely conduct external security assessments of organisations they are evaluating. What they find shapes their perception of your technical maturity, your operational rigour, and ultimately your valuation.
A prospective enterprise customer conducting vendor security due diligence before awarding a contract will check your external attack surface. A PE firm assessing a potential acquisition will commission an external technical review. An enterprise sales prospect who finds an expired SSL certificate, an outdated CMS version, and three employees' credentials in a breach database will have a very specific view of your organisation's security culture, regardless of what your security questionnaire says.
Your external attack surface is not just a security issue. It is a business development issue, a due diligence issue, and an enterprise sales issue. The organisations that win enterprise deals against better-funded competitors often win partly on the strength of their security posture evidence, because enterprise buyers are increasingly sophisticated about the vendor risk they are taking on.
Seeing What They See
The most important first step is seeing your external attack surface from the outside, not from inside your network, not from the perspective of an admin who knows how everything is supposed to be configured, but from the perspective of someone who has only your domain name and the publicly available internet.
This is not a complex technical exercise. External attack surface platforms like CyberInsights automate this process: you provide your domain, and within minutes you have a comprehensive view of every internet-facing asset, open port, SSL certificate status, software version, and credential exposure associated with your domain. The results are often surprising, not because your security team has been negligent, but because the internet-facing footprint of any growing company accumulates faster than anyone tracks it.
From Reactive to Proactive: The Visibility Shift
Most organisations find out about external attack surface exposures one of three ways: a security researcher discloses them responsibly, a cyber insurance renewal surfaces them in underwriting, or an incident investigation reveals them after a breach. All three of these routes are reactive, the exposure existed before you knew about it, and the question is only how much damage was done in the meantime.
The alternative is continuous external monitoring: knowing what your attack surface looks like at any given moment, being alerted when it changes (a new subdomain appears, a new vulnerability is disclosed affecting your software versions, a credential appears in a dark web dataset), and being able to act before an attacker does.
The attacker's advantage is that they are continuously scanning. The defender's disadvantage has historically been that they scan occasionally, if at all. Continuous external monitoring levels that playing field, not by making your systems impenetrable, but by ensuring that what an attacker can see about you is also something you can see about yourself, and that you see it first.
The Bottom Line
The asymmetry at the heart of external attack surface management is simple: the people who want to do you harm, assess you for risk, or evaluate you as a business partner already have access to your external attack surface data. The only question is whether you do too.
Closing that asymmetry does not require a large security team, a significant budget, or a complex technical programme. It requires knowing where to look and establishing a continuous habit of looking. Everything else, the remediation, the monitoring, the reporting, follows naturally from having that visibility. Without it, you are managing a risk you cannot see, against adversaries who can see it perfectly.
Frequently Asked Questions
What can attackers see about my organisation online?
Attackers can see every internet-facing IP address, open port, running service (including specific software versions), SSL certificate, subdomain, email authentication configuration, and in many cases leaked employee credentials associated with your domain. This information is indexed in publicly accessible databases like Shodan and Censys, queryable by anyone with no authentication required. Certificate transparency logs reveal your full subdomain history, and dark web breach databases contain employee email/password combinations from third-party breaches. All of this is available before an attacker sends a single packet to your network.
What is an external attack surface?
Your external attack surface is the total collection of internet-facing assets, services, and data exposures associated with your organisation that are visible and potentially accessible from outside your network. This includes web servers, cloud instances, APIs, email servers, VPN gateways, subdomains, open ports, SSL certificates, DNS records, and any leaked credentials tied to your domain. It is the complete picture of what an outsider can discover about your technical infrastructure using publicly available tools and data sources.
How do I discover unknown internet-facing assets?
Run an external attack surface scan using your primary domain as the starting point. The scan will enumerate subdomains via certificate transparency logs and DNS records, identify all associated IP addresses, probe for open ports and running services, and cross-reference your domain against dark web breach databases. This automated process typically completes in minutes and consistently reveals assets that internal IT teams did not know were internet-accessible, including forgotten development servers, legacy test environments, and cloud resources provisioned outside standard processes.
Why do organisations have more assets than they think?
The average organisation has 30% more internet-facing assets than its IT team tracks. This gap grows over time as developers provision cloud resources for projects that end but the infrastructure remains, marketing teams register campaign domains that are never decommissioned, acquisitions bring in infrastructure that is never fully inventoried, and employees deploy shadow IT tools with internet-facing components. Each unknown asset sits outside your patching schedule, your monitoring scope, and your security controls, while remaining fully visible to anyone scanning your IP ranges.
Ready to see Scrutex in action?
Sign up free or book a live demo. Most teams are up and running in under 10 minutes.