Skip to main content

Overview

The Network Scanner identifies security weaknesses in network infrastructure, including servers, services, and network devices. It tests for known CVEs, misconfigurations, and security issues across network services. The Network Scanner is a vulnerability scanner: it actively tests your network infrastructure for security weaknesses. Discovered ports, services, OS information, and technologies are added to your Attack Surface. Identified vulnerabilities are reported as findings.

Supported targets

Target typeExamples
IP address192.168.1.1, 10.0.0.5
Hostnameserver.example.com, mail.example.com
To scan multiple hosts, add IP ranges (CIDR notation like 192.168.1.0/24) or IP ranges (like 10.10.0.1-255) from the Assets page. You can also import multiple targets from a file.

Scan types

ModeDescriptionUse case
LightFast scan with version-based detectionQuick assessment
DeepComprehensive scan with multiple enginesFull security audit
CustomUser-configured engines, ports, and optionsTargeted testing

Parameters comparison

ParameterLightDeepCustom
TCP ports~187~3,847User-defined
UDP ports~101~1,000User-defined
Check aliveConfigurable
Extensive modulesConfigurable
Custom CVEsUp to 10
Rate limiting--1-100 RPS

Engines comparison

EngineLightDeepCustom
Version-based
Sniper
Nuclei
OpenVAS
The Deep scan performs active vulnerability testing and generates significant network traffic. Most correctly configured security monitoring systems will detect this scan. Do not use it if you don’t have proper authorization from the target owner.

Custom scan

Full control over scan parameters:
  • Select any combination of scanning engines (including OpenVAS)
  • Define custom port ranges, lists, or common port presets
  • Scan for specific CVEs (up to 10)
  • Adjust request rate for Nuclei and OpenVAS engines

Scanning engines

Version-based

Runs Nmap to detect open ports and services, then queries a vulnerability database to find CVEs affecting detected versions. Fast but may produce false positives if version strings are inaccurate or backported patches aren’t reflected.

Sniper

Custom vulnerability checks developed by the Pentest-Tools.com research team. Actively tests for vulnerabilities with targeted payloads. Browse the vulnerability database for the complete list. See Sniper for standalone usage.

Nuclei

Open-source vulnerability scanner using network and CVE templates. Performs active verification of vulnerabilities with proof-of-concept payloads. See Nuclei on GitHub for more information.

OpenVAS

Full-featured open-source vulnerability scanner with 10,000+ plugins. Provides comprehensive testing including service-specific checks. See OpenVAS for more information.
Sniper modules only work with TCP protocol. If you select UDP with Sniper enabled, the scan will fail.

Custom scan options

Port selection

OptionTCP portsUDP ports
Top 10 ports~10~10
Top 100 ports~112~101
Top 1000 ports~1,009~1,000
Top 5000 ports~5,003~5,000
OpenVAS default~4,485-
Full port range65,53565,535
You can also specify a port range (e.g., 1-1024) or a port list (comma-separated, e.g., 22,80,443,8080).
The “Top X ports” options use different, curated port lists for TCP and UDP based on which ports are most commonly open for each protocol. TCP lists emphasize web (80, 443, 8080), SSH (22), and database ports, while UDP lists focus on DNS (53), DHCP (67-68), SNMP (161-162), and NTP (123) ports.
See Port lists for the exact ports covered by each preset.

Protocol

OptionDescription
TCPScan TCP ports (default)
UDPScan UDP ports

Additional options

OptionDescription
Check aliveVerify the target is reachable before scanning. If disabled, the scan proceeds even if the host doesn’t respond to discovery probes.
Extensive modulesEnable additional checks for CVE-2022-42889 (Text4Shell) and CVE-2022-34265 that require extended scanning time due to fuzzing on multiple endpoints and query parameters.

Custom CVE scanning

Scan for up to 10 specific CVEs. This feature:
  • Is supported by Sniper, Nuclei, and OpenVAS engines (not version-based)
  • Validates that the specified CVEs are detectable by the selected engines
  • Only runs engines that can actually detect the specified CVEs
To check which CVEs are detectable, browse the Pentest-Tools.com vulnerability database.

Rate limiting

When using Nuclei or OpenVAS engines, you can adjust the request rate:
SettingValue
Default50 requests per second
Minimum1 request per second
Maximum100 requests per second
Lower the request rate when scanning production systems to reduce impact, or increase it for faster scans on test environments.

Follow-up actions

After running a network scan:
  1. Prioritize by severity: Address critical and high severity findings first. Use EPSS scores to prioritize actively exploited vulnerabilities.
  2. Check CISA KEV: Vulnerabilities in the CISA Known Exploited Vulnerabilities catalog should be remediated urgently.
  3. Verify findings: Use the evidence provided to confirm vulnerabilities.
  4. Discover open ports: Use the Port Scanner for detailed port enumeration.
  5. Test SSL/TLS: Run the SSL/TLS Scanner on web services.
  6. Audit credentials: Use the Password Auditor to test for weak passwords.
  7. Exploit verified vulnerabilities: Use Sniper to validate exploitability.
  8. Generate reports: Export findings for remediation tracking and compliance documentation.