From c1b87c9ac45f9e839e7a88eb394a435dc99cb15c Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Mon, 17 Mar 2025 18:03:48 +0000 Subject: [PATCH 1/9] [Security Center] Open Port Scanning --- .../cloudforce-one/open-port-scanning.mdx | 42 +++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx new file mode 100644 index 00000000000000..5e05d878224c4a --- /dev/null +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -0,0 +1,42 @@ +--- +pcx_content_type: how-to +title: Open Port Scanning +sidebar: + order: 11 + badge: + text: Beta +--- + +Open Port Scanning Beta feature allows Magic Transit and Bring your Own IP customers to efficiently monitor their IP ranges for security vulnerabilities. This feature enables users to scan their designated IP ranges, detect any open ports, and receive daily notifications regarding newly opened ports. + +You can access this feature via the [API](https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/scans/subresources/config/). + +## Prerequisites + +- User with specific permission: Cloudforce One Write, Administrator and Super Administrator. +- Account token: **Custom API Token** > **Cloudforce One:Edit**. + +## Configure Open Port Scanning + +To configure Open Port Scanning, follow these steps: + +1. Configure the first scan parameters: + - **IPs**: Enter the IP ranges you wish to monitor. Ensure that the ranges are correctly formatted to avoid scanning errors. The system will validate if the IPs requested are onboarded to Cloudflare and associated to the account belonging to the API token used. + - **Frequency**: Enter the scan frequency in days. + - **Ports**: Select the ports to scan. Choose among: + - All + - Default + - List of specific ports +2. **Scan IPs**: Initiate the scanning process. The system will analyze the specified IP ranges to identify any open ports. +3. **Generate list of Open Ports**: Once the scan is complete, the API will generate a list of detected open ports for review and action. +4. **Select Open Ports to list**: Choose which open ports you would like to be notified about. You can exclude any ports that do not require immediate attention. +5. **View differences from previous scan**: The system will highlight any changes in open ports since the last scan, allowing you to quickly assess new vulnerabilities. +6. **Stop Scanning**: If necessary, you can stop the scanning process at any time. +7. **Set up alerts**: Configure alerts for specific ports of interest. You will be notified immediately via email or webhook if any of these designated ports become newly open. + +Note: permissions + +:::note[Beta feature notice] +Open Port Scanning feature is currently in closed beta. We appreciate your feedback as we work to enhance its functionality and user experience. +If you want to subscribe to this feature or participate in the beta program, [Join Our Closed Beta For Port Scanning](https://www.cloudflare.com/en-gb/lp/open-port-scanning-beta/). +::: \ No newline at end of file From 99c931354c4fc9dcf1f8090f8bc7c34e40af94f3 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Tue, 18 Mar 2025 10:52:06 +0000 Subject: [PATCH 2/9] Update src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com> --- .../docs/security-center/cloudforce-one/open-port-scanning.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index 5e05d878224c4a..53e3195ae96b8c 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -9,7 +9,7 @@ sidebar: Open Port Scanning Beta feature allows Magic Transit and Bring your Own IP customers to efficiently monitor their IP ranges for security vulnerabilities. This feature enables users to scan their designated IP ranges, detect any open ports, and receive daily notifications regarding newly opened ports. -You can access this feature via the [API](https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/scans/subresources/config/). +You can access this feature via the [API](/api/resources/cloudforce_one/subresources/scans/subresources/config/). ## Prerequisites From be43518c3a0e3718562a18b332f9fcb75bbc143e Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Tue, 18 Mar 2025 12:02:15 +0000 Subject: [PATCH 3/9] :wq --- .../docs/security-center/cloudforce-one/open-port-scanning.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index 53e3195ae96b8c..67f19c187dd397 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -13,7 +13,7 @@ You can access this feature via the [API](/api/resources/cloudforce_one/subresou ## Prerequisites -- User with specific permission: Cloudforce One Write, Administrator and Super Administrator. +- Users with specific permissions: Cloudforce One Write, Administrator and Super Administrator. - Account token: **Custom API Token** > **Cloudforce One:Edit**. ## Configure Open Port Scanning From e739b0e2e6d74af8f8e7cbb9d8e0202074bf59ea Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Tue, 18 Mar 2025 14:52:23 +0000 Subject: [PATCH 4/9] Adding faq questions --- .../cloudforce-one/open-port-scanning.mdx | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index 67f19c187dd397..10f8350e412387 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -39,4 +39,12 @@ Note: permissions :::note[Beta feature notice] Open Port Scanning feature is currently in closed beta. We appreciate your feedback as we work to enhance its functionality and user experience. If you want to subscribe to this feature or participate in the beta program, [Join Our Closed Beta For Port Scanning](https://www.cloudflare.com/en-gb/lp/open-port-scanning-beta/). -::: \ No newline at end of file +::: + +## Frequently Asked Questions + +1. What IPs will the scan come from? + +- 2a09:bac0:1008:5000:1000:0000:0000:0050/104.30.128.13 +- 2a09:bac0:1008:5000:1000:0000:0000:0048/104.30.129.33 +- 2001:19f0:1000:2941:5400:4ff:fe70:2a7a/140.82.60.241 \ No newline at end of file From 2ddf4f3e866e3919855b2680e1130067d79f6bce Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 19 Mar 2025 12:01:30 +0000 Subject: [PATCH 5/9] updating faqs + adding token instructions --- .../cloudforce-one/open-port-scanning.mdx | 45 ++++++++++++++++--- 1 file changed, 38 insertions(+), 7 deletions(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index 10f8350e412387..a73eafce4cfda0 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -14,13 +14,27 @@ You can access this feature via the [API](/api/resources/cloudforce_one/subresou ## Prerequisites - Users with specific permissions: Cloudforce One Write, Administrator and Super Administrator. -- Account token: **Custom API Token** > **Cloudforce One:Edit**. +- Account token: **Custom API Token** > **Cloudforce One:Edit**. + +To create a custom API token: + +1. From the [Cloudflare dashboard](https://dash.cloudflare.com/profile/api-tokens/), go to **My Profile** > **API Tokens** for user tokens. Go to **Create Custom Token** > **Get started**. +2. Enter a **Token name**, for example, `Open Port Scanning`. +3. In **Permissions**: + - Choose **Account**. + - Select **Cloudforce One** as the account. + - Choose **Edit** access. +4. In Client IP Address Filtering: + - In **Operator**, select `is in`. + - In **Value**, enter a valid IP address. +5. Select **Continue to summary**. +6. Review the token, then select **Create Token**. ## Configure Open Port Scanning To configure Open Port Scanning, follow these steps: -1. Configure the first scan parameters: +1. **Create A New Scan Config**: - **IPs**: Enter the IP ranges you wish to monitor. Ensure that the ranges are correctly formatted to avoid scanning errors. The system will validate if the IPs requested are onboarded to Cloudflare and associated to the account belonging to the API token used. - **Frequency**: Enter the scan frequency in days. - **Ports**: Select the ports to scan. Choose among: @@ -30,14 +44,14 @@ To configure Open Port Scanning, follow these steps: 2. **Scan IPs**: Initiate the scanning process. The system will analyze the specified IP ranges to identify any open ports. 3. **Generate list of Open Ports**: Once the scan is complete, the API will generate a list of detected open ports for review and action. 4. **Select Open Ports to list**: Choose which open ports you would like to be notified about. You can exclude any ports that do not require immediate attention. -5. **View differences from previous scan**: The system will highlight any changes in open ports since the last scan, allowing you to quickly assess new vulnerabilities. +5. **View differences from previous scan**: The API will highlight any changes in open ports since the last scan, allowing you to quickly assess new vulnerabilities. 6. **Stop Scanning**: If necessary, you can stop the scanning process at any time. 7. **Set up alerts**: Configure alerts for specific ports of interest. You will be notified immediately via email or webhook if any of these designated ports become newly open. Note: permissions :::note[Beta feature notice] -Open Port Scanning feature is currently in closed beta. We appreciate your feedback as we work to enhance its functionality and user experience. +Open Port Scanning feature is currently in closed beta. The Cloudforce One team appreciates your feedback as the team works to enhance its functionality and user experience. If you want to subscribe to this feature or participate in the beta program, [Join Our Closed Beta For Port Scanning](https://www.cloudflare.com/en-gb/lp/open-port-scanning-beta/). ::: @@ -45,6 +59,23 @@ If you want to subscribe to this feature or participate in the beta program, [J 1. What IPs will the scan come from? -- 2a09:bac0:1008:5000:1000:0000:0000:0050/104.30.128.13 -- 2a09:bac0:1008:5000:1000:0000:0000:0048/104.30.129.33 -- 2001:19f0:1000:2941:5400:4ff:fe70:2a7a/140.82.60.241 \ No newline at end of file + - `2a09:bac0:1008:5000:1000:0000:0000:0050/104.30.128.13` + - `2a09:bac0:1008:5000:1000:0000:0000:0048/104.30.129.33` + - `2001:19f0:1000:2941:5400:4ff:fe70:2a7a/140.82.60.241` + +2. Can the Port Scanner bypass other security rules configured? + + - The Cloudforce One team asks customers to ensure they allow the IPs for the scanner to run correctly. + +3. How long do scans take? + + - Depending on the number of IP addresses, scans can take up to 10 hours. + +4. Can I stop automatic scanning? + + - Yes, you can decide at any point to stop scan and restart scans when it is convenient for you. + +5. What are the limitations for the scans? + + - Scans are limited to ranges of up to 5,000 IPs. + - The API scans both IPv4 and IPv6 IP addresses. \ No newline at end of file From 8651cd331c2645f3e799bdffd03051c7b2e5d5e1 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 19 Mar 2025 13:51:54 +0000 Subject: [PATCH 6/9] Adding note and updating formatting --- .../cloudforce-one/open-port-scanning.mdx | 20 ++++++++++--------- 1 file changed, 11 insertions(+), 9 deletions(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index a73eafce4cfda0..aa61123255dfd5 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -7,13 +7,13 @@ sidebar: text: Beta --- -Open Port Scanning Beta feature allows Magic Transit and Bring your Own IP customers to efficiently monitor their IP ranges for security vulnerabilities. This feature enables users to scan their designated IP ranges, detect any open ports, and receive daily notifications regarding newly opened ports. +Open Port Scanning allows [Magic Transit](/magic-transit/) and [Bring your Own IPs](/byoip/) users to efficiently monitor IP ranges for security vulnerabilities. This API enables users to scan their designated IP ranges, detect any open ports, and receive daily notifications regarding newly opened ports. You can access this feature via the [API](/api/resources/cloudforce_one/subresources/scans/subresources/config/). ## Prerequisites -- Users with specific permissions: Cloudforce One Write, Administrator and Super Administrator. +- Cloudforce One Administrator, Administrator and Super Administrator roles. - Account token: **Custom API Token** > **Cloudforce One:Edit**. To create a custom API token: @@ -30,26 +30,28 @@ To create a custom API token: 5. Select **Continue to summary**. 6. Review the token, then select **Create Token**. +:::note +The Open Port Scanner will run from a predetermined set of IPs. The Cloudforce One team recommends you to allowlist these IPs in your rules. +::: + ## Configure Open Port Scanning To configure Open Port Scanning, follow these steps: -1. **Create A New Scan Config**: - - **IPs**: Enter the IP ranges you wish to monitor. Ensure that the ranges are correctly formatted to avoid scanning errors. The system will validate if the IPs requested are onboarded to Cloudflare and associated to the account belonging to the API token used. +1. **Create a new scan config**: + - **IPs**: Enter the IP ranges you wish to monitor. Ensure that the ranges are correctly formatted to avoid scanning errors. The API will validate if the IPs requested are onboarded to Cloudflare and associated to the account belonging to the API token used. - **Frequency**: Enter the scan frequency in days. - **Ports**: Select the ports to scan. Choose among: - All - Default - List of specific ports 2. **Scan IPs**: Initiate the scanning process. The system will analyze the specified IP ranges to identify any open ports. -3. **Generate list of Open Ports**: Once the scan is complete, the API will generate a list of detected open ports for review and action. -4. **Select Open Ports to list**: Choose which open ports you would like to be notified about. You can exclude any ports that do not require immediate attention. +3. **Generate list of open ports**: Once the scan is complete, the API will generate a list of detected open ports for review and action. +4. **Select open ports to list**: Choose which open ports you would like to be notified about. You can exclude any ports that do not require immediate attention. 5. **View differences from previous scan**: The API will highlight any changes in open ports since the last scan, allowing you to quickly assess new vulnerabilities. -6. **Stop Scanning**: If necessary, you can stop the scanning process at any time. +6. **Stop scanning**: If necessary, you can stop the scanning process at any time. 7. **Set up alerts**: Configure alerts for specific ports of interest. You will be notified immediately via email or webhook if any of these designated ports become newly open. -Note: permissions - :::note[Beta feature notice] Open Port Scanning feature is currently in closed beta. The Cloudforce One team appreciates your feedback as the team works to enhance its functionality and user experience. If you want to subscribe to this feature or participate in the beta program, [Join Our Closed Beta For Port Scanning](https://www.cloudflare.com/en-gb/lp/open-port-scanning-beta/). From 894bc9c4102481507337e5c6425bad2f2762d21a Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 19 Mar 2025 14:45:27 +0000 Subject: [PATCH 7/9] adding list of default ports --- .../cloudforce-one/open-port-scanning.mdx | 111 +++++++++++++++++- 1 file changed, 110 insertions(+), 1 deletion(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index aa61123255dfd5..fc0108778e2dd4 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -7,6 +7,10 @@ sidebar: text: Beta --- +import { Details } from "~/components" + + + Open Port Scanning allows [Magic Transit](/magic-transit/) and [Bring your Own IPs](/byoip/) users to efficiently monitor IP ranges for security vulnerabilities. This API enables users to scan their designated IP ranges, detect any open ports, and receive daily notifications regarding newly opened ports. You can access this feature via the [API](/api/resources/cloudforce_one/subresources/scans/subresources/config/). @@ -43,7 +47,7 @@ To configure Open Port Scanning, follow these steps: - **Frequency**: Enter the scan frequency in days. - **Ports**: Select the ports to scan. Choose among: - All - - Default + - Default (refer to [Default ports](/security-center/cloudforce-one/open-port-scanning/#default-ports) for a comprehensive list) - List of specific ports 2. **Scan IPs**: Initiate the scanning process. The system will analyze the specified IP ranges to identify any open ports. 3. **Generate list of open ports**: Once the scan is complete, the API will generate a list of detected open ports for review and action. @@ -57,6 +61,111 @@ Open Port Scanning feature is currently in closed beta. The Cloudforce One team If you want to subscribe to this feature or participate in the beta program, [Join Our Closed Beta For Port Scanning](https://www.cloudflare.com/en-gb/lp/open-port-scanning-beta/). ::: +## Default ports + +
+- 80 +- 631 +- 161 +- 137 +- 123 +- 138 +- 1434 +- 445 +- 135 +- 67 +- 23 +- 53 +- 443 +- 21 +- 139 +- 22 +- 500 +- 68 +- 520 +- 1900 +- 25 +- 4500 +- 514 +- 49152 +- 162 +- 69 +- 5353 +- 111 +- 49154 +- 3389 +- 110 +- 1701 +- 998 +- 996 +- 997 +- 999 +- 3283 +- 49153 +- 445 +- 1812 +- 136 +- 139 +- 143 +- 53 +- 2222 +- 135 +- 3306 +- 2049 +- 32768 +- 5060 +- 8080 +- 1025 +- 1433 +- 3456 +- 80 +- 1723 +- 111 +- 995 +- 993 +- 20031 +- 1026 +- 7 +- 5900 +- 1646 +- 1645 +- 593 +- 1025 +- 518 +- 2048 +- 626 +- 1027 +- 587 +- 177 +- 1719 +- 427 +- 497 +- 8888 +- 4444 +- 1023 +- 65024 +- 199 +- 19 +- 9 +- 49193 +- 1029 +- 1720 +- 49 +- 465 +- 88 +- 1028 +- 17185 +- 1718 +- 49186 +- 548 +- 113 +- 81 +- 6001 +- 2000 +- 10000 +- 31337 +
+ ## Frequently Asked Questions 1. What IPs will the scan come from? From f373d096e8a5897c9c7fa98df329a55a5b7c2c6b Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 20 Mar 2025 10:05:50 +0000 Subject: [PATCH 8/9] Apply suggestions from code review Co-authored-by: Max Phillips --- .../security-center/cloudforce-one/open-port-scanning.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index fc0108778e2dd4..ddb75aec4699ee 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -17,7 +17,7 @@ You can access this feature via the [API](/api/resources/cloudforce_one/subresou ## Prerequisites -- Cloudforce One Administrator, Administrator and Super Administrator roles. +- Cloudforce One Administrator, Administrator and Super Administrator roles. - Account token: **Custom API Token** > **Cloudforce One:Edit**. To create a custom API token: @@ -58,7 +58,7 @@ To configure Open Port Scanning, follow these steps: :::note[Beta feature notice] Open Port Scanning feature is currently in closed beta. The Cloudforce One team appreciates your feedback as the team works to enhance its functionality and user experience. -If you want to subscribe to this feature or participate in the beta program, [Join Our Closed Beta For Port Scanning](https://www.cloudflare.com/en-gb/lp/open-port-scanning-beta/). +If you want to subscribe to this feature or participate in the beta program, [join our closed beta for Port Scanning](https://www.cloudflare.com/lp/open-port-scanning-beta/). ::: ## Default ports From 8f99707a7ceb44a14f00d5db2f976f338c513e65 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 20 Mar 2025 12:25:26 +0000 Subject: [PATCH 9/9] Updating list of ports and faq question --- .../cloudforce-one/open-port-scanning.mdx | 202 +++++++++--------- 1 file changed, 101 insertions(+), 101 deletions(-) diff --git a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx index ddb75aec4699ee..adb331fa2dae8b 100644 --- a/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx +++ b/src/content/docs/security-center/cloudforce-one/open-port-scanning.mdx @@ -64,106 +64,106 @@ If you want to subscribe to this feature or participate in the beta program, [j ## Default ports
-- 80 -- 631 -- 161 -- 137 -- 123 -- 138 -- 1434 -- 445 -- 135 -- 67 -- 23 -- 53 -- 443 -- 21 -- 139 -- 22 -- 500 -- 68 -- 520 -- 1900 -- 25 -- 4500 -- 514 -- 49152 -- 162 -- 69 -- 5353 -- 111 -- 49154 -- 3389 -- 110 -- 1701 -- 998 -- 996 -- 997 -- 999 -- 3283 -- 49153 -- 445 -- 1812 -- 136 -- 139 -- 143 -- 53 -- 2222 -- 135 -- 3306 -- 2049 -- 32768 -- 5060 -- 8080 -- 1025 -- 1433 -- 3456 -- 80 -- 1723 -- 111 -- 995 -- 993 -- 20031 -- 1026 -- 7 -- 5900 -- 1646 -- 1645 -- 593 -- 1025 -- 518 -- 2048 -- 626 -- 1027 -- 587 -- 177 -- 1719 -- 427 -- 497 -- 8888 -- 4444 -- 1023 -- 65024 -- 199 -- 19 -- 9 -- 49193 -- 1029 -- 1720 -- 49 -- 465 -- 88 -- 1028 -- 17185 -- 1718 -- 49186 -- 548 -- 113 -- 81 -- 6001 -- 2000 -- 10000 -- 31337 +- `80` +- `631` +- `161` +- `137` +- `123` +- `138` +- `1434` +- `445` +- `135` +- `67` +- `23` +- `53` +- `443` +- `21` +- `139` +- `22` +- `500` +- `68` +- `520` +- `1900` +- `25` +- `4500` +- `514` +- `49152` +- `162` +- `69` +- `5353` +- `111` +- `49154` +- `3389` +- `110` +- `1701` +- `998` +- `996` +- `997` +- `999` +- `3283` +- `49153` +- `445` +- `1812` +- `136` +- `139` +- `143` +- `53` +- `2222` +- `135` +- `3306` +- `2049` +- `32768` +- `5060` +- `8080` +- `1025` +- `1433` +- `3456` +- `80` +- `1723` +- `111` +- `995` +- `993` +- `20031` +- `1026` +- `7` +- `5900` +- `1646` +- `1645` +- `593` +- `1025` +- `518` +- `2048` +- `626` +- `1027` +- `587` +- `177` +- `1719` +- `427` +- `497` +- `8888` +- `4444` +- `1023` +- `65024` +- `199` +- `19` +- `9` +- `49193` +- `1029` +- `1720` +- `49` +- `465` +- `88` +- `1028` +- `17185` +- `1718` +- `49186` +- `548` +- `113` +- `81` +- `6001` +- `2000` +- `10000` +- `31337`
## Frequently Asked Questions @@ -180,7 +180,7 @@ If you want to subscribe to this feature or participate in the beta program, [j 3. How long do scans take? - - Depending on the number of IP addresses, scans can take up to 10 hours. + - Depending on the number of IP addresses and number of ports scanned, scans can take between a few minutes and up to 10 hours. 4. Can I stop automatic scanning?