OpenVAS (Open Vulnerability Assessment Scanner)
OpenVAS is a comprehensive network vulnerability scanner. It probes hosts and services across your network to identify security weaknesses using an extensive feed of network and application tests.
What it does
OpenVAS detects CVEs, misconfigurations, and outdated software across network services. It is designed for deep infrastructure assessment rather than crawling a single web URL as a browser would.
Target types
Use IP addresses, hostnames, and CIDR ranges. Do not enter web URLs that include http:// or https:// - OpenVAS expects network targets, not full site URLs.
Target format
Strip schemes and paths. Use hosts or subnets the scanner can reach on the network.
When to use this scanner
OpenVAS is ideal for SOC 2 compliance scanning, infrastructure vulnerability assessment, and ongoing visibility into servers and services. It fits teams that need broad coverage of CVEs and misconfigurations on networked systems.
Internal network scanning (Pro plan) lets you assess private networks. It requires an Ubuntu VM with 8 GB+ RAM and Docker to run the scanner appliance. Scan duration varies from minutes to hours depending on how many hosts and ports are in scope.
Internal scanning
Pro plan internal scans need the supported VM setup. Allow enough time for large subnets - OpenVAS runs many checks per host.
Target format
Examples of valid targets:
192.0.2.10
db.internal.example.com
198.51.100.0/24
Examples of invalid targets for OpenVAS:
https://app.example.com/
http://192.0.2.10/
https://example.com/login
How to run a scan
Open the New Scan page from your dashboard. Select OpenVAS as the scan type, enter one or more targets in the correct format (see above), give the scan a name, set an optional schedule if you want recurring runs, then submit the form to queue the scan. For more detail on options and schedules, see Running Scans.