Report Unwanted Scanning
What to do if somebody uses Attaxion to scan your assets without proper authorization
Attaxion scans internet-facing assets including domains, IP addresses, as well as ports to map the attack surfaces of organizations.
Here’s what you need to know if you notice that someone uses Attaxion to scan your organization’s assets and may not have the proper authorization.
It Is Not a Security Concern
During scanning, Attaxion doesn’t collect any personal information, log in or attempt to log in into any services, or gain unauthorized access to systems by any other means.
To populate asset databases, Attaxion uses only publicly and officially available information obtained using a list of benign scanning techniques.
Attaxion doesn’t use payload-based vulnerability scanning, so it cannot inflict any damage.
Proof of Ownership Is Confirmed by User Consent
To ensure Attaxion is used responsibly, users are required to confirm that they have the right to scan the assets they add.
When adding a root asset, users must explicitly acknowledge and agree that they own or are authorized to assess the asset by selecting a consent checkbox.
Attaxion relies on this user-provided confirmation and expects all users to act in accordance with applicable laws and organizational policies.
If consent is not provided, scanning will not proceed.
How to Report Unauthorized Scans
If you notice that your organization’s assets are being scanned by Attaxion without proper authorization, you can report it to us.
To do so, please contact our service desk and provide information about the assets you want Attaxion to avoid scanning.