Assets and targets
Pentest-Tools.com uses two related concepts for organizing what you scan:| Concept | Description | Example |
|---|---|---|
| Asset | A top-level resource you add to the platform. Assets are the unit for subscription limits. | example.com, 192.168.1.1 |
| Target | A specific scannable item associated with an asset. Tools run scans against targets. | https://example.com/app, https://example.com/api/v1 |
Your subscription’s asset limit determines how many assets you can add. One asset can have multiple targets, all counted under that single asset.
- You provide a target: For example,
https://example.com/app - The system extracts the asset: The hostname
example.combecomes the asset - Target links to asset: The URL target is associated with the
example.comasset - Scans run on the target: Tools scan the specific URL you provided
Example: One asset, multiple targets
For the assetexample.com, you might have these targets:
| Target | Type |
|---|---|
example.com | Hostname |
https://example.com/ | URL |
https://example.com/app | URL |
https://example.com/api/v1 | URL |
example.com asset, counting as one asset toward your subscription limit.
Adding a single target
Configure alive check (optional)
Enable Include only alive targets to verify the target is reachable before adding it. See Check alive for details.
Supported target formats
| Format | Example | Asset created |
|---|---|---|
| Domain | example.com | example.com |
| Subdomain | api.example.com | api.example.com |
| IP address | 192.168.1.1 | 192.168.1.1 |
| URL | https://example.com/app | example.com |
| URL with port | https://example.com:8443/admin | example.com |
| IP range (CIDR) | 192.168.1.0/24 | Individual IPs |
| IP range (dash) | 192.168.1.1-100 | Individual IPs |
CIDR notation supports masks from /24 to /30. Masks outside this range are rejected.
Different tools accept different target types. For example, the Website Scanner requires a URL, while the Port Scanner accepts hostnames or IP addresses.
Importing multiple targets
You can import targets from a file or from AWS.Import from file
Import targets from a.txt file with one target per line. Optionally include descriptions after a comma.
Upload and configure
Select your file and optionally enable Include only alive targets to filter unreachable hosts. See Check alive for details.
Import from AWS
If you have an AWS integration configured, you can import targets from your AWS infrastructure.- Click Import and select From AWS
- Choose your AWS integration
- Select the resource types to import
- Click Import
AWS import requires a configured AWS integration. See AWS integration for setup instructions.
Managing assets and targets
Editing targets
You can update the description of existing targets:- Find the target in your asset list
- Click the Edit description button
- Update the description
- Click Save
Moving targets between workspaces
Move targets to a different workspace to reorganize your work:- Select one or more targets
- Click Move
- Choose the destination workspace
- Confirm the move
Moving a target also moves its associated scan history and findings to the new workspace.
Deleting assets and targets
Use Group by asset to see assets as top-level rows and act on them directly.To delete targets (keeping the asset)
- Select the specific targets you want to remove
- Click Delete
- Confirm the deletion
To delete an entire asset
- Select the asset
- Click Delete
- Confirm that you want to delete the asset and all its targets
Asset discovery
Some tools find new items as a side effect of scanning:- Subdomain Finder discovers subdomains under your domain asset
- Website Recon identifies web technologies, CMS platforms, and frameworks
- Port Scanner finds services that may expose web interfaces
Check alive
When adding or importing targets, you can enable the Include only alive targets option to filter out unreachable hosts before they’re added to your workspace.When to use it
The alive check is useful when:- You’re importing an IP range and want to skip offline hosts
- You’re scanning an internal network with unused IP addresses in a CIDR block
- You want to confirm hosts are reachable before adding them
The alive check takes longer than adding targets directly, but results in a cleaner asset list with only reachable hosts.
How it works
The platform uses a customized version of Nmap’s host discovery to determine if a target is alive. Multiple probe types are sent to maximize detection accuracy, as different network configurations and firewalls may block certain traffic.ICMP probes
ICMP probes
- Echo request: Sends ICMP type 8 packets expecting echo replies. Often blocked by firewalls but reliable on internal networks.
- Timestamp request: Sends ICMP queries expecting reply code 14. Useful when echo requests are blocked.
- Netmask request: Sends ICMP queries expecting reply code 18. Another alternative when echo requests are blocked.
TCP probes
TCP probes
- SYN probes: Sends empty TCP packets with the SYN flag to the top 100 ports.
- ACK probes: Sends TCP packets with ACK flags, expecting RST responses.
UDP probes
UDP probes
Sends UDP packets to common ports (53, 113, 161, 162, 497, 40125). An ICMP “port unreachable” response indicates the host is alive. This bypasses firewalls that only filter TCP traffic.
IP protocol ping
IP protocol ping
Sends IP packets with various protocol numbers (ICMP, IGMP, IP-in-IP, TCP, SCTP) to detect hosts that respond to specific protocols.
Source port spoofing
Source port spoofing
Uses port 53 (DNS) as the source port to bypass poorly configured firewalls that permit traffic based on source port.
Asset limits
Your subscription includes limits for both added assets and scanned assets. These limits apply across all your workspaces and are shared among all team members on your account. For detailed information about how asset limits work, see Assets and limits.Best practices
Use descriptive names
Use descriptive names
Add meaningful descriptions to targets so you and your team can quickly identify what each one represents.
Organize with workspaces
Organize with workspaces
Group related assets in workspaces by project, client, or environment. This makes it easier to manage large inventories.
Clean up regularly
Clean up regularly
Remove decommissioned targets and assets to keep your inventory current and make room for new additions.
Use alive checks for imports
Use alive checks for imports
When importing large lists (especially IP ranges), enable the alive check to filter out unreachable hosts automatically.
Related topics
- Assets and limits: How assets affect your subscription
- Workspaces: Group assets by project or client
- Attack surface overview: View all discovered targets
- AWS integration: Import targets from AWS