{% extends "base.html" %} {% block title %}Help - SneakyScanner{% endblock %} {% block content %}
Learn how to use SneakyScanner to manage your network scanning operations.
SneakyScanner helps you perform network vulnerability scans and track changes over time. Here's the typical workflow:
A Site is a logical grouping of IP addresses that you want to scan together. For example, you might create separate sites for "Production Servers", "Development Environment", or "Office Network".
After creating a site, you need to add the IP addresses you want to scan:
192.168.1.1 or 192.168.1.0/24)A Scan Configuration defines how a scan should be performed. It links to a Site and specifies scanning parameters like ports to scan, timing options, and other settings.
22,80,443 or 1-1000)While a scan is running:
Scheduled scans allow you to automatically run scans at regular intervals, ensuring continuous monitoring of your network without manual intervention.
Comparing scans helps you identify changes in your network over time - new hosts, closed ports, new services, or potential security issues.
The comparison view shows:
Alerts notify you when scan results match certain conditions you define. This helps you stay informed about important changes without manually reviewing every scan.
Webhooks allow SneakyScanner to send notifications to external services when events occur, such as scan completion or alert triggers. This enables integration with tools like Slack, Discord, Microsoft Teams, or custom systems.