Articles on: Threats

Understanding the Threats List

Understanding the Threats List


The Threats List is the central workspace where all exposed identities detected by Selki are displayed, organized, and managed.

It provides a complete, real-time overview of every threat affecting your monitored domains, allowing your security team to quickly identify, filter, investigate, and act on compromised accounts.


This page is designed to be fast, searchable, and intuitive, combining powerful filtering options with detailed exposure data.



Overview of the Threats List Layout


The page is divided into two main sections:


1. Left Sidebar – Filters & Watchers

Used to refine the list by categories, risk levels, status, domains, and other attributes.


2. Main Table – Threat Records

Displays all detected threats and their key attributes such as identity, risk level, number of occurrences, and last seen date.


This combination allows you to narrow down thousands of exposures in seconds.



Key Columns on the Threats Table


Each row in the table represents a unique exposed identity.

The main fields visible in the table are:


Identity

The username, email, or identifier exposed in compromised sources.

Clicking an identity opens the detailed threat view.


Status

Indicates the current state of the threat:

  • Open
  • Re-Opened
  • Closed


Statuses help track remediation progress and team workflow.


Risk Level

Selki automatically assigns a risk level based on:

  • source type (infostealer, breach, paste, etc.)
  • password availability
  • sensitivity of the affected domain
  • recency of the exposure


Levels include:

  • Low
  • Medium
  • High
  • Critical


Category

Classifies whether the exposed identity belongs to:

  • Employees (internal accounts)
  • Customers (end-users of your platform)


This helps separate organizational threats from user-base threats.


Occurrences

The number of unique findings related to that identity.

One threat may have:

  • multiple passwords
  • multiple hostnames
  • repeated exposures over time


Last Seen

The last date Selki detected this identity in compromised sources.




At the top of the page, the universal search bar allows you to locate threats by:


  • identity name
  • email
  • hostname
  • keyword
  • pattern
  • part of the username


The search operates across the entire dataset for fast identification.



Pagination


At the top-right corner, the interface shows:



Updated on: 01/12/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!