Skip to Content

Troubleshooting

This page covers common issues you may encounter with Surface Monitoring and how to resolve them.

Discovery Issues

Subdomains Not Being Found

Surface Monitoring uses Certificate Transparency logs, DNS enumeration, and brute-forcing to discover subdomains. Some subdomains may not be found if:

  • No DNS records exist: Subdomains that have been removed from DNS or never had public DNS records cannot be discovered through DNS-based methods.
  • No certificates issued: Subdomains that do not have SSL/TLS certificates will not appear in Certificate Transparency logs. Internal-only subdomains that use private CAs are not logged in public CT.
  • Non-standard naming: Subdomains using highly unique or random names may not be found through brute-forcing. Brute-force discovery relies on wordlists and learned patterns.
  • Recent creation: Newly created subdomains may take up to 72 hours to appear in discovery results, depending on the discovery method.

Resolution: Connect cloud accounts to improve discovery coverage. Cloud connectors discover assets directly from your cloud provider, regardless of DNS configuration. You can also manually add specific subdomains if they are not being discovered automatically.

IP Addresses Missing

IP addresses are discovered through DNS resolution of your subdomains. Missing IPs typically indicate:

  • The subdomain’s DNS record does not resolve to an IP (e.g., it is a CNAME to a CDN)
  • The IP was discovered but belongs to a CDN or shared hosting provider and is listed under that context

Resolution: Check the DNS records for the affected subdomain. If the subdomain uses a CNAME chain, the final IP resolution is tracked. Cloud connectors can surface IPs that are not directly exposed via DNS.

Scanning Issues

WAF Blocking Scanner Traffic

If your Web Application Firewall (WAF) blocks Detectify’s scanner, assessments will return incomplete or inaccurate results. Symptoms include:

  • Findings showing generic connection errors
  • Expected vulnerabilities not being detected
  • Assets appearing as unreachable despite being online

Resolution: Allowlist the Detectify scanner IP addresses and user agent in your WAF configuration. See Configuration for the current scanner IPs and user agent string.

Assets Showing as Unreachable

If an asset appears in your inventory but assessments report it as unreachable:

  • Verify the asset is publicly accessible from the internet
  • Check for IP-based access restrictions or geo-blocking that might affect requests from Ireland (EU scanner location)
  • Confirm DNS resolution is returning a valid, routable IP address
  • Check for firewall rules that may be blocking the scanner IPs

Incomplete Port Scan Results

Port scanning runs on a tiered schedule (24 hours for ports 80/443, 48 hours for top 200, 72 hours for full range). If you expect ports to appear that are not showing:

  • Wait for the full 72-hour scan cycle to complete
  • Verify the ports are open from an external perspective (not just internal)
  • Check that no firewall rules are blocking the scanner IPs on those ports

Technology Fingerprinting Issues

Incorrect Technology Detection

Technology fingerprinting is based on patterns in HTTP responses, HTML content, JavaScript files, and HTTP headers. Occasionally, fingerprinting may:

  • Report false positives if a technology’s signatures overlap with another technology
  • Miss technologies that do not expose detectable signatures in their public-facing responses
  • Report outdated versions if version detection relies on static file hashes that have not been updated

Resolution: Technology fingerprinting results should be treated as indicators rather than definitive inventories. Cross-reference with your own deployment records for critical decisions. Report persistent inaccuracies to Detectify support for investigation.

Technologies Not Updating After Changes

After deploying changes to your infrastructure, technology fingerprinting may take up to 72 hours to reflect the new state. This is the standard fingerprinting cycle time.

Finding Issues

Expected Vulnerability Not Reported

If you know a vulnerability exists but Surface Monitoring has not reported it:

  • Verify the asset is being reached by the scanner (no WAF blocks or network restrictions)
  • Check the assessment schedule — the specific assessment type may not have run yet
  • Surface Monitoring tests for specific vulnerability classes; not all vulnerability types are covered
  • The vulnerability may require authenticated access that Surface Monitoring does not have

Finding Marked as Fixed but Vulnerability Still Exists

Auto-fix marks a finding as Fixed when the subsequent assessment no longer detects it. This can happen if:

  • The WAF is now blocking the scanner, preventing detection
  • The asset has become unreachable
  • The vulnerability’s detectable signature changed but the underlying issue remains

Resolution: Verify remediation independently. If the finding was incorrectly marked as Fixed, it will reappear as a Regression in the next successful assessment.

Next Steps

  • Configuration — Review and update scanner access settings
  • Results — Understand finding statuses and lifecycle
  • Discovery — Learn about discovery methods and timing
Last updated on