Understanding the Threats List
Understanding the Threats List
The Threats List is the central workspace where all exposed identities detected by Selki are displayed, organized, and managed.
It provides a complete, real-time overview of every threat affecting your monitored domains, allowing your security team to quickly identify, filter, investigate, and act on compromised accounts.
This page is designed to be fast, searchable, and intuitive, combining powerful filtering options with detailed exposure data.
Overview of the Threats List Layout
The page is divided into two main sections:
1. Left Sidebar – Filters & Watchers
Used to refine the list by categories, risk levels, status, domains, and other attributes.
2. Main Table – Threat Records
Displays all detected threats and their key attributes such as identity, risk level, number of occurrences, and last seen date.
This combination allows you to narrow down thousands of exposures in seconds.
Key Columns on the Threats Table
Each row in the table represents a unique exposed identity.
The main fields visible in the table are:
Identity
The username, email, or identifier exposed in compromised sources.
Clicking an identity opens the detailed threat view.
Status
Indicates the current state of the threat:
- Open
- Re-Opened
- Closed
Statuses help track remediation progress and team workflow.
Risk Level
Selki automatically assigns a risk level based on:
- source type (infostealer, breach, paste, etc.)
- password availability
- sensitivity of the affected domain
- recency of the exposure
Levels include:
- Low
- Medium
- High
- Critical
Category
Classifies whether the exposed identity belongs to:
- Employees (internal accounts)
- Customers (end-users of your platform)
This helps separate organizational threats from user-base threats.
Occurrences
The number of unique findings related to that identity.
One threat may have:
- multiple passwords
- multiple hostnames
- repeated exposures over time
Last Seen
The last date Selki detected this identity in compromised sources.
Search Bar
At the top of the page, the universal search bar allows you to locate threats by:
- identity name
- hostname
- keyword
- pattern
- part of the username
The search operates across the entire dataset for fast identification.
Pagination
At the top-right corner, the interface shows:
Updated on: 01/12/2025
Thank you!