How to scan external IP for vulnerabilities?

Posted on 2010-08-28
Last Modified: 2012-08-14
How can I scan my companies external facing IP for vulnerabilities, such as malicious attacks, attempts at gaining access to our network, and any other bad things like that? I know about the QualysGuard service but I'm on a tight budget. Thanks.
Question by:canalicomputers

Accepted Solution

radnbne earned 500 total points
ID: 33550669
You could start with Shields up.  An internet based test of your external fingerprint.


Expert Comment

ID: 33550672
if you have a machine on another internet connection you could run nessus ( ) on it to scan you network

Expert Comment

ID: 33550687
An alternative to nessus (as they now seem to be pushing their buy a commercial license) is
LVL 10

Expert Comment

ID: 33554592
"for vulnerabilities"
You may subscribe to any pay-per-scan service (which doesn't require buying any hardware) like Qualys, eEye Retina, Mcafee..etc
Or you may do it yourself using either commercial tools like Nessus and the above mentioned ones or free ones like openvas (which is based originally on Nessus).

"malicious attacks, attempts at gaining access to our network"
These types of things can be detected by enabling logging of your firewall and/or having an IPS. You can then analyze these logs to look for suspicious activities.

Author Closing Comment

ID: 33671235

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now