Cookie Consent: Our website uses cookies to provide your browsing experience and relavent informations. Before continuing to use our website, you agree & accept of our Cookie Policy & Privacy a) Necessary b) Unclassified c) Statistics d) Marketing  

Contact Us


Secure Your Website and Web Assets in These Challenging Times with ESDS VTMScan

Website Security Scanner

For more information write to us on [email protected] or call on : 0253 6636 599


An online statistic states that $3.92 million is the average amount of a data breach. This is a hefty amount for any business, which puts CTOs and other key business decision-makers always worried about data losses and breaches. To shred off their concerns about such losses to cybersecurity attacks, we have developed VTMScan, a complete web scanning tool. By leveraging VTMScan, CTOs don't need to worry about their website and web applications' security, as VTMScan scans for all forms of online threats and cyberattacks like OWASP Top-10 Vulnerabilities, SQL Injections, Cross-Site Scripting, to name a few. With VTMScan, users get complete protection of their website through a comprehensive audit of the website security.

Protecting the Digital Identity of Businesses with Enhanced Web Security


Standard Scan Plans

Domains: 2 Domains

Total No. of Scans: 4

Annual Cost: ₹349 249

Bulk Buy ( No. of Scans X 12): ₹3499 2499


Enterprise Scan Plan

Domains: 2 Domains

Total No. of Scans: 4

Annual Cost: ₹499 379

Bulk Buy ( No. of Scans X 12): ₹4999 3749


Standard Scan Plans

Domains: 4 Domains

Total No. of Scans: 8

Annual Cost: ₹599 449

Bulk Buy ( No. of Scans X 12): ₹5999 4449


Enterprise Scan Plan

Domains: 4 Domains

Total No. of Scans: 8

Annual Cost: ₹949 689

Bulk Buy ( No. of Scans X 12): ₹4499 6889


Standard Scan Plans

Domains: 10 Domains

Total No. of Scans: 20

Annual Cost: ₹1199 879

Bulk Buy ( No. of Scans X 12): ₹11699 8779


Enterprise Scan Plan

Domains: 10 Domains

Total No. of Scans: 20

Annual Cost: ₹1669 1249

Bulk Buy ( No. of Scans X 12): ₹16669 12499


Standard Scan Plans

Domains: 50 Domains

Total No. of Scans: 100

Annual Cost: ₹5669 4249

Bulk Buy ( No. of Scans X 12): ₹56699 42499


Enterprise Scan Plan

Domains: 50 Domains

Total No. of Scans: 100

Annual Cost: ₹8349 6249

Bulk Buy ( No. of Scans X 12): ₹83349 62499

OWASP Top 10:

Open Web Application Security Project (OWASP) is an online community in the field of web application security which releases a list of top 10 vulnerabilities every few years. ESDS VTMScan detects those vulnerabilities and follows the rules laid out by OWASP. We scan for Cross-Site Scripting (XSS), SQL Injection, Insecure Deserialization, Sensitive Data Exposure, Server Sider Request Forgery (SSRF), etc. and report the vulnerabilities and provide recommendations to fix these issues.HTML injections is similar to Cross-Site Scripting (XSS). It allows the attacker to inject the HTML code into the web pages that are viewed by the other users.

Change Monitoring:

Change Monitoring is an important feature provided by ESDS VTMScan. We scan each and every page of the website to detect any changes. Every change is monitored throughout the website along with its percentage with the respective URLs. Here we first create a snapshot of all the web pages and then scan each & every page for changes and report the irregularities found. This feature helps website owners to check whether there are any changes being done on the website without their concern or these are just illegitimate changes. In content change monitoring VTMScan provides the three features viz, Content change monitoring, Image Change Monitoring, Visual change monitoring.

Malware Scan

Website defacement check: Website defacement is an attack on a website that changes the visual appearance of the site or a webpage.

  • Forceful redirect injection test.
  • Scans JavaScript code snippets against generic signatures: Checks for JavaScript’s deprecated and vulnerable functions like eval, base64_decode, char etc. Checks for iframes.
  • A special algorithm developed to detect JavaScript Obfuscation: Obfuscation used to convert vulnerable codes into an unreadable format.
  • Malware Monitoring primarily focuses on the detection of- JavaScript, iframe & Defaced keywords. JavaScript is scanned for malicious code. The site is also scanned for deface keywords like- ‘hacked by’, ‘compromised’, etc.


Protect your customers and safeguard your website and web application with ESDS VTMScan.

  • Find similar looking domains.
  • URL hijacking - The URL hijacking can be similar to the victim’s website address (e.g. and also it may be of the following types -
    • A common misspelling, or foreign language spelling. Eg- site:
    • Misspelling like a typographical error. Eg - site:
    • Swapping letters within the name Eg- site:
    • Different domain name. Eg - site:
    • Corporate intelligence.
    • Homoglyph advance phishing attack detection.
    • Punycode phishing attack detection.

CMS Scan:
  • Very few scanners provide this feature.
  • Detect Wordpress, Joomla, vBulletin, Drupal.
  • Scan Themes, Plug-ins, unprotected admin area.
  • User enumeration.
  • Brut forcing for simple password detection.
  • FPD - File Path Disclosure scanning.
  • Detect CMS in all directories.

Domain Reputation Check:

Domain reputation in Google, SURBL, Malware Patrol, Clean-Mx, Phishtank,Sorbs, Spamcop, Abusech, Isc.

ESDS VTMScan checks whether your domain is listed in these databases - Google, SURBL, Malware Patrol, Clean MX, PhishTank,Sorbs,Spamcop,Abusech,Isc.These organizations have their databases that stores IP addresses and domains which are extracted for malware, spamming, phishing activities.

Mail server IP Check in 58 RBL repositories:

RBL (Real-time Blackhole Lists) have IP addresses whose owners refuse to stop the growth of spams. RBL lists various server IP addresses from multiple ISPs (Internet Service Providers) whose users are responsible for spams. RBL also lists those ISPs whose servers are hijacked for spam relay. ESDS VTMScan check the mail server IPs in 58 such RBL repositories.

Robust Link Crawling:

Link crawling is a process of capturing all the webpages (its URLs) present on the website. It helps us understand how many webpages are there in our website and about what are these pages related to. The website owner can also cross-check whether these pages are legitimate or not.

ESDS VTMScan does following things:
  • Crawls links from web pages, robots.txt, iframes, hacker’s favourite search engines, directory indexes, and directory traversals.
  • Check admin and directory busters.
  • Directory access check.

Banner Grabbing:

Banner grabbing is a collection of information related to your websites such as web server information, header information and open ports. Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. An intruder can use banner grabbing in order to find network hosts that are running versions of applications and operating systems with known exploits.

ESDS VTMScan checks for following things:
  • Port scanning.
  • OS detection.
  • WAF detection.
  • Sub Domain Listing.

SSL Scan:

ESDS VTMScan checks for SSL Poodle, BEAST, CRIME, Heartbleed, DROWN,SSL grade check,SSL Certificate check etc.

In SSL Check, the following areas are checked:
  • NULL Cipher used or less than 128 bits.
  • Domain uses an invalid security certificate.
  • Domain uses an expired security certificate.
  • Domain uses a security certificate which expires today (EOD).

Local File Inclusion (LFI):

Local File Inclusion (LFI) is a process where a file or a script is injected on a server through a web browser which allows local directory traversals and characters to be injected if the page is not sanitized. This attack leads to sensitive information disclosure.

Remote File Inclusion (RFI):

Remote File Inclusion (RFI) is an attack which looks for vulnerabilities in a web application to include a remote file through a script on the web browser. The perpetrator wants to exploit the functions in an application to upload malware from a different domain.

Data Leak:

The new feature of Data Leak has been introduced. Data Leak is unapproved transmission of data from organization to external destination.VTMScan checks whether the data breaching has occurred or not and displays in form of proper list under page source. These are informative alerts provided by VTMScan.

DMARC Inspector:

ESDS VTMScan DMARC inspector does the following things-

  • It validates DMARC, SPF records and check for email spoofing is possible or not.
  • Validates DKIM records.
  • Email Spoof Checking: Email spoofing is the creation of email messages with a forged sender address. VTMScan email spoof checker checks whether emails can be spoofed or not.

Security Audit:

VTMScan Page content Scan does the following things-

  • Information disclosure: VTMScan checks whether sensitive Information has been disclosed on the URL or not. Sensitive Information can be anything like IP addresses, emails, numbers etc. VTMScan checks for such information on the complete site and brings it to your attention.
  • View State checker: To decrease the chance of someone's interference the data is stored within the ViewState, it is a nice plan to encrypt the ViewState. The target web application doesn't utilize encryption on ViewState data. VTMScan identifies ViewState and checks whether encrypted ViewState is strong or weak.
  • Subdomain Takeover: VTMScan analyses the domains to see if any of them is linked to external services or not. Host phishing pages, send phishing emails from the legitimate domain, and harvest login credentials.
  • Port Monitoring: VTMScan checks for open and close ports of the website and gives alerts to users in reports.
  • Data Leak: The new feature of Data Leak has been introduced. Data Leak is the unapproved transmission of data from an organization to an external destination. VTMScan checks whether the data breaching has occurred or not and displays it in form of a proper list under page source. These are informative alerts provided by VTMScan.
  • Command Injection: The purpose of a command injection attack is to execute arbitrary commands on the host operating system using a vulnerable application. Such vulnerable URLs are detected by VTMScan, which prevents command injection attacks.
Q: Does VTMScan scan subdomains of a given domain?

Ans: Yes, VTMScan will also scan subdomains of your website, but you need to mention those subdomains in the additional domain field while you schedule your scan.

Q: Can VTMScan schedule website scan as per user time frame?

Ans: Yes, VTMScan can schedule scans as per user time frame so that it won't affect user website during peak time. User will be provided with a custom scan option where he can set his time frame.

Q: What is OS Detection in VTMScan?

Ans: OS Detection is one of the striking features of VTMScan. Most of the time website is coded very securely and is very hard to crack so, hackers target website server Operating System. VTMScan predicts your Operating System and lists down vulnerabilities regarding that website.

Q: How exactly does VTMScan Ports remotely?

Ans: VTMScan checks for all ports on the server. It finds out all open ports and services/products running on those ports. It checks those products in vulnerability database and alerts if any product is vulnerable.

Q:Does VTMScan installs any agents on my website?

Ans: VTMScan does not install any agent. VTMScan also takes care that it sends you harmless requests and payloads which will not affect performance and availability of the user website.

Q : What is WAF?

Ans: A web application firewall (WAF) is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. By customizing the rules to your application, many attacks can be identified and blocked. The effort to perform this customization can be significant and needs to be maintained as the application is modified.

Q : What is Content Change Monitoring and it's usage?

Ans: Content Change Monitoring compares the current state of your website with the snapshot of your website which was taken by you earlier and informs if any changes are observed on the website.

Q : Is Authentication Based Scanning supported by VTMScan?

Ans : Yes, VTMScan supports authentication based scanning viz. htaccess and web based authentication.

Q : What do you mean by a CSRF vulnerability?

Ans: Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the website trusts. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.

Q : Does VTMScan detects CMS? If Yes, then which types of CMS are detected?

Ans: Yes, CMS is detected in VTMScan. Types of CMS that are detected and scanned are Wordpress, Joomla, vBulletin and Drupal.

Q : How do I get my domain off the phishtank blacklist?

Ans: Please visit the following page: and follow the instructions for reporting an incorrect phishing page.

VTMScan Service Level Agreement


This SLA is applicable to active customers with a valid and active subscription of ESDS VTMScan Service

Service Level Goal

ESDS is a cloud service provider company. Main aim is to provide the most redundant and reliable ESDS VTMScan Service to our clients and we are committed resolve any issues that client may come across with same. ESDS has well trained Support Teams with experience of working on web servers,operating systems, security, various software applications and databases. ESDS will make sure to provide complete management and support to its clients. Under this commitment we can cover resolution of issues raised under following categories as per expertise supported by us.

a. Covered Issues:
  • VTMScan self-service portal related issues
  • Website scanning issues. - In case all needed Pre-requisites for scanning supported by clients
  • Proof of Concept (POC) for vulnerabilities found through web application security scanning via VTMScan
b. Other Issues:
  • Client queries related to reports and vulnerabilities identified
c. Non-inclusion - Issues Out of service scope. like,
  • ESDS will not do remediation of the vulnerabilities found
  • User web applications/website availability related issues
d. DNS Issues, website reachability from scanning server

ESDS will make all technical resources available in order to support their clients. However, it's client's responsibility to attempt to resolve basic issues such as adding websites, alert email addresses, monitoring of websites, fetch the reports, create a snapshot. ESDS reserves right to determine how much support or service level it will provide.

Support levels process

ESDS Commits for the following Support availability

Mail us: [email protected]   |   Toll Free No: 1800 209 3006

Why Choose VTMScan

VTMScan offers Content Change Monitoring, a unique feature that notifies the website owners for any website content changes. VTMScan offers an in-depth scanning solution with instant alerts when the threat looms. It is fully compatible across all platforms and content management systems.

OWASP Top-10

VTMScan detects the Top-10 vulnerabilities released by OWASP.

Content Change Monitoring

VTMScan creates time-to-time snapshots of a website. It compares snapshots with the website's current state and informs of any changes observed on the website.

Domain Reputation Check

VTMScan checks whether the domain is listed across various databases like- Google, SURBL, Malware Patrol, Clean MX and PhishTank.

Cross-Site Scripting(XSS)

VTMScan scans each and every webpage for GET and POST request for detecting XSS Attacks

How VTMScan Can Be Beneficial

Search Engine Friendly

Threats Detection

Keeps Web Servers Fit

Prevents Website Attacks

Proactive Flaw Spotting

Specialization in Intense Detection

Explore other Solutions to Deliver greater services

  • Patented Auto - Vertical Scaling

    An on-premise hybrid cloud orchestration & management system.

  • eNlight WAF

    Enhance Web Application Security with Cloud-Hosted WAF.

  • Security Operations Center

    Continuous compliance & on-demand/scheduled reporting as per industry standards.

  • DRaaS

    Disaster Recovery service on eNlight Cloud to safe-guard mission-critical data.

  • eNlight WebVPN

    Your Secured Access to Digital Transformation.

  • Managed Colocation

    Ensure Seamless Business Operations with Flexible IT Environment.

Trusted By

Related Resources

Small Industries and Development Bank of India(SIDBI)

SIDBI Says Good Bye to Threat with ESDS VTMScan Security..

Read More

Beware of Malware, Threat and Viruses with ESDS VTMScan

Today cybersecurity is an everyday issue for companies trying to...

Read More

How to Clean Hacked Website

Before we begin to understand how to clean websites that have been hacked.

Read More

The proactive tool to secure your website

Tell us how we can help you

Name *

Email *

Mobile *
What are you looking for? *

Message *