LogoLogo
APISupportDashboard
  • Welcome
  • Platform
    • Platform Overview
    • Getting Started Guide
    • Discovery
      • Domain Discovery
      • Network Discovery
      • Discovered Assets
    • Targets
      • Scan Policies
      • Add-on Services
      • Tags & Filtering
        • Default Tags
      • Managing Targets
      • Scan Configuration
    • Issues
      • Vulnerability Management
      • Issue Settings
    • Risk
    • Technology
    • Firewalls
      • Ports
      • HTTP Servers
      • DNS Records
    • Websites
      • Certificates
      • Scripts
      • Cookies
      • Headers
      • Forms
      • Links
      • Downloads
      • Traffic Hosts
      • Meta Tags
      • Pages
    • Reports
    • Events
      • Event Rules
      • Event Types
    • PCI Compliance
    • Automations
      • Target Automations
      • Asset Automations
      • Target Issue Automations
    • Projects
      • Penetration Testing
      • Other Projects
  • Integrations
    • Discovery Integrations
      • Azure
      • Google Cloud
      • AWS
      • Cloudflare
      • Linode
      • Akamai
      • Oracle Cloud Infrastructure
      • F5
      • GoDaddy
      • Wiz
      • HTTP
    • Workflow Integrations
      • Slack
      • Google Chat
      • Jira
      • PagerDuty
      • Splunk
      • AWS
      • Vanta
      • Microsoft Teams
      • ArmorCode
      • Zapier
        • Slack (via Zapier)
        • Jira (via Zapier)
        • Service Now (via Zapier)
    • Feeds
      • Using Feeds with Google Sheets
    • API
    • Webhooks
  • Account
    • Account Overview
      • Account Security
    • Users
      • Roles & Permissions
Powered by GitBook

© 2024 Halo Security

On this page
  • Use Cases
  • Detection
  • Risk
  • Reports

Was this helpful?

  1. Platform
  2. Websites

Traffic Hosts

View which hosts transmit data when accessing your site.

PreviousDownloadsNextMeta Tags

Last updated 16 days ago

Was this helpful?

The Traffic Hosts section shows you which hosts were observed transmitting data while crawling your site.

Use Cases

  • Discover where traffic is coming from. It may be difficult to recognize every host that is identified on this list, but if you see a lot of traffic being generated outside of your region or continent it may warrant a deeper inspection.

Detection

The scanner logs all network connections that are made while crawling the website and records the host information.

Risk

No risk is associated with Traffic Hosts.

Reports

  • : View hosts that are generating traffic and any applications associated with them.

  • : List all hosts found and their scope status and extended details.

  • : List of traffic hosts per target

  • : View changes in traffic hosts between current and previous scans.

Overview
Summary
List
Changes