Skip to main content

External Monitoring: How to verify your Assets

Written by ish
Updated this week

How it works

As part of External Monitoring, Risk Ledgers identifies assets automatically, improving visibility and reducing setup effort. By confirming assets, you help ensure your clients see an accurate, up-to-date view of your organisation's security posture, while keeping full control of what’s included.

We use publicly available information to identify potential assets related to your organisation. For example, if you've registered example.com, we may find related domains or subdomains such as example.io or app.example.com, and verify them against trusted domain registries.

Importantly, no probing or intrusive scanning is performed - all discoveries are based solely on public data sources.


How to Verify your Assets

Note: If you have a Web Application Firewall (WAF), you may need to whitelist Risk Ledger's scanning IP address in order for us to scan your assets.

IP Addresses to whitelist:

18.202.105.192
52.215.173.201


When new assets are discovered, you'll see them listed in Monitoring > Assets > Discovered Assets:


From there, you can Verify (1) all assets that belong to your organisation, or Approve (2) or Reject (3) individual assets:

Verified assets will display a check-mark to make it clear that they've been confirmed by your organisation:

Rejecting any individual assets will offer the option to select reasons for any rejections:

You'll also be alerted to newly discovered assets from your Security Profile page:


💡 If there is anything we haven't covered, please feel free to contact us at support@riskledger.com or alternatively, select the Chat icon in the bottom right corner.

Did this answer your question?