Note for Individual Researchers & Pentesters: Our Pro tier is specifically designed for organizations and teams. If you’re an individual researcher or pentester, we recommend sticking with our Free tier while we actively develop more individual-focused features. We believe in being transparent - if a feature you need isn’t available in the Free tier yet, our open-source tools might be a better fit for now. We’re working hard to expand our Free tier capabilities!

FeatureFreeProEnterprise
Monthly Domain Discovery10100Custom limit
Vulnerability ScanningNot available1,000 unique assetsCustom limit
Template AccessPublicPublicPublic + Real-time auto scan
API Access
Reporting-
ReconnaissanceBasicAdvancedCustom
Vulnerability AI Automation1000 per month1000 per monthCustom limit
Port ScanningTop 10Full RangeFull Range
Internal Network Scanning--
Retention Policies30 days1 yearCustom
User Seats1Up to 10Custom
Team Workspaces12Custom
Auto Vulnerability Retest-
Auto Vulnerability Regression-
Vulnerability Scan Logs-
SSO/SAML-Add on
RBAC-AvailableAvailable
Team Audit Logs--
Integrations-
Account Management--Dedicated TAM
PricingFree$2,500/year + Add onCustom Quote

Getting Started

  1. Free Plan: Start Now - No credit card required
  2. Pro Plan: Upgrade to Pro - Instant access to hosted vulnerability scanning capabilities.
  3. Enterprise: Contact Sales - Custom solution design

Frequently Asked Questions

Q: How is our billing structured and managed?

  • Free Tier: Sign up and use basic features forever - no credit card needed.
  • Professional Plan: $2,500/year. Automated billing with usage reports.
  • Enterprise: Customized billing arrangements including volume-based pricing, multi-year agreements, and flexible payment schedules aligned with your fiscal planning.

Q: What payment methods and billing processes do you support?

  • Professional Plan: All major credit cards, automated recurring billing with detailed invoices and usage metrics.
  • Enterprise: Comprehensive payment options including wire transfer, purchase orders, ACH/direct debit, and custom contract arrangements.

Q: How do you calculate and track asset usage?

  • Each unique hostname/IP:port combination counts as one distinct asset
  • We do not count additional quota of the same asset within a billing cycle
  • Usage dashboard under settings provides real-time visibility into asset consumption

Q: What security certifications and compliance standards do you maintain?

Visit our Trust Center for detailed information about our security practices and certifications:

  • SOC 2 Type II certified with annual audits
  • Regular penetration testing
  • Enterprise customers receive access to our security documentation portal including:
    • Audit reports
    • Security questionnaire responses
    • Compliance certifications
    • Security documentations

Need more detailed information about our enterprise capabilities? Contact our sales team for an in-depth technical discussion and custom solution design.