VigilantAI
External Exposure Report
Generated: Apr 25, 2026
Target: example.com
example.com · April 2026
Your external security posture has been assessed
Risk Level
MediumExposure Score
60/100
80%
AI Confidence
14
Services exposed
3
Issues identified
What this means
Your internet-facing systems are reachable and should be reviewed. This does not mean you are compromised — it means your exposure should be tightened to reduce risk.
Business impact
- •Moderate risk of unauthorized access if left unaddressed
- •Some services are visible to external automated scanners
- •Improvements recommended before next audit or insurance renewal
Top risks identified
HIGHSNMP (port 161) is exposed
Why it matters
This can reveal internal device information and configuration to anyone on the internet.
What to do
Block SNMP access from the public internet. Allow only trusted internal networks.
MEDIUMDNS (port 53) is exposed
Why it matters
Misconfigured DNS can be abused for amplification attacks or data exposure.
What to do
Restrict access or harden configuration if intentionally public.
MEDIUMPublic web services detected (ports 80, 443, 8080, 8443)
Why it matters
These are common entry points. Security depends on patching and proper configuration.
What to do
Enforce HTTPS, update software, and restrict unnecessary ports.
What to fix first
1Restrict DNS access (port 53)~10 minutes
2Redirect HTTP to HTTPS (port 80)~5 minutes
3Re-scan to confirm improvement~1 minute
Verification — what changed
Risk improved by 30 points
Remediation is working. Continue monitoring for new changes.
Before
60
Score before fixes
After
30
Score after fixes
Result
−30
Risk reduction
Want to reduce this risk?
Apply the fixes above and run a follow-up scan to verify improvement.
Generated by VigilantAI · getvigilantai.com
This report is a point-in-time external snapshot. It does not include internal systems or authenticated testing.
