Scanning of University Systems and Services
On this website, you can find information about regular scanning of the university systems performed by the Threat Management Department of the Institute of Computer Systems. The goal of the scanning is to proactively identify vulnerabilities and hence prevent their exploitation by attackers. Therefore this process strengthens the protection of the university network and reduces the potential risks associated with a cybersecurity attack.

What is our motivation?
In recent months, we have recorded an increase in incidents that significantly negatively impact university data. These incidents were caused by the use of vulnerable versions of services, misconfiguration, and inadequate network segmentation.
We were able to detect dozens of such vulnerabilities during regular system scanning. Subsequently, we fixed them and thus increased the security level of the university infrastructure.
If you experience any issues related to scanning your managed service, please do not hesitate to contact scanning@csirt.muni.cz.
How does the scanning process work?
Vulnerability scanning is performed by taking scans of network services and web applications using machines with the following domains:
- pentest01.csirt.muni.cz
- pentest02.csirt.muni.cz
- pentest03.csirt.muni.cz
- pentest04.csirt.muni.cz
- muni-scan-public.csirt.muni.cz
- muni-scan-private.csirt.muni.cz
- muni-scan-mu.csirt.muni.cz
Scanning range:
- public university addresses (147.251.0.0/16)
- private university address (10.0.0.0/8)
- web applications that run on the addresses above
Web scanners are currently limited to 10 requests/s across all scanned sites.


What can you expect?
Given the considerate approach and the experience of the pilot scanning, most services and their administrators do not notice the scanning process is running. If we identify and confirm the vulnerability in your system, we will contact you immediately and help you correct it.