Internal Network Scanning
HostedScan provides scalable and secure options to connect vulnerability scanners on internal networks to hostedscan.com for centralized management and reporting.
This secure solution does not require any open ports, tunnels, or other access to your network.
How it works
To run vulnerability scans on an internal network, you will install trusted scanners that are widely used across the industry by millions of cybersecurity professionals along with a lightweight agent application on a single scanning server. The agent interfaces with the vulnerability scanners and connects to HostedScan to enable full command and control from your HostedScan dashboard.
Internal scanning requires a Premium or MSP account. If you have a Premium or MSP account, please contact us to enable internal scanning for your account.

Setup and run the HostedScan agent
Before starting, ensure that you have an account that allows Internal Scanning. See our pricing page for more information on internal scanning.
For detailed system requirements, see the Install Agent on Linux guide.
- Connect a new agent by clicking on Connect Agent on the targets page.

- Choose a name for the source network. You will initiate scans under this source network, and discovered targets will be grouped by it.

- Download the agent for Linux, and install the agent according to our Install Agent on Linux guide.
Ensure that you copy the HostedScan agent registration key before closing the modal. The key is used to authenticate your installation of the agent to hostedscan.com.

- At this point, HostedScan agent source network will show as Disconnected in the Sources table.

- Start the HostedScan agent application by running the following commands on your scanning server:
You should see the source network transition from Disconnected to Connected in the HostedScan dashboard.
Run your first scan
- Click the Scan button for your source network.

-
Set Scope: Enter the IP ranges and individual IP addresses you want to scan. You can:
- Add CIDR ranges (e.g.,
192.168.1.0/24
) to scan entire subnets - Add individual IP addresses (e.g.,
192.168.1.100
) for specific targets - Add ranges of IP addresses (e.g.,
192.168.1.15-192.168.1.100
) for specific sub ranges of targets - Use multiple ranges to scan different network segments in a single scan
For each item or range added, you can add specific tags that will be added to each target discovered in that range.
- Add CIDR ranges (e.g.,

Tagging ranges during setup helps organize discovered targets by location, department, or function (e.g., "servers", "workstations", "DMZ"). Tags make it easier to filter and analyze results later.
- Configure Scan Settings: Choose your scan configuration options including:
- Schedule when to run the scan (now or future time)
- Email notifications for scan completion
- OpenVAS settings for internal network scans (credentials, SSH port, alive test). See Enhanced Scanning with Authentication for more details on credentials and authenticated scanning.

- Review and Start: Review your scan configuration and click Run Scan to start the vulnerability assessment.

- Monitor Progress: The scan will begin and you can monitor its progress. Depending on the number of IPs and services running, scans may take hours or even a day to complete.

Once completed, the following information is available in the HostedScan platform:
- Scan reports - can be found on the scans page.
- Discovered Targets - can be found on the targets page. You can use the filters to narrow to the source network or by tags.
- Detected Risks - can be found on the risks page. You can use filters to narrow to the source network or by tags.
Enhanced Scanning with Authentication
For more comprehensive vulnerability assessment, HostedScan supports OpenVAS authenticated scanning which allows the scanner to log into target systems and perform deeper security analysis.
Authenticated scanning provides significantly more detailed results by accessing internal system configuration, installed software, and security settings that are not visible from network-level scans alone.
To set up authenticated scanning:
- Configure credentials on your scanning server using the agent's credential management commands
- Test credentials against a target systems to ensure they work correctly
- Select credentials when configuring scans in the HostedScan dashboard
For detailed instructions on setting up and using authenticated scanning, see the Authenticated Scanning guide.
What's Next?
- Install Agent on Linux - Detailed installation and setup instructions
- Authenticated Scanning - Set up credentials for comprehensive vulnerability assessment