Systems and methods are provided to generate an attack surface for a protected entity. The method an include receiving identifying information associated with the protected entity; scanning one or more third parties to identify a host associated with the protected entity; determining that the host resolves to a webpage; resolving the webpage; extracting a uniform resource locator (URL) from the resolved webpage; determining, based on at least one rule, that the URL is associated with the protected entity; and generating the attack surface for the protected entity, the attack surface comprising the URL.