www.vicarius.io Open in urlscan Pro
18.66.196.114  Public Scan

URL: https://www.vicarius.io/product/nmap?utm_term=vulnerability%2520scanner&utm_campaign=NMAPKWsEMEA&utm_source=adwords&utm_...
Submission: On November 19 via api from DE — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="form contact" data-v-dc674ec6="" data-v-6d7354ce="" data-v-0bbc59dc="">
  <div class="row align-bottom" data-v-dc674ec6="">
    <div class="col col-12 col-md-6 col-lg-auto" data-v-dc674ec6="">
      <div class="input-field" data-v-279c7de2="" data-v-dc674ec6=""><!---->
        <div class="input-flex dark" data-v-279c7de2=""><!----> <input data-hj-allow="" type="text" id="input128" name="email" autocomplete="current-name" placeholder="Your Email " value="" class="input-text" data-v-279c7de2=""> <!----> <!----></div>
      </div>
    </div>
    <div class="col col-12 col-md-6 col-lg-auto" data-v-dc674ec6="">
      <div class="input-field" data-v-279c7de2="" data-v-dc674ec6=""><!---->
        <div class="input-flex dark" data-v-279c7de2=""><!----> <input data-hj-allow="" type="text" id="input130" name="name" autocomplete="current-name" placeholder="Your Name" value="" class="input-text" data-v-279c7de2=""> <!----> <!----></div>
      </div>
    </div>
    <div class="col col-12 col-md-6 col-lg-auto" data-v-dc674ec6="">
      <div class="input-field" data-v-5918481e="" data-v-dc674ec6=""><!---->
        <div class="input-holder" data-v-5918481e="">
          <div class="input-flex dark" data-v-5918481e=""><!----> <input autocomplete="off" type="search" data-hj-allow="" id="input132" placeholder="Contact Reason" class="input-text input-select" data-v-5918481e=""> <!----> <!----> <svg width="26"
              height="8" viewBox="0 0 26 8" fill="none" xmlns="http://www.w3.org/2000/svg" data-v-5918481e="" class="">
              <path
                d="M25.3536 4.35355C25.5488 4.15829 25.5488 3.84171 25.3536 3.64645L22.1716 0.464466C21.9763 0.269204 21.6597 0.269204 21.4645 0.464466C21.2692 0.659728 21.2692 0.976311 21.4645 1.17157L24.2929 4L21.4645 6.82843C21.2692 7.02369 21.2692 7.34027 21.4645 7.53553C21.6597 7.7308 21.9763 7.7308 22.1716 7.53553L25.3536 4.35355ZM0 4.5H25V3.5H0V4.5Z"
                fill="#4C4EF0" data-v-5918481e=""></path>
            </svg></div> <!---->
        </div>
      </div>
    </div>
    <div class="col col-12 col-md-6 col-lg-auto" data-v-dc674ec6="">
      <div class="btn-expandable" data-v-abc3f3a6="" data-v-dc674ec6=""><button to="" type="submit" class="btn btn-primary variant--wide" data-v-abc3f3a6=""><span class="btn-text" data-v-abc3f3a6="" data-v-dc674ec6="">Submit</span> <span
            class="arrow" data-v-abc3f3a6=""><svg width="24" height="8" viewBox="0 0 24 8" fill="none" xmlns="http://www.w3.org/2000/svg" data-v-abc3f3a6="" class="">
              <path fill-rule="evenodd" clip-rule="evenodd"
                d="M20.1716 0.46444L23.3536 3.64642C23.5488 3.84168 23.5488 4.15826 23.3536 4.35353L20.1716 7.53551C19.9763 7.73077 19.6597 7.73077 19.4645 7.53551C19.2692 7.34025 19.2692 7.02366 19.4645 6.8284L21.7929 4.49997L1 4.49997C0.723858 4.49997 0.5 4.27612 0.5 3.99997C0.5 3.72383 0.723858 3.49997 1 3.49997L21.7929 3.49997L19.4645 1.17155C19.2692 0.976284 19.2692 0.659702 19.4645 0.46444C19.6597 0.269178 19.9763 0.269178 20.1716 0.46444Z"
                fill="currentColor" data-v-abc3f3a6=""></path>
            </svg></span></button></div>
    </div>
  </div>
  <div class="row" data-v-dc674ec6="">
    <p class="form-consent col col-12 col-lg-8" data-v-58eb17ea="" data-v-dc674ec6=""><span class="consent-icon" data-v-58eb17ea=""><svg data-v-58eb17ea="" width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"
          class="svg-icon">
          <circle cx="8" cy="8" r="7.5" stroke="#9E9EAC"></circle>
          <rect x="7" y="6" width="2" height="7" rx="1" fill="#9E9EAC"></rect>
          <circle cx="8" cy="4" r="1" fill="#9E9EAC"></circle>
        </svg></span> <span class="consent-text" data-v-58eb17ea=""> By submitting this form, you agree to be contacted about vRx and other Vicarius products. </span></p>
  </div>
</form>

Text Content

+ Product
+ Solution
Pricing
+ Community
+ Company
Contact
Login
Start Free Trial

NMAP NMAP
NMAP NMAP NMAP NMAP


NETWORK SCANNER


GET FULL VISIBILITY INTO YOUR NETWORK, VISUALIZED IN AN INTUITIVE VULNERABILITY
SCANNING DASHBOARD.

Perform a network scan with Nmap, the most popular network mapper and
vulnerability scanner, and let vRx turn it into a vibrant dashboard of your Nmap
XML file results.

Watch Video


SCAN



TURN YOUR NMAP XML INTO A VIBRANT DASHBOARD


vRx makes it easy - just run a scan with Nmap, the most popular vulnerability
scanning tool, and import the XML file to vRx. The result is an interactive
dashboard that visualizes the scan results in graphs, pie charts, and more.

280
280
56
56






NETWORK VISIBILITY IN 3 STEPS

01



GENERATE SCRIPT

02



IMPORT XML

03



GET VISUALIZED DASHBOARD!


ANALYZE YOUR
ENVIRONMENT


VISIBILITY

NETWORK INSIGHTS

PORT MAPPING

SERVICES MAPPING


EFFICIENCY

SHARE SCAN RESULTS

HISTORICAL TRACKING

COMPLIANCE REPORTS


DETECTION

OS DETECTION

SYSTEMS INVENTORY

VULNERABILITY DETECTION


NETWORK SCANNER MAPPING

Network


NETWORK VISIBILITY

Get full network visibility and monitor the devices, systems, traffic, and
applications that utilize your IT infrastructure. Identify unusual traffic or
potential upgrades at a glance, protecting against breaches and giving a
full-picture view you can use to optimize your network.




PORT MAPPING

Enable your IT professionals to identify and map all ports and switches, as well
as any devices connected to the switch ports, giving them access to essential
network information. For each connected port, the platform will list all
relevant data for connected devices, such as IP address, OS, and more.




SERVICES MAPPING

Service maps give you the ability to keep track of your services and who is
using them, allowing you to identify potential problems, optimize services, and
track services with extreme accuracy.




VULNERABILITY DETECTION

With thorough vulnerability scanning and an advanced alert system, you’ll find
network vulnerabilities as soon as they’re detected. Early identification of
vulnerabilities can reduce downtime and give you the tools needed to handle
vulnerabilities before they can impact users or lead to breaches.




OS DETECTION

vRx will remotely identify your scanned host’s operating system by analyzing its
CP fingerprint, Windows Registry, Unix login, NTP, Windows SRVSVC, and more,
giving the information needed to perform TCP Sequence Predictability
Classification tests and preventing forged connections from accessing your
network.




COMPLIANCE REPORTS

vRx's advanced security capabilities help you stay on top of regulatory
compliance needs. Our automatically generated reports can be used to prove
compliance and your ability to meet the highest standards of security demanded
by regulatory bodies.


Play


SUPPORTED SCRIPT


NMAP OPEN PORT AND SERVICE DETECTION

nmap -sV -sT -O --top-ports 2000 -T4 -oX .xml

Copy


NMAP OPEN PORT, SERVICE AND VICARIUS VULNERABILITY DETECTION:

nmap -sV -sT -O --script=vicarius-vulnerability-scan.nse --top-ports 2000 -T4
-oX .xml

Copy


NMAP OPEN PORT, SERVICE AND SPRING4SHELL VULNERABILITY (CVE-2022-22965)
DETECTION:

nmap -sT -O --script=spring4shell.nse --top-ports 2000 -T4 -oX .xml

Copy
Start Scanning


GET STARTED

Get a fully visualized scan of your network assets in a few easy steps.

01


Download Nmap

Pick Your OS

Windows Linux Mac
02


Generate

vRx's Nmap Scan Script

03


Run Script

on assets connected to network

04


Import XML

into vRx

05


See Results

in a visual dashboard


DOWNLOAD THE PDF

Get It Now


START CLOSING SECURITY GAPS

 * 
   Risk reduction from Day 1
 * 
   Fast set-up and deployment
 * 
   Unified platform
 * 
   Full-featured 14-day trial

Get a Demo
Start Free Trial!


HAVE QUESTIONS?

Submit

By submitting this form, you agree to be contacted about vRx and other Vicarius
products.

Vicarius develops an autonomous vulnerability remediation platform to help
security teams protect their assets against software exploitation. Consolidating
vulnerability assessment, prioritization, and remediation, Vicarius strengthens
cyber hygiene and proactively reduces risk.


We're hiring!

SUPPORT

support@vicarius.io

SALES

sales@vicarius.io

MARKETING

info@vicarius.io
Product
Product Overview
Vulnerability Management
Patch Management
Patchless Protection
Auto Actions
Reporting
Network Scanner
xTags
0-Day Detection
Solution
Solution Overview
Case Studies
Knowledge
Research Center
Apps & OS Patch Catalog
Videos
Articles
Docs
Company
About
Investors
vconnect
Trust
Careers
Pricing
Pricing
Compare
vRx vs. Automox
vRx vs. ManageEngine
vRx vs. Rapid7
vRx vs. Tenable
vRx vs. Tanium
vRx vs. RMMs
vRx vs. Vulcan
vRx vs. PDQ
vRx vs. Qualys
vRx vs. SentinelOne
vRx vs. BigFix




Copyright © Vicarius. All rights reserved 2022. Privacy Policy and Terms of Use




CVE Invaders

We use cookies to enhance your experience while on our website, serve
personalized content, provide social media features and to optimize our traffic.
By continuing to browse the site you are agreeing to our use of cookies. More
info

Decline Accept