The workflow stays connectedfrom inventory to evidence.

NoxScan keeps assets, scans, verified findings, schedules, and PDF reports in one operating surface so your team can move from discovery to handoff without rebuilding context.

Assets

See monitored assets, new discoveries, and review state in one inventory.

Keep domains, ranges, and discovered services in one searchable inventory so you can tell what is covered before you ever open the findings queue.

1

Search domains, IP ranges, and discovered HTTP services from one list.

2

See monitored, new, and queued assets at a glance.

3

Add assets in bulk without leaving the same workflow.

Dashboard/Assets

Assets

Manage your monitored IPs and domains

Asset Usage
19 / 250
8% used231 remaining
on scale plan

New

0

Queued

0

Scanning

0

Scanned

19

Failed

0
Search assets...
Target Identity
Status & Age
nmap
scanme.nmap.org
Domain
ADDED Mar 25, 2026Scanned
HTTP Service on 37.27.238.227:8030
37.27.238.227:8030
Domain
ADDED Mar 20, 2026Scanned
web
caudena.com
Domain
ADDED Dec 07, 2025Scanned
Scans

Open a completed run and review every result without leaving the workflow.

Completed scans keep insight counts, asset tabs, severity filters, and detailed findings on one results page so you can audit coverage without stitching data together by hand.

1

Review total assets, severity counts, and run duration at the top of every scan.

2

Switch between IP and domain assets without leaving the result screen.

3

Open individual findings directly from the run that produced them.

Scan # 67

Completed

Started: Mar 25, 2026 at 23:52

Total assets

1

High insights

0

Medium insights

2

Low insights

18

Duration

00:08:38

Severity

scanme.nmap.org

nmap
5 findings
MediumCVSS 5.9
CVE-2023-48795
OpenSSH Terrapin Attack - Detection
scanme.nmap.org:22
Medium
SSH Weak Algorithms Supported
scanme.nmap.org:22
LowCVSS 5.3
Apache mod_negotiation - Pseudo Directory Listing
http://scanme.nmap.org/index
Low
SSH Diffie-Hellman Modulus <= 1024 Bits
scanme.nmap.org:22
Info
WAF Detection
http://scanme.nmap.org
Findings

Open a finding and keep remediation, evidence, and references attached.

The detail view keeps description, remediation guidance, affected target, raw evidence, and reference links attached to the verified issue so analysts can act without rebuilding context.

1

See severity, CVSS, and CVE context before you leave the queue.

2

Review remediation, evidence, and HTTP transaction details in one place.

3

Keep canonicalized variants and reference links attached to the same issue.

Dashboard/Finding details

OpenSSH Terrapin Attack - Detection

Open a verified finding and review description, remediation, evidence, HTTP transaction, and references without losing queue context.

Severity

Medium

CVSS

5.9

Affected URL

:22

References

3
MediumCVSS 5.9CVE-2023-48795
Description

The SSH transport protocol with certain OpenSSH extensions can allow attackers to bypass integrity checks and downgrade session security. The detail view keeps the description attached to the verified finding instead of pushing analysts into a separate knowledge base.

HTTP transaction
Request
const m = require("nuclei/ssh");
const c = m.SSHClient();
const response = c.ConnectSSHInfoMode(Host, Port);

function SupportsChaCha20() {
  const ciphersClientServer = response.ServerKex.CiphersClientServer;
  return ciphersClientServer.includes("[email protected]");
}
Response
Vulnerable to Terrapin
Canonicalized variants
Extracted evidence items
Vulnerable to Terrapin
Variant details
Variant 1   scanme.nmap.org:22
Request  -> OpenSSH extension negotiation
Response -> Vulnerable to Terrapin
Suggested remediation

Disable the affected chacha20-poly1305 and etm MAC combinations, or use unaffected algorithms such as AES-GCM until the SSH service is upgraded.

Affected URL
Target
scanme.nmap.org:22
Evidence
Matcher output
Vulnerable to Terrapin
Reference
github.com/RUB-NDS/Terrapin-Scanner
terrapin-attack.com
packetstormsecurity.com/files/176280
Schedules

Keep daily and weekly cadence visible before coverage slips.

Schedules, next execution times, and last runs stay visible to the same people who review results, so missed cadence does not stay hidden in background jobs.

1

See daily and weekly schedules in the same surface.

2

Review next execution and last run side by side.

3

Catch missed cadence before it becomes an audit gap.

Dashboard/Scan schedules

Scan schedules

Keep exposure telemetry current with daily and weekly automations that stay visible to the same operators.

Total schedules

6

Active

6

Running today

2

This week

14
Cadence tableNext execution
Daily perimeter sweep
Daily
18 assets
Listening
Mar 26, 00:47
Last: Mar 25, 00:47
API edge verification
Weekly
5 assets
Listening
Mar 28, 08:30
Last: Mar 21, 08:30
Public admin panel watch
Daily
3 assets
Listening
Mar 26, 04:10
Last: Mar 25, 04:10
Reports

Turn completed runs into evidence you can hand over.

PDF reports stay attached to the scan and verified findings behind them, so audit handoff does not depend on a separate reporting workflow.

1

Generate PDF evidence directly from completed runs.

2

Keep report history next to the scans that produced it.

3

Hand over reports that trace back to scope and date.

Dashboard/Executive reports

Security reports

Generate audit-ready evidence, download exports, and keep each report tied to its originating scan.

Total reports

18

PDF reports

12

Data exports

6

Control-mapped

18
Generated reportsExport history
R
RPT-000021
Scan #141 • Mar 23, 20263 verified findings • SOC 2 evidence
pdfDownload
R
RPT-000020
Scan #140 • Mar 22, 2026asset inventory export
csvDownload
R
RPT-000019
Scan #139 • Mar 21, 20262 high-severity findings
pdfDownload

Start scanning every port from one workflow.

Use the same connected surfaces for assets, scans, findings, schedules, and reports from your first asset onward.