This content has been marked as final. Show 1 reply
3 of 3 people found this helpful
The first thing you need to is to device what constitutes a problematic scan. For it may be that if the system goes far enough to create a root node you are happy.
Unless you are tightly controlling the IPs you scan no responses can be fine.