Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape State of DDoS 2026 REPORT Free Certifications NEW
Research & Guides
Mirai Botnet Kill Switch Research memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners Managed Protection Whitelabel / Reseller Affiliate Program Pay with Crypto System Status
Legal & Support
Contact Us Security Trust Center Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs/MSSPs Small Operators Routers Edge Node Defense
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services Compliance

Exposure Scanning

On-demand and scheduled vulnerability scans: open ports, amplification risk, TLS/SSH hardening, and 10 active CVE checks

Overview

Exposure Scanning performs automated security assessments of your nodes directly from the Flowtriq agent. Each scan runs locally on the monitored server, meaning results reflect the actual attack surface visible to the internet — not a remote probe's view through network filtering.

Scans cover 7 categories with 40+ individual checks, including 10 CVE-specific checks sourced from the NIST NVD and CISA Known Exploited Vulnerabilities (KEV) catalog.

Scan Categories

CategoryWhat is checked
Open PortsAll listening TCP/UDP ports, identifying unnecessary exposure (e.g. databases, admin UIs open to 0.0.0.0)
Amplification RiskUDP services that can be used for amplification attacks: DNS (53), NTP (123), Memcached (11211), SSDP (1900), CharGen, TFTP
TLS / SSLCertificate validity and expiry, protocol versions (SSLv3/TLSv1.0/TLSv1.1 flagged), weak ciphers, HSTS, OCSP stapling
SSH HardeningRoot login enabled, password auth enabled, port 22 open, weak kex algorithms, CBC cipher modes
HTTP Security HeadersMissing X-Frame-Options, X-Content-Type-Options, Content-Security-Policy, Referrer-Policy, Permissions-Policy, HSTS
System ConfigurationIP forwarding, ICMP redirects, source routing, kernel hardening sysctl values
CVE Checks10 active CVE checks for software versions detected on the system (see below)

CVE Checks

Flowtriq checks for 10 actively exploited or high-impact CVEs sourced from NIST NVD and the CISA KEV catalog. The scanner detects installed software versions and flags matches:

CVEAffected SoftwareSeverity
CVE-2021-44228Log4Shell (Apache Log4j 2.x)Critical
CVE-2021-45046Log4j 2.x (bypass of 44228 fix)Critical
CVE-2022-0847Dirty Pipe (Linux kernel < 5.16.11)High
CVE-2021-4034PwnKit (polkit pkexec)High
CVE-2023-44487HTTP/2 Rapid Reset (nginx/Apache)High
CVE-2024-3094XZ Utils backdoor (liblzma 5.6.0-5.6.1)Critical
CVE-2023-23397Microsoft Outlook NTLM relayCritical
CVE-2024-21762Fortinet FortiOS SSL-VPN RCECritical
CVE-2025-24813Apache Tomcat partial PUT RCECritical
CVE-2026-41940cPanel WHM API authentication bypassCritical
CVE detection identifies vulnerable software versions. It does not attempt exploitation. Results are informational; verify findings against your specific patch level before acting.

Running a Scan

Go to Dashboard → Exposure and click Run Scan on any node. Scans take 30–90 seconds depending on the number of open services.

Scheduled Scans

Configure automatic rescans on a schedule from the Exposure dashboard:

  • Schedules available: every 6 hours, 12 hours, 24 hours, 48 hours, or weekly
  • Results are stored per-node with full history
  • Alert notification fires when new findings appear (configurable per severity)

Alert Notifications

When a scheduled scan finds new issues not present in the previous scan, Flowtriq sends an alert to all configured channels. Alert payload includes:

  • Node name and scan timestamp
  • Count of new findings by severity (critical, high, medium, info)
  • Top 3 new findings with description and remediation link

Findings Format

Each finding includes:

FieldDescription
severitycritical / high / medium / info
categoryScan category (e.g. amplification_risk, tls, cve)
titleShort description of the finding
detailTechnical detail (e.g. service version, port number, CVE ID)
remediationSuggested fix or hardening action

Scan Safety

All checks are passive reads or loopback-only probes — no exploit attempts, no outbound scanning, and no modification of system state. The scan will not disrupt running services. It is safe to run in production at any time.