Vulnerability Distribution
Scan History (7 Days)
System Diagnostics
Recent Scan Activity
| Target | Type | Date | Status | Findings |
|---|---|---|---|---|
| No scans completed yet. Start your first scan! | ||||
New Security Scan by MC
Configure your scan parameters and detection methods
Scan in Progress
Initializing scanner...
Scan Results by MC
Detailed analysis of discovered hosts and vulnerabilities
No Results Available
Complete a scan to view detailed results and vulnerability reports
Generated Reports
Export and manage security assessment reports
Report Templates
Executive Summary
High-level overview for management. Risk scores and critical findings only.
Technical Detailed
Complete technical data with CVSS scores, CVE references, and remediation.
Compliance Report
PCI-DSS, ISO 27001, and SOC2 aligned reporting format.
Scanned Hosts History
Track all scanned hosts with scan history and details
Host Scan History
| Host/IP | First Seen | Last Scanned | Scan Count | Total Findings | Status | Actions |
|---|---|---|---|---|---|---|
| No hosts scanned yet. Run a scan to build host history. | ||||||
Host Details
Scan history and findings
Scan Timeline
Discovered Services
Vulnerability History
CVE-2023-38408
OpenSSH Vulnerability
Description
Detailed vulnerability description will appear here.
Remediation
Remediation steps will appear here.
References
Network Topology
Visual representation of discovered network assets
Run a network scan to generate topology map
Scan Scheduler
Automate recurring security assessments
Active Schedules
No scheduled scans configured
Create your first automated scan above
Schedule New Scan
Threat Intelligence
Real-time CVE database & vulnerability research
CVSS 3.1 Calculator
Base Score
Impact
Search the National Vulnerability Database
Lookup CVEs, assess risk scores, and check remediation status
SSL/TLS Analyzer
Deep certificate inspection and cipher suite analysis
Protocol Support
Certificate Details
Cipher Suites per Protocol
| Protocol | Cipher Suite | FS | Key Size | Grade |
|---|
Vulnerability Status
HTTP Strict Transport Security (HSTS)
EnabledAnalyze SSL/TLS configuration of any HTTPS endpoint
Checks certificate validity, cipher strength, protocol versions, and known vulnerabilities
Compliance Frameworks
Pre-built audit templates for industry standards
PCI-DSS
Payment Card Industry Data Security Standard for organizations handling cardholder data.
HIPAA
Health Insurance Portability and Accountability Act security and privacy rules.
ISO 27001
Information Security Management System (ISMS) international standard.
PCI-DSS Assessment
Payment Card Industry compliance check
Compliance Assessment Report
Findings by Severity
Suggested Remediation Timeline
Nmap Import
Import and analyze existing Nmap scan results
Imported Hosts
| Host | State | Open Ports | Services | OS Detection | Actions |
|---|---|---|---|---|---|
|
Upload an Nmap XML file to begin analysis Supports: .xml, .nmap formats |
|||||
Raw XML Preview
Web Application Scanner
OWASP-based web vulnerability assessment
Web Scan in Progress
Initializing...
Discovered Vulnerabilities
Scan Diff & Baseline
Compare scans to track security posture changes over time
Detailed Comparison
| Change | Host:Port | Issue | Severity | First Seen | Status |
|---|
Vulnerability Trend (Last 10 Scans)
Select two scans to compare security posture changes
Track remediation progress and new threat emergence