Skip to content
Pricing

Three tiers.
No per-asset gotchas.

We meter Hax in scan tokens — not assets, not endpoints, not a punitive per-IP model. Pick a tier, get a monthly token budget, use it however you need.

Foundation

Continuous attack surface visibility for one organisation.

Cadence
Weekly full reconnaissance
Budget
500 scan tokens / month
  • Continuous attack surface mapping
  • Vulnerability scanning across discovered assets
  • Dark web sweep (paste sites + breach datasets)
  • PDF executive reports
  • Email alerts
  • 1 organisation, up to 5 domains
  • Standard support (business hours)
Request a demo

Mid-market organisations getting their first comprehensive view.

Most chosen

Professional

For security teams that need to act on what they find.

Cadence
Daily reconnaissance, on-demand deep scans
Budget
2,500 scan tokens / month
  • Everything in Foundation
  • Stealer log forensics
  • VIP & executive watch (up to 10 named individuals)
  • Slack / Teams / WhatsApp alerts
  • Compliance mapping (POPIA, GDPR, ISO 27001, NIST)
  • API access + webhooks
  • Up to 25 domains
  • Priority support
Request a demo

Security teams operating with an in-house SOC or MSSP.

Enterprise

Multi-tenant, MSSP, or large-organisation deployment.

Cadence
Real-time continuous reconnaissance
Budget
Custom — bring your own scan budget
  • Everything in Professional
  • Multi-tenant management (unlimited tenants)
  • Dedicated WhatsApp priority support channel
  • Unlimited VIP watch lists
  • Custom intelligence source integration
  • Per-tenant branding on reports
  • Dedicated customer success engineer
  • SLA on detection-to-alert latency
  • On-prem deployment available
Talk to us

MSSPs, large enterprises, and organisations with multiple subsidiaries.

Pricing is published per quarter. Talk to us for current per-tier rates and multi-year discount.

Cadence comparison

How fast does each tier see things?

FoundationProfessionalEnterprise
Recon frequency WeeklyDailyReal-time
Vulnerability scans Monthly + on-demandWeekly + on-demandContinuous
Dark web sweeps DailyHourlyReal-time
Alert latency 15 min5 min< 1 min
How metering works

The token model.

Scan tokens are how Hax meters reconnaissance work. A standard subdomain enumeration is 1 token. A full vulnerability scan against a discovered host is 5–20 tokens depending on depth. Continuous monitoring uses tokens at a slower rate than ad-hoc deep scans.

  • Subdomain enumeration sweep 1 token / domain
  • Service fingerprinting 0.1 tokens / host
  • Standard vulnerability scan 5 tokens / host
  • Deep vulnerability scan 20 tokens / host
  • Dark web sweep (per identity) 2 tokens / sweep
  • Stealer log forensics (per device) 5 tokens / device

Right-sized for your scan budget.

We'll size a tier and token budget to fit your environment in the demo call.