Use Cases

One platform.
Four ways to deploy it.

Whether you run an in-house security team, manage clients, protect national infrastructure, or build security products — FullHunt fits your operating model.

01 / Security Vendors

API-first OEM data for security platforms

Embed enrichment, vulnerability intelligence, and agentic AI capabilities into your product through white-label APIs — without building scanning infrastructure.

Host & Domain Enrichment APIs Attack Path Analysis API MCP Server & Agentic AI Vuln & Exploit Intel Passive DNS Historical Data
Security Vendors
Built for

Security vendors, SaaS platforms, and technology companies embedding FullHunt intelligence into their own products via OEM APIs.

02 / Enterprises

Complete external coverage for in-house security teams

Discovery, dark web monitoring, vulnerability intelligence, and agentic AI — unified for teams that need full perimeter visibility without the noise.

Attack Surface Discovery Exposure Monitoring Dark Web Intelligence Vulnerability & Exploit Intel MCP & Agentic AI Reports & Integrations
Enterprises
Built for

In-house security teams, SOC analysts, red teams, and CISOs at organizations that manage their own external attack surface.

03 / MSSPs

Multi-tenant ASM and automated client reporting

On-demand scanning, active and passive vulnerability detection, and per-client reporting — built for providers managing hundreds of accounts.

Multi-Tenant Architecture On-Demand Scanning Active + Passive Vuln Scanning Automated Reports Audit Logs Dedicated Scanning Engines
MSSPs
Built for

Managed security service providers, MSSPs, and security consultancies that deliver ASM as a service to their client base.

04 / National CERTs

Nation-scale enumeration and vulnerability intelligence

Bulk data access, host and domain enrichment, passive DNS, and internet research data for government security programs protecting critical infrastructure.

National-Scale Discovery Host & Domain Enrichment Internet Research Data Passive DNS Organizations DB Vulnerability & Exploit Intel
National CERTs
Built for

ISVs, security product companies, and platform vendors that want to embed attack surface intelligence into their own products via API.

Not sure which fits your team?

Talk to us — we'll help you find the right deployment model for your organization.