pentester@scanner:~$ nmap -sV -sC 10.0.1.0/24 Starting Nmap 7.94 ( https://nmap.org ) Nmap scan report for 10.0.1.15 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 80/tcp open http nginx 1.24.0 443/tcp open ssl/http nginx 1.24.0 3306/tcp open mysql MySQL 8.0.35 8080/tcp open http-proxy Apache Tomcat 9.0.82 pentester@scanner:~$ nuclei -u https://target.example.com -severity critical,high [critical] CVE-2024-23897 Jenkins CLI arbitrary file read [high] CVE-2023-44487 HTTP/2 Rapid Reset DoS [high] exposed-git-directory /.git/config [critical] sql-injection /api/v1/users?id=1' OR '1'='1 pentester@scanner:~$ subfinder -d example.com -silent api.example.com staging.example.com dev.example.com mail.example.com vpn.example.com cdn.example.com admin.example.com pentester@scanner:~$ ffuf -u https://example.com/FUZZ -w wordlist.txt [Status: 200] [Size: 1234] /admin [Status: 200] [Size: 892] /api/swagger.json [Status: 403] [Size: 287] /server-status [Status: 200] [Size: 45] /.env [Status: 200] [Size: 12847] /backup.sql pentester@scanner:~$ testssl --severity HIGH target.example.com Testing protocols via sockets TLS 1.0 offered (NOT ok) TLS 1.1 offered (NOT ok) TLS 1.2 offered TLS 1.3 offered (OK) BEAST VULNERABLE -- but mitigated via session tickets POODLE not vulnerable (OK) Heartbleed not vulnerable (OK) CCS not vulnerable (OK) pentester@scanner:~$ sqlmap -u "https://target.example.com/api/users?id=1" --batch [INFO] testing connection to the target URL [INFO] testing 'AND boolean-based blind' [INFO] testing 'MySQL >= 5.0 AND error-based' [CRITICAL] parameter 'id' is vulnerable to SQL injection [INFO] the back-end DBMS is MySQL [INFO] fetching database names available databases [3]: [*] information_schema [*] app_production [*] analytics pentester@scanner:~$ dalfox url https://target.example.com/search?q=test [POC] Reflected XSS found: /search?q=<script>alert(1)</script> [VULN] DOM-based XSS via document.location [INFO] WAF detected: Cloudflare (bypassed) pentester@scanner:~$ katana -u https://example.com -d 3 -silent https://example.com/login https://example.com/api/v2/users https://example.com/dashboard https://example.com/uploads/config.bak https://example.com/.well-known/security.txt https://example.com/graphql pentester@scanner:~$ gitleaks detect --source . -v Finding: AWS Access Key Secret: AKIA**** File: config/deploy.yml:14 Rule: aws-access-key-id Finding: Slack Webhook Secret: https://hooks.slack.com/services/T**** File: .env.backup:7 Rule: slack-webhook-url pentester@scanner:~$ nmap -sV -sC 10.0.1.0/24 Starting Nmap 7.94 ( https://nmap.org ) Nmap scan report for 10.0.1.15 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 80/tcp open http nginx 1.24.0 443/tcp open ssl/http nginx 1.24.0 3306/tcp open mysql MySQL 8.0.35 8080/tcp open http-proxy Apache Tomcat 9.0.82 pentester@scanner:~$ nuclei -u https://target.example.com -severity critical,high [critical] CVE-2024-23897 Jenkins CLI arbitrary file read [high] CVE-2023-44487 HTTP/2 Rapid Reset DoS [high] exposed-git-directory /.git/config [critical] sql-injection /api/v1/users?id=1' OR '1'='1 pentester@scanner:~$ subfinder -d example.com -silent api.example.com staging.example.com dev.example.com mail.example.com vpn.example.com cdn.example.com admin.example.com pentester@scanner:~$ ffuf -u https://example.com/FUZZ -w wordlist.txt [Status: 200] [Size: 1234] /admin [Status: 200] [Size: 892] /api/swagger.json [Status: 403] [Size: 287] /server-status [Status: 200] [Size: 45] /.env [Status: 200] [Size: 12847] /backup.sql pentester@scanner:~$ testssl --severity HIGH target.example.com Testing protocols via sockets TLS 1.0 offered (NOT ok) TLS 1.1 offered (NOT ok) TLS 1.2 offered TLS 1.3 offered (OK) BEAST VULNERABLE -- but mitigated via session tickets POODLE not vulnerable (OK) Heartbleed not vulnerable (OK) CCS not vulnerable (OK) pentester@scanner:~$ sqlmap -u "https://target.example.com/api/users?id=1" --batch [INFO] testing connection to the target URL [INFO] testing 'AND boolean-based blind' [INFO] testing 'MySQL >= 5.0 AND error-based' [CRITICAL] parameter 'id' is vulnerable to SQL injection [INFO] the back-end DBMS is MySQL [INFO] fetching database names available databases [3]: [*] information_schema [*] app_production [*] analytics pentester@scanner:~$ dalfox url https://target.example.com/search?q=test [POC] Reflected XSS found: /search?q=<script>alert(1)</script> [VULN] DOM-based XSS via document.location [INFO] WAF detected: Cloudflare (bypassed) pentester@scanner:~$ katana -u https://example.com -d 3 -silent https://example.com/login https://example.com/api/v2/users https://example.com/dashboard https://example.com/uploads/config.bak https://example.com/.well-known/security.txt https://example.com/graphql pentester@scanner:~$ gitleaks detect --source . -v Finding: AWS Access Key Secret: AKIA**** File: config/deploy.yml:14 Rule: aws-access-key-id Finding: Slack Webhook Secret: https://hooks.slack.com/services/T**** File: .env.backup:7 Rule: slack-webhook-url

Everything your security team juggles, in one platform

Vulnerability scanning, infrastructure monitoring, phishing simulation, and incident response. Stop paying for ten tools. Stop losing context between them.

10-day free trial · No credit card · Helps meet SOC 2 · Used by security teams worldwide

Launch a Scan in Seconds

Enter a target, pick from 75 scanners, and launch. The pipeline resolves dependencies, isolates every tool in its own sandbox, and streams progress live.

metrictower.com/scans/new
Target
acme-corp.com
DOMAIN
Est. duration: 12m 45s 24 modules selected 4 phases Cost: 0.24 credits
Modules
Recon (11)
Discovery (7)
Crawling (3)
Enumeration (5)
Vulnerability (13)
Web App (5)
Audit (11)
AI Analysis (3)
Launch Scan

Monitor Everything, Continuously

Not just uptime pings -- full infrastructure monitoring with intelligent alerting across 8 monitor types.

Uptime & Health Checks

metrictower.com/monitoring/uptime
Status Name Target Response Uptime Last Check
Production API https://api.acme-corp.com/health 142ms 99.98% 30s ago
Marketing Site https://acme-corp.com 287ms 99.95% 30s ago
Staging Environment https://staging.acme-corp.com 1850ms 98.5% 1m ago
Legacy App https://legacy-app.com 0ms 94.2% 30s ago

DNS & Domain Expiry

metrictower.com/monitoring/dns
Domain Registrar Expiry Days Left Status Last Checked
acme-corp.com Cloudflare 2027-03-15 342d Active 2 min ago
staging.acme-corp.com GoDaddy 2026-05-20 43d Active 5 min ago
legacy-app.com Namecheap 2026-04-18 11d Warning 1 min ago
old-marketing.io Route53 2026-04-02 -5d Expired 3 min ago

SSL Certificates

metrictower.com/monitoring/ssl
Domain Status Issuer Expires Days Left Last Checked
acme-corp.com Valid Let's Encrypt R3 2026-07-12 96d 1 min ago
api.acme-corp.com Valid DigiCert SHA2 2026-09-01 147d 3 min ago
staging.acme-corp.com Expiring Let's Encrypt R3 2026-04-22 15d 2 min ago
legacy-app.com Expired Comodo RSA 2026-03-28 -10d 5 min ago

Cron Job Monitoring

Monitor scheduled tasks with ping-based health checks. Know instantly when a cron job fails, runs late, or takes longer than expected.

Missed Run Detection

Cron expression or period-based scheduling with automatic missed-run alerts when expected pings do not arrive.

Duration Anomaly Detection

EWMA-based baseline tracking flags jobs that take significantly longer than their historical average.

Exit Code Tracking

Record success, failure, and non-zero exit codes. Explicit /fail endpoint for jobs that detect their own errors.

Integration Snippets

Copy-paste snippets for cURL, Python, PHP, Laravel, Kubernetes CronJobs, and GitHub Actions.

DNS Blocklist Monitoring

metrictower.com/monitoring/blocklist
Target Status Listed On Last Checked
mail.acme-corp.com Clean 0 of 7 3 hrs ago
203.0.113.10 Listed 2 of 7 3 hrs ago
smtp.acme-corp.com Clean 0 of 7 6 hrs ago
198.51.100.25 Listed 1 of 7 3 hrs ago

CSP Violations

metrictower.com/monitoring/csp
Directive Blocked URI Document Source Time
script-src https://evil-cdn.example.com/inject.js https://acme-corp.com/blog inline 2 min ago
img-src https://tracker.ads.com/pixel.gif https://acme-corp.com/ img tag 15 min ago
connect-src https://unknown-api.io/collect https://acme-corp.com/app fetch 1 hr ago
frame-ancestors https://phishing-site.com https://acme-corp.com/login iframe 3 hr ago

Dead Man's Switch

Human presence verification for critical operations. If the designated owner fails to check in within the configured interval, encrypted payloads are automatically delivered to designated recipients through a 3-stage escalation.

Hybrid Check-in

Passive detection via web activity plus active check-in with password re-entry and optional MFA.

3-Stage Escalation

Reminder, warning, then triggered -- configurable timing at each stage with snooze and guardian vouch options.

Encrypted Payloads

SecureShare-encrypted payloads delivered to external recipients. Zero-knowledge -- even MetricTower cannot read them.

Guardian Support

Optional team member who can vouch that the owner is alive but unreachable, delaying delivery without accessing payloads.

Never Miss a Critical Alert

Escalation policies, on-call rotation, and 12 notification channels ensure the right person knows within minutes. Route findings to 9 ticketing systems automatically.

Smart Alert Routing

Route alerts by type and severity to the right channels. Configurable throttle intervals prevent notification fatigue during extended outages. Flapping detection suppresses noise from bouncing services.

Escalation Policies

Tiered alert chains ensure incidents get handled. If nobody acknowledges within the configured window, automatically escalate to the next responder in the chain.

12 Notification Channels

Slack, Teams, Discord, PagerDuty, OpsGenie, Datadog, SMS, Telegram, Google Chat, Pushover, ntfy, and Webhooks. PagerDuty and OpsGenie incidents auto-resolve on recovery.

Track Every Finding from Discovery to Fix

An 8-status lifecycle (open, triaged, in_progress, fixed, verified, closed, accepted_risk, false_positive) with cross-scan deduplication, SLA tracking, and assignment to team members. Route findings automatically to 9 ticketing systems including Jira, Linear, and GitHub Issues.

Explore Vulnerability Management
metrictower.com/findings
Severity Title Component Status Module CVSS
CRITICAL SQL Injection in /api/users/login api.example.com:443 Open sqlmap 9.8
HIGH Stored XSS in comment field example.com/blog Triaged dalfox 7.5
MEDIUM Missing CSP header example.com In progress http-headers 5.3
LOW Server version disclosure api.example.com Fixed httpx 2.1
metrictower.com/scans/…/compare/…
Scan Comparison
acme-corp.com · Apr 7 → Apr 14

3

New

5

Fixed

12

Unchanged

NEW

critical SQL injection in /api/v2/users
high Stored XSS in comment field
medium Missing CSP header

FIXED

critical RCE via file upload
high Outdated Apache Struts

Track Your Security Posture Over Time

Scan comparison diffs any two runs of the same target. Findings are matched by stable fingerprint, not line number, so you see exactly what's new, what's been fixed, and what hasn't changed. Every scan results page surfaces a "Changes since last scan" panel automatically. Scheduled scans auto-compare against their prior run.

The difference between a security snapshot and security intelligence.

Explore Scan Comparison
metrictower.com/analytics

Security Score

72/100

+5

Open Findings

34

-12

MTTR (Critical)

18h

-6h

SLA Compliance

89%

+3%

Severity Distribution

Critical
4
High
12
Medium
28
Low
18
Info
8

Data-Driven Security Posture

Composite security scores track your posture over time. Monitor mean time to remediate by severity, SLA compliance rates, and module coverage across every target. Identify gaps before attackers find them, and prove progress to stakeholders with exportable reports.

Explore Security Analytics

Test Your Team with Realistic Phishing Campaigns

40+ branded SaaS templates, full funnel analytics, and auto-enrollment in training when employees fail.

metrictower.com/phishing/campaigns

Q1 Security Awareness

Completed

Microsoft 365 Password Reset

Sent
150
|
Opened
98
|
Clicked
34
|
Submitted
12

Engineering Team Test

Active

Slack Workspace Invite

Sent
45
|
Opened
28
|
Clicked
8
|
Submitted
3

New Hire Assessment

Draft

DocuSign Document

25 targets

Security Awareness Training

Security Awareness, GDPR, and HIPAA courses with quizzes. Auto-assigned after phishing failures. Downloadable certificates and progress tracking with due dates.

Explore Training

Connects With Your Stack

Route findings and alerts to the tools your team already uses.

Jira
Linear
GitHub Issues
Slack
Discord
Microsoft Teams
PagerDuty
OpsGenie
Datadog
ServiceNow
SMS
Telegram
Webhooks

Helps Meet ISO 27001

Asset inventory, vulnerability management, security awareness training, and system testing.

Helps Meet SOC 2

Access controls, system monitoring, anomaly detection, and employee security training.

Helps Meet GDPR

Data protection assessments, employee training, and regular vulnerability scanning.

Helps Meet HIPAA

PHI safeguards, workforce training, breach risk assessments, and security controls.

Start Your 10-Day Free Trial

No credit card required. 75 scanners, infrastructure monitoring, phishing simulation, and alert escalation -- all from one platform.

10-day free trial. No credit card required.