Skip to main content

Trustlisting requirements for Invicti Standard

This document is for:
Invicti Standard

Accurate scans of your targets require proper network access configuration. Follow these steps to configure trustlist settings:

Outbound connections

Invicti Standard outbound connections

Ensure that your network infrastructure permits Invicti Standard to establish outbound connections to:

ScopeDestination
Scanning requests to your TargetIP Address URL for your Target, including destination port
VDB Database Download; Update notificationshttps://service.invicti.com
API Calls to the Hawk service for out-of-band vulnerability checkinghttps://r87.me
API Calls for Invicti Licensing and Target Managementhttps://service.invicti.com
API Calls to the IAST Bridgehttps://iast.invicti.com
Integration with Invicti Enterprise on-demand (US)https://www.netsparkercloud.com
Integration with Invicti Enterprise on-demand (US2)https://ie.invicti.com
Integration with Invicti Enterprise on-demand (EU)https://eu.netsparker.cloud
Integration with Invicti Enterprise on-demand (CA)https://ca.netsparker.cloud
Integration with Acunetix 360 on-demandhttps://online.acunetix360.com
Integration with Invicti Enterprise on-premisesIP or URL of your Invicti Enterprise Main Installation

Shark outbound connections

Ensure that your network infrastructure permits any Shark agent deployed in your target web application to establish outbound connections to:

ScopeDestination
API Calls to the IAST Bridge (default)https://iast.invicti.com

Inbound connections

Your target accepting inbound connections

You must ensure that your target's network infrastructure trustlists incoming connections from:

ScopeSource
Incoming scanning requestsIP or URL of your Invicti Standard Installation


Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?