The Java HTTP server that became Jetty was initially developed in 1995 by Greg Wilkins of Mort Bay Consulting as part of an issue-tracking application. Versions 1.x through to 6.1.x of Jetty were developed under org.mortbay packaging and Mort Bay still hold the central part of the copyright on the Jetty code base. Mort Bay directly hosted the jetty project until version 3.x and was the prime sponsor of development until 6.x.

Mort Bay Products Global Footprint

Top 10 Identified Countries

Country Observations Percentage
US 38,417 30.66%
IN 14,426 11.51%
CN 13,364 10.67%
DE 10,222 8.16%
SG 4,298 3.43%
GB 4,157 3.32%
KR 3,309 2.64%
IE 3,174 2.53%
FR 3,140 2.51%
JP 2,953 2.36%

Mort Bay Products Industry Footprint

Top 10 Identified Industries

*Learn more about industry attribution in our FAQs

Industry* Observations Percentage
Technology 84,694 80.33%
Telecommunications 17,135 16.25%
Education 1,640 1.56%
Business Services 483 0.46%
Media/Entertainment 349 0.33%
Government/Politics 254 0.24%
Retail 222 0.21%
Finance 162 0.15%
Energy/Resources 137 0.13%
Manufacturing 79 0.07%

Mort Bay Product Details

1 Products Found
GROMA Continuous Threat Scanning
GROMA Continuous Threat Scanning

Bitsight, the leading provider in Cyber Risk Management, introduced the next-generation internet scanner Bitsight Groma in May 2024. This technology continuously scans the entire internet to discover assets, collect asset attribution evidence, and identify an ever-growing set of security observations, such as vulnerabilities and misconfigurations. Groma’s scanning activities presently encompass:


  • 40 million-plus monitored organizations
  • 250 million-plus host names
  • 4 billion-plus routable IP addresses

Greynoise’s recent study testifies the speed of Bitsight Groma.

GROMA Continuous Threat Scanning
Bitsight data discovery

Bitsight TRACE team investigates security incidents and identifies vulnerabilities and threats.

View security research 

See what you’re up against across the expanding attack surface. Prioritize what matters most. And mitigate where you’re most vulnerable.

External Attack Surface Management

Bitsight ASA Report Image

Reducing exposure starts with knowing exactly how your external attack surface stands—from your overall standing to each digital and cloud asset around the world. Bitsight's custom report gives you the insights you need to see your entire external attack surface.