Multi-Dimensional Scanning

Scans for website, host, and middleware vulnerabilities, as well as weak passwords.

Automatic Monitoring

Monitors the latest network vulnerabilities in real time, updates detection rules immediately, and detects asset risks promptly.

Intelligent Scanning

Using harmless scan, dynamically adjusts scanning frequency and analyze how detection results are correlated.

Compliance Checking

Compliance with Huawei and Center for Internet Security (CIS) benchmarks, checks for configuration weaknesses to expose vulnerabilities.

Application Scenarios

  • Website Vulnerability Scan

  • Host Vulnerability Scan

  • Weak Password Scan

  • Middleware Scan

Website Vulnerability Scan

Website Vulnerability Scan

Website vulnerabilities are likely to be exploited by hackers, which can have a crippling impact and lead to financial loss if not addressed quickly.


  • Scanning for Common Vulnerabilities

    Incorporates a vulnerability rule library for scanning all types of websites and produces comprehensive scan reports.

  • Scanning for the Latest Critical Vulnerabilities

    Security experts analyze the latest critical vulnerabilities and update rules to provide the fastest and professional CVE vulnerability scan.

Related Services


Host Vulnerability Scan

Host Vulnerability Scan (Coming Soon)

Hosts delivering important services may be exposed to vulnerabilities and non-compliant configurations.


  • In-Depth Scanning

    Connects to servers for operating system (OS) detection, multi-dimensional detection, and configuration checking after verification.

  • Intranet Scanning

    Allows access to servers where services are running using the password. This feature is ideal for enterprise networks.

Related Services


Weak Password Scan

Weak Password Scan

Passwords are usually used for remote login to assets such as hosts or middleware. Attackers often use scanning technologies to hack usernames and weak passwords.


  • Multi-Scenario Applicability

    Offers weak password detection for standard web services, all OSs, and 90% of all middleware, including databases.

  • Built-in Weak Password Library

    Simulates hacker detection of weak passwords in various scenarios. You can also use your own weak password library to detect passwords.

Related Services


Middleware Scan

Middleware Scan (Coming Soon)

If a hacker discovers and exploits vulnerabilities in the middleware, the security of the upper layer and lower layer is compromised.


  • Diverse Scenarios

    Supports vulnerability scanning of foreground development frameworks, and background microservices, as well as configuration compliance scanning.

  • Multiple Scan Methods

    Chooses standard scan or custom scan to identify the middleware and its version in the server and discover vulnerabilities and risks.

Related Services



Vulnerability Scan

Enables specialized vulnerability scanning of assets, including web applications, hosts, middleware and weak passwords.

  • Weak passwords

    SSH, RDP, SMB, MySQL, Microsoft SQL Server, MongoDB, Redis, Oracle, DB2, GaussDB, Postgres, and Telnet

  • Web injections

    Command injection, code injection, XPath injection, Server-Side Request Forgery (SSRF), and deserialization

  • Front-end vulnerabilities

    SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and URL redirection

  • File inclusion

    Reading, inclusion, and upload of any file, and XML External Entity attack (XXE attack)

  • Information leakage

    Port exposure, directory traversal, backup files, insecure files, insecure HTTP methods, and insecure ports

Smart Monitoring

Dynamically adjusts the scan speed, monitors the latest network vulnerabilities 24/7, and responds in real time.

  • Critical vulnerability detection

    Experts update detection rules upon discovering critical and high-risk vulnerabilities, help locate the affected servers or websites, and provide detailed recommended steps for resolving potential security issues.

  • Intelligent scan speed control

    Used for adjusting the scan speed based on site load, ensuring service continuity.

  • Harmless scanning

    Prevents dirty data from being written into databases.

Comprehensive Report

Generates a comprehensive scan report with detected vulnerabilities classified and repair proposal.

  • Security overview

    Collects, analyzes, and correlates statistics on each scan result, and displays the scan trends and vulnerability distribution, facilitating vulnerability management.

  • Professional scan reports

    Provides detailed information, including URLs, vulnerability names, and descriptions, that can be downloaded to a local PC.

  • Vulnerability classification

    Classifies vulnerabilities by severity and provides recommendations on how to fix each type.

Scan Customization

Allows you to customize scan rules, such as scan strength, to meet a variety of service requirements.

  • Customization of login methods

    Allows you to set the crawler user agent (UA) and exclude links from being crawled, enhancing scan security.

  • Custom scan plugins

    Allows you to select a scan plugin based on requirements to scan specific types of vulnerabilities and quickly identify risks.

  • Scheduled scans

    Allows you to customize the start time of a scan, avoiding peak service hours.

Register Now