- You have full control over the IP ranges of scanned devices and services through simple administration.
- For greater transparency, you can view our IP sources for scanning tools.
- Only you decide whether and when to use the scanning service for your organization.
- The results are available in the web interface in the form of reports and in machine format via the API interface.
Scanning
Systematic search for vulnerable devices and network services in your internal network.

Basic features
The service is based on systematic scanning of your network and the devices and services connected to it. The aim is to obtain and store information about the network services in operation and then use it to identify potentially vulnerable devices (services).
Based on information obtained from network scanning and publicly available sources about newly discovered vulnerabilities, we will prepare specific recommendations for corrective or preventive security measures for your organization. Thanks to the Mentat system, these recommendations are automatically processed and sent directly to your email. Network scanning helps you ensure the security of your organization's infrastructure.
The service will be used primarily by members of security teams, network administrators, and service administrators of organizations connected to the CESNET e-infrastructure. The service significantly facilitates organizations' compliance with their legislative obligation to implement appropriate measures to secure networks and information systems, thereby increasing cyber security.
The service is provided as part of the CESNET e-infrastructure connection package and is available at no additional charge.
If you are interested in scanning the network, please follow the registration procedure directly on the service website.
The full text of the Terms of Service can be found on the service page.