Probely, as a vulnerability scanner, will perform extensive tests on your target while scanning for vulnerabilities. These tests can also be seen as malicious attacks. Therefore, we require you to prove that the target you want to scan is yours. In other words, we want to make sure that you are allowed to run security tests on your target domain.

You can verify the ownership of your target using four methods: TXT file, DNS (TXT), DNS (CNAME), and Meta tag. If these validation methods don't work for you, you can also request help with the validation process using the chat on this page.

Did this answer your question?