Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
ZoomEye

By ZoomEye

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at ZoomEye, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with ZoomEye?

ZoomEye Reviews & Product Details

Product Avatar Image

Have you used ZoomEye before?

Answer a few questions to help the ZoomEye community

ZoomEye Reviews (2)

Reviews

ZoomEye Reviews (2)

5.0
2 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
II
Enterprise (> 1000 emp.)
"“ZoomEye Delivers Exceptional Visibility into Exposed Devices”"
What do you like best about ZoomEye?

What I like best about ZoomEye is its powerful capability to search and analyze internet-connected devices and services with incredible depth and accuracy. It provides detailed fingerprinting of hosts, ports, technologies, and vulnerabilities in a way that’s fast, comprehensive, and easy to visualize. The ability to perform both cybersecurity research and asset discovery from a single interface makes it especially valuable. Its search filters and real-time data make investigations efficient, whether you're mapping attack surfaces, monitoring infrastructure, or studying global threat trends. Review collected by and hosted on G2.com.

What do you dislike about ZoomEye?

What I dislike about ZoomEye is that the interface can feel a bit overwhelming at first, especially for new users who aren’t familiar with OSINT or network scanning tools. Some advanced search features lack clear documentation, which can make deep queries harder to construct. Additionally, rate limits and occasional slow loading times can interrupt workflow, and certain data results may require a premium plan, which can be limiting for free users. Review collected by and hosted on G2.com.

Arnab D.
AD
Founder Campaign Candy
Small-Business (50 or fewer emp.)
"One of the best reconnaissance platforms"
What do you like best about ZoomEye?

ZoomEye is one of the best reconnaissance platforms that any professional can use. ZoomEye as it's name suggest provides an eye to entire internet and can helped me safegaurd my data. Review collected by and hosted on G2.com.

What do you dislike about ZoomEye?

As zoomeye is readily available it can be misused by hackers with the amount of information provided in it. Review collected by and hosted on G2.com.

There are not enough reviews of ZoomEye for G2 to provide buying insight. Below are some alternatives with more reviews:

1
NinjaOne Logo
NinjaOne
4.7
(3,329)
NinjaOne, the automated endpoint management platform, delivers real-time visibility, security, and control over all endpoints to increase productivity for more than 20,000 customers.
2
ThreatDown Logo
ThreatDown
4.6
(1,071)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
3
ManageEngine Endpoint Central Logo
ManageEngine Endpoint Central
4.5
(1,038)
Endpoint Central is an integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
4
Atera Logo
Atera
4.6
(1,009)
Atera offers an all-in-one IT management platform that combines Remote Monitoring and Management (RMM), Helpdesk, Ticketing, and automation tools, providing efficient infrastructure management, enhanced service quality, and comprehensive features like patch management and AI-driven analytics, all under a transparent per-technician pricing model.
5
Action1 Logo
Action1
4.9
(841)
Action1 reinvents patching with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — it just works and is always free for the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted by thousands of enterprises managing millions of endpoints globally, Action1 is certified for SOC and ISO 7001. The company is founder-led by industry veterans Alex Vovk and Mike Walters, who founded Netwrix, which has grown into a multi-billion-dollar industry-leading cybersecurity company.
6
Iru Logo
Iru
4.7
(737)
Iru allows you to effortlessly configure and enforce advanced macOS security parameters with just a few clicks. Continuous endpoint monitoring and auto-remediation make staying in compliance a breeze.
7
Acronis Cyber Protect Logo
Acronis Cyber Protect
4.3
(734)
Acronis Cyber Protect is an integrated solution that combines advanced cybersecurity, data protection, and endpoint management to safeguard businesses against modern cyber threats. By merging backup and anti-malware capabilities into a single platform, it simplifies IT operations, enhances system efficiency, and ensures comprehensive protection across physical, virtual, and cloud environments. Key Features and Functionality: - Integrated Cybersecurity and Backup: Combines AI-based anti-malware with reliable backup to streamline protection processes. - Vulnerability Assessments and Patch Management: Identifies security gaps and applies necessary patches to maintain system integrity. - Disaster Recovery: Ensures business continuity by enabling rapid recovery of data and systems in the event of a cyberattack or system failure. - Endpoint Management: Provides centralized control over all endpoints, facilitating efficient monitoring and management. - Continuous Data Protection: Safeguards critical data by continuously backing up changes, minimizing data loss risks. Primary Value and User Solutions: Acronis Cyber Protect addresses the growing complexity of managing multiple security and backup solutions by offering a unified platform. This integration reduces operational overhead, lowers total cost of ownership, and enhances protection against evolving cyber threats. Businesses benefit from streamlined operations, improved system reliability, and the assurance that their data and systems are secure and recoverable.
8
Datto RMM Logo
Datto RMM
4.5
(725)
A proactive remote monitoring & management (RMM) that maximizes productivity.
9
Microsoft System Center Logo
Microsoft System Center
4.1
(585)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
10
Symantec End-user Endpoint Security Logo
Symantec End-user Endpoint Security
4.4
(550)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
ZoomEye
View Alternatives