Deep Scan
URL
IP address
vulnerability
External Resourses
CSRF
XSS
SQL injection