About

Our Mission
With open source tools and intelligence, we help organizations with attack surface discovery and identification of security vulnerabilities.

Attack Surface Discovery

Identification of an organizations vulnerabilities is an impossible task without tactical intelligence on the network footprint. By combining open source intelligence with the worlds best open source security scanning tools, we enable your attack surface discovery.

With the ability for Internet assets to be deployed in seconds, the attack surface is more dynamic and ever growing. This very fact makes mapping your external network footprint a hard problem. We aim to provide solutions to solve this problem. Start with our tools for domain and IP address data, then pivot to mapping the exposure with hosted open source scanners.

Vulnerability Identification

You need more than one vulnerability scanning tool. No vulnerability scanner will detect all the vulnerabilities across all your network assets. By combining a number of different types of vulnerability scanners you can get a more accurate picture of your vulnerability exposure.

Our hosted vulnerability scanners are trusted open source tools, used around the world by thousands of security professionals.

Experience and Trust

Hi, my name's Peter, and here's the backstory.

In security there is no silver bullet. You cannot buy a service or product and say "Well that's it. Job done!". Security takes work and an understanding of the tools and resources at your disposal. Then using those tools in an intelligent manner to develop an accurate assessment of your vulnerability exposure.

Early in my information security career I spent many hours protecting Australian corporations from vendor silver bullets. Here's a summary, "Buy our blinky light box, it will solve all your problems!".

Over the years I built a number of in house security solutions based around open source tools. In 2007, taking my understanding of the value in open source security tools, I hosted an Online Nmap Scan. That was the beginning.

Since then, HackerTarget.com has grown with a remote team operating from three continents and servers in London, New York and Canberra. We provide enterprises both large and small with tactical security reporting. Actionable information that lets an organization close security holes.

Frequently Asked Questions

What are the Advantages of Hosted Vulnerability Scanners?

There are a number of advantages, here are the top two straight from our customer feedback.

1. The hosted scanners are able to scan your Internet systems from the attackers perspective. This allows you to get an accurate picture of your exposure and to eliminate false positives / and false negatives.

2. No software needs to be maintained or installed, saving your operations staff time. There are not many operations teams who could not do with some more time.

What's with the name?

The name Hacker Target comes from the fact that everyone really is a target. It does not matter that you are a small profile organisation, or you do not store credit cards on your systems. Attacks may be targeted at your organisation or you may be merely a target of opportunity.

Either way, if you have systems on the Internet you will be attacked.

How much does it cost?
Different plans are available with higher end plans being able to use all features and scan a large number of Internet facing assets.Check out the membership plans for more details.


What IP address ranges do your scanners use?
If you wish to look for incoming scans in your log files or perhaps white list our scanners in your intrusion detection / prevention devices use the following networks.

35.186.165.146
45.79.156.38
45.33.78.216
45.33.72.228
23.239.10.53
45.33.82.212
45.79.153.247
45.79.172.115
45.56.96.241
45.56.104.239
69.164.213.162
45.79.67.158
50.116.52.162
45.56.105.153
45.79.143.109
45.79.171.79
45.79.165.80
45.79.182.49
45.79.186.109
45.79.131.38
45.79.139.184
45.79.171.189
45.79.171.243
45.79.187.200
45.79.148.225
45.79.156.141
13.68.211.181
45.79.135.127
45.79.143.77
45.79.190.85
45.79.156.114
45.79.164.146
45.79.137.25
45.79.145.110
45.79.140.87
45.79.151.112
45.79.167.83
45.79.183.150
45.79.191.91
45.79.160.132
45.79.168.80
45.79.176.252
45.79.134.117
45.79.142.224
45.79.137.182
66.175.214.247


I detected an unauthorized scan of my host. Who do I call?
Please use the contact form to provide details. We will work with you to block any offending users, investigate the transaction and conduct an investigation for any illegal activities or misuse. In fact most instances of suspicious scanning we have investigated ended up being a test by a system administrator or developer who did not let the security team know!!

What is your privacy policy?
We do not spam. In fact we even dislike vendor spam, so by using our services you can be assured that we will not sell your address or spam you with daily offers.

Privacy Policy

Scan results are stored locally in the office, in an encrypted container for analysis in the event of an abuse report. They are kept for at least 6 months.