How to scan external IP for vulnerabilities?

Posted on 2010-08-28
Last Modified: 2012-08-14
How can I scan my companies external facing IP for vulnerabilities, such as malicious attacks, attempts at gaining access to our network, and any other bad things like that? I know about the QualysGuard service but I'm on a tight budget. Thanks.
Question by:canalicomputers
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Accepted Solution

radnbne earned 500 total points
ID: 33550669
You could start with Shields up.  An internet based test of your external fingerprint.


Expert Comment

ID: 33550672
if you have a machine on another internet connection you could run nessus ( ) on it to scan you network

Expert Comment

ID: 33550687
An alternative to nessus (as they now seem to be pushing their buy a commercial license) is
LVL 10

Expert Comment

ID: 33554592
"for vulnerabilities"
You may subscribe to any pay-per-scan service (which doesn't require buying any hardware) like Qualys, eEye Retina, Mcafee..etc
Or you may do it yourself using either commercial tools like Nessus and the above mentioned ones or free ones like openvas (which is based originally on Nessus).

"malicious attacks, attempts at gaining access to our network"
These types of things can be detected by enabling logging of your firewall and/or having an IPS. You can then analyze these logs to look for suspicious activities.

Author Closing Comment

ID: 33671235

Featured Post

Save the day with this special offer from ATEN!

Save 30% on the CV211 using promo code EXPERTS30 now through April 30th. The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Internet Business Fax to Email Made Easy - With  eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

761 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question