We built NoxScan forteams who need the truth.

NoxScan exists because too many scanners force the same bad trade: shallow port coverage, noisy findings, or expensive platforms built for somebody else. We wanted one read-only workflow that scans the real public surface, strips obvious false positives, and turns completed runs into PDF reports your team can actually hand over.

TCP ports scanned on every paid plan65535
Starting price for the same core scanner$10/mo
No credentialed tests or agent rollout requiredRead-only
Generated from the runs that produced themPDF reports
Why we built it

We were tired of paying enterprise prices for partial answers.

The market kept forcing teams into the same compromise: shallow scans, noisy output, or giant platforms that still leave compliance owners rebuilding the story by hand. NoxScan is the answer we wanted to buy.

Coverage gap

Scanning 1000 ports and calling it complete is not honest security.

Admin panels, dev servers, databases, and forgotten services rarely stay on the neat common-port list. If the scanner never looks there, the team gets a false sense of coverage instead of a real picture of the public surface.

Noise tax

False positives waste more time than the scan is supposed to save.

Security output is only useful if engineers trust it. When a queue fills with raw engine noise, the real issue becomes triage cleanup instead of remediation. We built NoxScan to cut the obvious noise before a human spends time on it.

Audit scramble

A summary PDF is not the same thing as evidence.

Compliance teams need to show what was scanned, when it ran, what it found, and how that maps back to controls. Reports should stay tied to the scan and findings that produced them instead of becoming a disconnected export.

What we believe

The product follows a few hard rules.

These are the choices behind the scanner, the findings queue, the reports, and the pricing model.

Coverage

Scan the public surface the way attackers find it.

Every paid plan runs the full 65535-port sweep. When NoxScan finds HTTP on an IP, it creates a separate domain asset so discovered web services stay visible in the workflow instead of disappearing into a port list.

Signal

Reduce obvious noise before a person has to sort it.

AI filters obvious false positives and adds clearer risk explanations so the team sees cleaner findings and better context instead of raw engine output.

Evidence

Keep the asset, scan, finding, and PDF report in one chain.

Completed runs already know how to report. The evidence path stays attached to the scan history, which makes auditor handoff and internal review much cleaner.

Pricing

Keep scanner depth fixed; expand workflow capacity by plan.

We do gate higher-order workflow features like API access, webhooks, and white-label reporting. We do not gate the core scanner. The same scan depth stays available on every paid plan.

How we operate

NoxScan is a focused operating model, not a security suite.

We keep the scanner honest, the queue smaller, and the evidence path intact from the first run to the final report.

1

Scan the full public TCP surface

Every paid plan uses the same full scan depth. No premium scanner engine. No 1000-port shortcut.

2

Turn discovered web services into tracked assets

If a scan finds HTTP on an IP, NoxScan creates a domain asset so the service stays visible and actionable in the same workflow.

3

Filter obvious false positives and explain the risk

AI cuts queue noise and adds better context so engineers spend time on real issues, not cleanup work.

4

Generate PDF reports from completed runs

Reports stay attached to the scan and findings that produced them, which keeps handoff cleaner for auditors and internal reviewers.

Who we build for

NoxScan fits teams that need a cleaner scanner, not a larger platform.

The product is built for teams that want honest external coverage and a report path they can keep using month after month.

Startups

Founders and early engineering teams

Start with one asset, keep the same core scanner as you grow, and avoid the usual jump from “cheap but shallow” into “expensive and bloated.”

Platform

Platform teams that own the public surface

Use NoxScan when you need recurring external scanning, less queue noise, and a way to keep asset drift visible without adding another huge security suite.

Compliance

Compliance owners who still need technical truth

If the audit process depends on showing what was scanned and what evidence came out of it, NoxScan keeps that reporting chain intact instead of making you reconstruct it later.

About NoxScan

Questions we hear before teams switch scanners

Because the immediate problem for many teams is the public attack surface: what is reachable right now, what drifted, and what evidence can be shown to an auditor. NoxScan is designed for recurring external visibility without credential rollout, agent deployment, or the operational drag that comes with turning a scanner into a full internal platform.

Yes. The full 65535-port scanner stays the same on every paid plan. What changes by tier is workflow capacity: more assets, more seats, API access, webhooks, white-label reporting, and similar higher-order features.

NoxScan uses AI to remove obvious false positives and add clearer risk explanations. It is there to reduce cleanup work and improve context, not to replace the underlying scan engines.

Because evidence is only useful when it stays attached to the scan history that produced it. NoxScan keeps the asset, scan, finding, and report connected so your team can show when a run happened, what it covered, and what it found without rebuilding the story later.

If the scanner should be honest, the workflow should be too.

Start with the same core scanner depth NoxScan uses everywhere: full TCP coverage, cleaner findings, and PDF reports from completed runs.