Shodan Cheat Sheet: Ultimate List of Dorks & Search Filters with Examples

I am sharing my personal Shodan Cheat Sheet that contains many shodan Search Filters or Shodan Dorks that will help you to use the Shodan search engine like a pro. It will help you to get targeted results easily.

It is very different than content search engines like Google, Bing, or Yahoo. This type of search engine crawl for data on web pages and then indexes it for searching while Shodan interrogates ports and grabs the resulting banners, then indexes the banners for searching.

If you are in the Cybersecurity field, you should well known about the Shodan search engine. Shodan is an IoT search engine that helps find specific types of computers (routers, webcams, servers, etc.) on the internet using a variety of filters. It’s a great resource to provide passive reconnaissance on a target or as a measuring tool.

Just open https://shodan.io/ and start firing the commands from this shodan cheat sheet.

Shodan Cheat Sheet

Server:

Find the devices or servers that contain a specific server header flag. You can research vulnerable servers.

server: "apache 2.2.3"

or you can use directly the flag

apache 2.2.3
Shodan Cheat Sheet & Shodan Dorks for IoT Search Engine

hostname:

Find devices with specific hostname worldwide. The hostname is a label that’s assigned to a device connected to a network that is used to spot the device in various kinds of transmission, like the World Wide Web. You can use multiple filters altogether included in the shodan cheat sheet to narrow your search.

server: "apache" hostname:"google"
Shodan cheat sheet example showing search results for hostname

net:

Find devices or machines based on an IP address or /x CIDR. This filter can also be used to find the IP range or certain IP addresses and subnet masks.

net:34.98.0.0/16
Shodan cheat sheet example showing search results for net

os:

Find devices based on the operating system. You can find all the devices that have some specific operating systems. It will help penetration testers to find for vulnerable machines with specific operating system filters.

os:"windows xp"
Shodan cheat sheet example showing search results for OS

port:

Find devices based on open ports. “port” filter will allow narrows the search of the machines with some specific open ports.

proftpd port:21
Shodan cheat sheet example showing search results for Port

org:

This filter will allow you to locate the devices of any specific organization.

org:"Google"
Shodan cheat sheet example showing search results for ORG

You can use multiple filters shown in the shodan cheat sheet with org filter to narrow the search or sort the results among the millions.

city:

Find devices in a particular city. For example, if you want to narrow the search for Mumbai city only then you can use,

city:"Mumbai"
Shodan cheat sheet example showing search results for CITY

country:

Find devices in a particular country. For example, if you want to narrow the search for India only then you can use,

country:"IN"
Shodan cheat sheet example showing search results for Country

geo:

Find devices by giving geographical coordinates according to certain longitudes and latitudes that are within a given radius.

geo:"48.1667,-100.1667"
Shodan cheat sheet example showing search results for Geo

before/after:

The ‘after’ and ‘before’ filter helps you to devices after and before a particular date.

The format allowed is dd/mm/yyyy

nginx before:13/04/2020 after:13/04/2018

has_screenshot:

This filter will only return results that have a screenshot available.

has_screenshot:true city:"George Town"
Shodan cheat sheet example showing search results for has_screenshot

Wifi Passwords:

Helps to find the cleartext wifi passwords in Shodan.

html:"def_wirelesspassword"
Shodan cheat sheet example showing search results for html def_wirelesspassword

Surveillance Cams:

Get the data for surveillance cams with username: admin and password: password

NETSurveillance uc-httpd
Shodan cheat sheet example showing search results for NETSurveillance

Or you can also use the below command

Android Webcam Server

Citrix:

Find Citrix Gateway.

title:"citrix gateway"
Shodan cheat sheet example showing search results for citrix gateway title

Shodan cheat sheet example showing search results

Windows RDP Password:

But may contain secondary windows auth

"\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
Shodan cheat sheet example showing search results for rdp password

Misconfigured WordPress Sites:

The wp-config.php if accessed can give out the database credentials.

http.html:"* The wp-config.php creation script uses this file"

You can access the main WordPress configuration file and capture sensitive information like credentials or AUTH_KEY of misconfigured sites.

Shodan cheat sheet example showing search results for http.html

Shodan cheat sheet example showing search results

Mongo DB servers:

This dork filter will give you info about Mongo DB servers.

"MongoDB Server Information" port:27017 -authentication
Shodan cheat sheet example showing search results for MongoDB

FTP servers allowing anonymous access:

Get the data for fully Anonymous access.

"220" "230 Login successful." port:21
Shodan cheat sheet example showing search results for FTP

Jenkins:

Find for all Jenkins Unrestricted Dashboard

x-jenkins 200
Shodan cheat sheet example showing search results for Jenkins

Open ATM:

This filter will allow for ATM Access availability.

NCR Port:"161"
Shodan cheat sheet example showing search results for NCR Port

Android Root Bridge(ADB):

Find android root bridges with port 5555.

"Android Debug Bridge" "Device" port:5555
Shodan cheat sheet example showing search results for ADB

Telnet Access:

Find devices that required passwords for telnet access.

port:23 console gateway
Shodan cheat sheet example showing search results for Telnet

Etherium Miners:

Shows the miners running ETH.

"ETH - Total speed"
Shodan cheat sheet example showing search results for Etherium miners


Shodan Command-Line Interface Cheat Sheet Install and Configuration

The shodan command-line interface (CLI) is a command-line library for the Shodan IoT search engine. You can install using this simple python’s pip command,

pip install shodan

Once the shodan tool is installed you need to initialize the environment variable with the private API key, you can get form shodan account settings.

shodan init PRIVATE_API_KEY
Shodan cheat sheet

Shodan cheat sheet

Shodan CLI Cheat Sheet Use

you can run just the shodan command to get the help. This is most popular command, will give you the full list of commands that can be used futher for recon process.

shodan
Shodan cheat sheet

myip

This command will provide users public internet-facing ip address.

shodan myip
Shodan cheat sheet

host

Get the information about the host. You can get information like where it’s located, what ports are open, and which organization owns the IP.

shodan host shodan host 63.X.X.X
Shodan cheat sheet

count

It will return the number of results for a search query.

# Examples
shodan count Apache Tomcat/8.5.13
&
shodan port:22 country:IN
Shodan cheat sheet

Shodan search command lets you search Shodan and view the results in a terminal-friendly and user-friendly way. By default it will display data of fields in specific format of (the IP, port, hostnames and data). You can use the –fields parameter to specify the fields you want to view the result in.

*Note: You need “Shodan Pro” to use this command.

shodan search --fields ip_str,port,org Apache Tomcat/8.5.13
Shodan cheat sheet

Shodan cheat sheet

download

Search for Shodan results and download the results into a file that is JSON formated banner lines.

By default the limit of results is set to 1,000 results, if you want to download more than that then you can use the –limit flag with your query.

Shodan command lets you save the results in a file and you can process them afterward using the parse command.

shodan download Apache Tomcat/8.5.13
Shodan cheat sheet

parse

You can use the parse command to analyze a file that was generated using the download command. Shodan command-line interface lets you filter out the fields that you’re interested in, convert the JSON to use defined format.

Use –fields flags to specify the fields you are interested in. Flag –separator can be used to specify the use defined separator between the fields specified.

shodan parse --fields ip_str,port,org --separator " - " Apache.json.gz
Shodan cheat sheet

*Note: You need “Shodan Pro” to use some of the above shodan command-line commands.

Final Words

You can use all these all shodan filters for your recon research and penetration testing works. This filter can be used as an advanced filter by using combined multiple filters together.

IMPORTANT THINGS TO REMEMBER:

  • This Shodan Cheat Sheet is shared with you guys for educational purposes and your recon purpose only.
  • This information shall only be used to expand knowledge and should not for any type of unethical activities.

Reference