Choose the plan that fits your needs
Whether you're a security professional or an enterprise security team, we have a plan that scales with your attack surface. Get started in minutes with no credit card required.
- No credit card required
- Cancel anytime
- Enterprise-ready
- Onboarding in < 30 min
Professional
FullHunt Professional provides security professionals with advanced attack surface discovery and threat intelligence capabilities.
- Professional Attack Surface Discovery
- 500 Search Credits per month
- Full API Access
- Up to 5,000,000 results per month
- Search filters and threat hunting queries
- Community support
Best For:
Security researchers, consultants, and small security teams
Enterprise
FullHunt Enterprise allows security teams to solve Attack Surface Management at scale.
Everything in Professional, plus:
Discovery & Monitoring
- Advanced asset discovery
- Continuous exposure monitoring
- Real-time change detection
Security & Validation
- Thousands of vulnerability checks
- Runtime validation (zero false positives)
- Vulnerability prioritization for public exploitation
- Asset score based on exploitable vulnerabilities
- Dark web monitoring
- EPSS & KEV enrichment
Integration & Reporting
- Unlimited searches and results
- Enterprise integrations (SIEM/SOAR)
- Advanced reporting and dashboards
- Dedicated support team
Immediate Results
- Onboarding in less than 30 minutes
- Coverage for up to 400K organization assets
Best For:
Enterprise security teams, large organizations, and continuous security programs
Custom Solutions
Looking for a custom offering? FullHunt can provide tailored solutions.
- Develop custom features
- Direct access to our Assets database
- OEM APIs for integration
- FullHunt for Governments
- FullHunt for MSSPs
- Managed Security Scanning
- And much more...
Best For:
Organizations with unique requirements and custom needs
Ready to secure your attack surface?
Join hundreds of security teams worldwide who trust FullHunt for continuous attack surface management.
- Zero false positives
- Onboarding < 30 min
- SIEM/SOAR ready
- Enterprise-grade security
Detailed Feature Comparison
Compare all features side-by-side to find the perfect plan for your needs
| Feature | Professional | Enterprise |
|---|---|---|
| Discovery & Monitoring | ||
| Attack Surface Discovery | Basic | Advanced + Continuous |
| Subdomain Discovery | β | β x10 more discovery |
| Cloud Asset Discovery | β | β Full (AWS, Azure, GCP, Alibaba, Oracle) |
| IP and DNS Mapping | β | β |
| Technology Fingerprinting | β | β Thousands of signatures |
| Continuous Exposure Monitoring | - | β Real-time (24/7) |
| Configuration Drift Tracking | - | β Automated alerts |
| Change Detection | - | β Real-time |
| Search & Query | ||
| Search Engine | β Full-text | β Full-text |
| Monthly Search Credits | 500 credits | Unlimited |
| Results Limit per Month | Up to 5M | Unlimited |
| Advanced Search Filters | β | β |
| Saved Searches | β | β |
| API Access | ||
| REST API Access | β Standard | β Full Enterprise API |
| Data Intelligence APIs | Basic (100 results/query) | Full (Unlimited) |
| Nexus Threat Intelligence APIs | Limited | Full Access |
| Agentic AI & MCP Server | Limited APIs and Tools | All APIs and Tools |
| Webhooks | - | β Real-time |
| API Documentation | β | β + Support |
| Security & Validation | ||
| Vulnerability Scanning | - | β Thousands of checks |
| Runtime Validation | - | β Zero false positives |
| Security Misconfigurations | Common only | β Comprehensive |
| Software with Known Vulnerabilities | - | β |
| 1-Day Exploit Detection | - | β |
| DNS Security Issues | Discovery only | β Full validation |
| Log4J-related Vulnerabilities | - | β |
| Cloud Security Misconfigurations | - | β |
| SSL/TLS Issues | Discovery only | β Full validation |
| Vulnerability Intelligence | ||
| EPSS Scoring | - | β Exploit prediction |
| KEV Tracking | - | β Known exploited CVEs |
| Exploit Correlation | - | β 100K+ exploits |
| Vulnerability Prioritization | - | β Public exploitation |
| Asset Risk Scoring | - | β Exploitable vulnerabilities |
| Security Research Integration | - | β Curated intelligence |
| Real-time Exploit Tracking | - | β |
| Dark Web & Threat Intelligence | ||
| Typosquatting Detection | - | β |
| Potential Phishing Monitoring | - | β |
| Compromised Credentials Monitoring | - | β |
| Dark Web Leaks Detection | - | β |
| Global Search Access | Limited | β Full (Nation-scale) |
| Data Intelligence Access | Basic | β Full (14+ endpoints) |
| Human-Led Vulnerability Exploitation | - | β |
| Enterprise Scanning | ||
| URL Discovery & Crawling | - | β |
| Certificate Monitoring & Tracking | - | β TLS/SSL |
| External Attack Surface Threats | - | β |
| Third-Party Vendor Risk | - | β Vendor scanning |
| Integrations | ||
| SIEM (Splunk, Sumo Logic) | API Only | β Native |
| SOAR (XSOAR, FortiSOAR, Mindflow) | API Only | β Native |
| Ticketing (Jira, ServiceNow) | API Only | β Automated |
| Chat (Slack, Teams) | API Only | β Real-time alerts |
| Custom Webhooks | - | β |
| Exports (CSV/JSON/PDF) | β Basic | β Advanced |
| Reporting & Dashboards | ||
| Platform Dashboard | β | β Advanced |
| Asset Inventory Reports | Basic | β Advanced |
| Vulnerability Reports | - | β Prioritized |
| Executive Summaries | - | β C-level |
| Compliance Documentation | - | β |
| Trend Analysis | - | β |
| Support & Services | ||
| Customer Support | Community | β Dedicated team (24/7) |
| Onboarding | Self-service | β Guided (< 30 min) |
| Technical Account Manager | - | β |
| Security Consulting | - | Available |
| Capacity & Scale | ||
| Asset Discovery | Unlimited | Unlimited |
| Monitored Assets | Small-Medium | Up to 400K |
| User Seats | 1 user | Custom team access |
| Data Retention | - | Custom |
| SLA | Standard | Custom enterprise |
Specialized Solutions & Partner Programs
Custom programs for specific use cases and partnership opportunities
MSSP
Are you a managed security service provider looking to add visibility and continuous security to the attack surface of your clients?
Contact SalesReseller
Are you interested in reselling FullHunt? Are you a consulting or services company that wants to include FullHunt in your bid?
Contact SalesOEM Access
Are you looking to integrate FullHunt's capabilities into your own products or services? Our OEM program provides white-label access to our platform.
Request OEM AccessTechnology Partner
Are you developing an integration for your product or service? Build connectors that extend the FullHunt ecosystem.
Contact Engineering TeamNation's CERT
Are you a nation's CERT that would like to protect and monitor your country's external Attack Surface? FullHunt scales to scan millions of assets for security risks.
Contact Government TeamEnterprise API Access
Are you mainly looking for Enterprise API Access to enrich security data pipelines? Get high-volume APIs for enrichment, SIEM integrations, and automation.
Contact SalesWhy FullHunt?
Built for security teams who need fast, reliable, and comprehensive attack surface management
No Hidden Costs
Transparent pricing with no surprise fees. Flexible billing options to match your budget and scale.
Fast Onboarding
Operational in less than 30 minutes with no infrastructure needed. Get immediate value from day one.
Flexible Contracts
Monthly or annual agreements with custom enterprise terms. Volume discounts available for larger deployments.
Frequently Asked Questions
Everything you need to know about FullHunt pricing and plans