Targets
The Targets page in ZeroThreat is your central hub for managing all aspects of scanning targets. From adding new targets to configuring and verifying them, this section provides all the tools you need to manage your web application security.
Add a Target
Click on the Add Target button to add a new target. This will open a add new target popup.
Refer the Add a Target guide for detailed guide on how to add a new target.
Target List and Sorting
When you access the Targets section, you'll see a comprehensive list of all your targets. To help you navigate and organize these Targets effectively, you have several options:
Group By: Use the Group By
button to sort targets based on:
Hostname: Group targets according to their respective hostnames.
Organizations: Sort targets based on the organizations they belong to.
Default View: If no sorting option is applied, targets will be displayed based on the most recent activity.
Target Configuration

You can click on the icon to open target configuration settings for the target.
Refer the Target Configuration guide to know about each configuration in detail.
Target Verification
To scan a target, target ownership verification is required first. To verify a target you can click on button.
Refer the Target Verification guide to learn how to verify your domain with ZeroThreat before scanning.
Quick Access and Actions

Open URL in a New Tab: Click the
icon to open the scanned applications URL in a new tab. This allows for easy access to the website without leaving the Scans section.
Quick Scan: Use the Quick Scan
icon to start a new scan using existing configurations. You can choose a previously saved login sequence or create a new one directly from this section.
Refer How to perform an Authenticated Scan with Login Sequence? guide for more information.
Host-Based Targets
In some cases, a single domain may host multiple independent sections of an application like example.com/admin
and example.com/client
. These sections might not be directly linked or accessible through the same navigation path but still exist under the same root domain.
Host-Based Targets allow you to manage and scan such isolated areas within the same domain as separate scan entities. This is especially useful when different parts of the application serve different user groups or business functions but share the same hostname.
When using Host-Based Targets:
You can define and scan different applications of the same host independently.
For example,
example.com/admin
andexample.com/client
can each be scanned as their own target.Each scan needs to be triggered separately—scans will not run in parallel.
Host-Based Targets make it easier to manage different applications under the same host name, This allows testing different applications of the same domain without setting up entirely separate targets.
What’s Next? Now that your targets are set up, it’s time to run your first scan! Head over to the Quick Scan Guide to begin your journey toward better application security.
Last updated