This is a scan of a network’s vulnerabilities. Often performed through live pentesting tools like: