Scan on-prem
Security that follows your code
Stop complex scripting and manual configurations. Deploy our lightweight Internal Scanning Agent in minutes to find exploitable vulnerabilities in your internal staging environments and private apps.
Scan your internal staging environments and private apps
Secure what’s behind the firewall as easily as what’s outside it
Catching low-hanging fruit in staging is usually a given. More than that, the most sensitive data lives behind your login pages and firewalls. Yet, traditional DAST tools make internal scanning a bottleneck. Often requiring hours of tedious manual setup and instrumentation for every asset. We are changing that.
Easy deployment and unified reporting
No more complex network tunneling or VPN headaches. Straightforward IaC deployment lets you secure your internal assets in minutes, not weeks. Consume all findings in one place, in the UI, or via an integration.
Proprietary, research-led testing
Our proprietary scanning engines deliver high-accuracy, actionable findings. The focus is on exploitability, reducing the time you waste on triaging false positives from outdated checks. The result is high-signal findings that your developers will actually trust and fix.
Fast testing on a massive scale
We built out testing for scale. For prompt injection, we can generate a staggering number of payload permutations, exceeding 922 quintillion in theory. For command injections, we leverage a comprehensive library of over 330k payloads.
Setup without a headache
Step 1
Deploy & configure
Run the scanner in your environment using our Terraform module and simply point it at your internal applications. It's a self-contained package including license keys and registry access for easy plug & play.
Step 2
Scan & report
Start scanning the internal network within as little as 30 minutes. The scanner performs DAST scans from within your network and results are sent securely to your Detectify dashboards.
Crowdsource — Ethical hacker expertise within minutes
Research from Crowdsource, our community of 400+ ethical hackers, is built daily into Detectify, allowing you to discover the latest undocumented security vulnerabilities. From hacker community to implementation in as fast as 15 minutes.
Learn more about Crowdsource
Close the visibility gap between Dev and Prod
Your internal surface is often your most vulnerable. Detectify Internal Scanning brings our hacker-powered engine behind your firewall, providing a unified view of risk across your entire attack surface. Scale your testing effortlessly without sacrificing performance or data integrity.
Scale without bottlenecks
Run thousands of simultaneous scans without performance degradation. Whether scanning 10 assets or 10,000, Detectify Internal Scanning auto-scales to eliminate bottlenecks.
Verify network isolation
Validate network segmentation by scanning the same target from different vantage points (e.g., Guest Wi-Fi vs. Admin VLAN) to ensure critical apps are truly isolated.
One surface, one view
See findings from your external attack surface and your internal staging environments in one filterable, sleek UI with the Detectify Tool.
Frictionless deployment
Meet developers where they live. Run lightweight agents in your CI/CD, terminal, or local dev environment. They spin up, execute the test, and vanish the moment they’re done.
Zero data silos
Regardless of where a scan originates (Jenkins, Localhost, or Cloud), all data is normalized and funneled into a single ScanID for seamless remediation.
Frequently asked questions
Got question on our Internal Scanning Agent? Here we answer the most common ones.
-
What types of vulnerabilities does Detectify Internal Scanning test for?
The short answer: Exploit-based testing powered by 330,000+ proprietary payloads.
The details: We move beyond static checklists to identify real-world exploitability. Our proprietary engine uses a rotating library of research-led payloads to find vulnerabilities in real-time, drastically reducing the noise and false positives common in open-source scanners.
-
How is Internal Scanning different from Detectify’s external scanning?
The short answer: It secures your private "inside", from staging to core operations.
The details: While our external scanning monitors your public attack surface, Internal Scanning reaches the assets behind your firewall. Deployed directly in your private network, it identifies in-network vulnerabilities and misconfigurations in the environments that power your business, such as staging or local development.
-
Can we scan the same application from multiple internal networks?
The short answer: Yes—easily verify your network segmentation and app isolation.
The details: You can deploy agents across various segments (e.g., Guest Wi-Fi vs. Admin VLAN) to scan the same target from different vantage points. This allows you to prove that your critical applications are truly isolated and that your network segmentation policies are functioning as intended.
-
What are the technical requirements for the Internal Scan Agent?
The short answer: A lightweight environment and outbound-only connectivity.
The details: Our agents are deployed via Docker or Binary directly within your network. To ensure security and ease of setup, the agent only requires a secure, outbound-only HTTPS connection to the Detectify platform, meaning zero inbound firewall modifications. By using your local compute resources, the agent runs parallel scan threads that scale to your architecture’s complexity without creating performance bottlenecks.
Read more details in the documentation.
-
What does deployment look like for Detectify Internal Scanning?
The short answer: A pre-configured, 30-minute setup.
The details: We deliver the agent as a self-contained package, pre-loaded with your license keys and authentication protocols. Simply pull the hardened image from our private registry and deploy it—most teams are up and running in under 30 minutes. For enterprise-grade security, the agent is architected to run within Kubernetes environments with full encryption for data in transit and at rest.
Read more details in the documentation.
-
What should we prepare before deploying?
The short answer: Network access and scan credentials.
The details: To get the most out of your internal scanning, ensure the following:
1. Network Reach: The agent must be placed in a segment where it can "see" the target applications.
2. Internal Access: While no external firewall changes are needed, internal ACLs must allow the agent to reach the specific assets you want to test.
3. Authentication: For deep-level testing of private apps, have your login credentials or tokens ready. Using Detectify’s Recorded Login, the agent performs stateful, credentialed testing to find the complex logic flaws that static tools miss.Read more details in the documentation.