THREAT VULNERABILITY ASSESSMENT
Our Threat Vulnerability Assessment, detects open TCP ports, running services (including their versions) and does OS fingerprinting on a target IP address or hostname
Our exclusive scanner allows us to easily map the network perimeter of a company, check firewall rules and verify if your services are reachable from the Internet. Based on Nmap Online, it performs accurate port discovery and service detection.
External Network Scanner
Malicious client applications (ex. scripts, bots, malware) often exploit code found in the server software that let them get unauthorized access on the remote machine. This is one of the reasons why testing all ports is vital to achieving an in-depth security verification.
The main advantage of using an online version/ of the Nmap port scanner versus using it on your local machine is that it gives you an external view of your systems as they are seen by any hacker from the Internet. If you do the same scan from your internal network you may obtain different results because of various firewalls and network restrictions.
list of MOST COMMON PORTS tested
21 - FTP (File Transfer Protocol)
22 - SSH (Secure Shell)
23 - Telnet
25 - SMTP (Mail)
80 - HTTP (Web)
110 - POP3 (Mail)
143 - IMAP (Mail)
443 - HTTPS (Secure Web)
445 - SMB (Microsoft File Sharing)
3389 - RDP (Remote Desktop Protocol)
Our Network Scanner allows custom portscans with specific parameters, for example:
Specify custom TCP ports to scan (1-65535)
Enable/disable service detection
Enable/disable operating system detection
Enable/disable host discovery
Do Traceroute