Home Shodan.io Tutorials for Best Practices
Post
Cancel

Shodan.io Tutorials for Best Practices

What is Shodan?

Untitled

Shodan (Sentient-Hyper-Optimized-Data-Access-Network) is a search engine. Shodan is a search engine that enables many computer-based systems to be found in the light of various filters. With Shodan, you can scan the internet and detect the systems, devices, devices (desktop, switch, router, servers, etc.) that are open to the internet, and the results you find can be determined by port, type. You can classify them according to their location, port information, banner and service information.

Shodan Command-Line Interface

Once you have installed shodan CLI tool, to setup your API token just do

1
shodan init <YOUR_API_KEY>

Help menu

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
alert       Manage the network alerts for your account.
convert     Convert the given input data file into a different
format.
count       Returns the number of results for a search.
data        Bulk data access to Shodan.
domain      View all available information for a domain.
download    Download search results and save them in a compressed
JSON file.
honeyscore  Check whether the IP is a honeypot or not.
host        View all available information for an IP address.
info        Shows general information about your account.
init        Initialize the Shodan command-line.
myip        Print your external IP address.
org         Manage your organization’s access to Shodan.
parse       Extract information out of compressed JSON files.
radar       Real-Time Map of some results as Shodan finds them.
scan        Scan an IP/ netblock using Shodan.
search      Search the Shodan database.
stats       Provide summary information about a search query.
stream      Stream data in real-time.
version     Print version of this tool.

See information about the host such as where it’s located, what ports are open and which organization owns the IP.

1
shodan host 192.168.x.x

Untitled

Example shodan command-line query

1
shodan search --fields location.country_code3,ip_str,hostnames --separator ::  "Server: gSOAP/2.8" "Content-Length: 583"

Untitled

Output:

Untitled

Download and parse the search fields

1
2
3
4
shodan download mikrotik streetlight
shodan parse --fields location.country_code3,ip_str,hostnames --separator :: mikrotik.json.gz
shodan download myresults.json.gz 'org:"Qatar General Electricty and Water Corporation"'
shodan parse --fields ip_str --separator :: myresults.json.gz

Untitled

Shodan Filters

General Filters

NameDescriptionType
afterOnly show results after the given date (dd/mm/yyyy) stringstring
asnAutonomous system number stringstring
beforeOnly show results before the given date (dd/mm/yyyy) stringstring
categoryAvailable categories: ics, malware stringstring
cityName of the city stringstring
country2-letter country code stringstring
geoAccepts between 2 and 4 parameters. If 2 parameters: latitude,longitude. If 3 parameters: latitude,longitude,range. If 4 parameters: top left latitude, top left longitude, bottom right latitude, bottom right longitude.string
hashHash of the data property integerinteger
has_ipv6True/ False booleanboolean
has_screenshotTrue/ False booleanboolean
hostnameFull hostname for the device stringstring
ipAlias for net filter stringstring
ispISP managing the netblock stringstring
netNetwork range in CIDR notation (ex. 199.4.1.0/24) stringstring
orgOrganization assigned the netblock stringstring
osOperating system stringstring
portPort number for the service integerstring
postalPostal code (US-only) stringstring
productName of the software/ product providing the banner stringstring
regionName of the region/ state stringstring
stateAlias for region stringstring
versionVersion for the product stringstring
vulnCVE ID for a vulnerability stringstring

Telnet Filters

NameDescriptionType
telnet.optionSearch all the optionsstring
telnet.doThe server requests the client do support these optionsstring
telnet.dontThe server requests the client to not support these optionsstring
telnet.willThe server supports these optionsstring
telnet.wontThe server doesnt support these optionsstring

HTTP Filters

NameDescriptionType
http.componentName of web technology used on the websitestring
http.component_categoryCategory of web components used on the websitestring
http.htmlHTML of web bannersstring
http.html_hashHash of the website HTMLinteger
http.statusResponse status codeinteger
http.titleTitle for the web banners websitestring

SSL Filters

NameDescriptionType
has_sslTrue / Falseboolean
sslSearch all SSL datastring
ssl.alpnApplication layer protocols such as HTTP/2 (“h2”)string
ssl.chain_countNumber of certificates in the chaininteger
ssl.versionPossible values: SSLv2, SSLv3, TLSv1,TLSv1.1, TLSv1.2string
ssl.cert.algCertificate algorithmstring
ssl.cert.expiredTrue / Falseboolean
ssl.cert.extensionvNames of extensions in the certificatestring
ssl.cert.serialSerial number as an integer or hexadecimal stringinteger / string
ssl.cert.pubkey.bitsNumber of bits in the public keyinteger
ssl.cert.pubkey.typePublic key typestring
ssl.cipher.versionSSL version of the preferred cipherstring
ssl.cipher.bitsNumber of bits in the preferred cipherinteger
ssl.cipher.nameName of the preferred cipherstring

NTP Filters

NameDescriptionType
ntp.ipIP addresses returned by monliststring
ntp.ip_countNumber of IPs returned by initial monlistinteger
ntp.moreTrue/ False; whether there are more IP addresses to be gathered from monlistboolean
ntp.portPort used by IP addresses in monlistinteger

Awesome Shodan Queries

Industrial control systems

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
"[1m[35mWelcome on console"  #  C4 Max Commercial Vehicle GPS Trackers
"[2J[H Encartele Confidential"  #  Prison Pay Phones
"Cisco IOS" "ADVIPSERVICESK9_LI-M"  #  Telcos Running Cisco Lawful Intercept Wiretaps
"Cobham SATCOM" OR ("Sailor" "VSAT")  #  Maritime Satellites
"DICOM Server Response" port:104  #  DICOM Medical X-Ray Machines
"HID VertX" port:4070  #  Door / Lock Access Controllers
"in-tank inventory" port:10001  #  Gas Station Pump Controllers
"log off" "select the appropriate"  #  Railroad Management
"Server: CarelDataServer" "200 Document follows"  #  CAREL PlantVisor Refrigeration Units
"Server: EIG Embedded Web Server" "200 Document follows"  #  GaugeTech Electricity Meters 
"Server: gSOAP/2.8" "Content-Length: 583"  #  We can also find electric vehicle chargers
"Server: Microsoft-WinCE" "Content-Length: 12581"  #  Siemens HVAC Controllers
"Server: Prismview Player"  #  Samsung Electronic Billboards
"Siemens, SIMATIC" port:161  #  Siemens Industrial Automation
"voter system serial" country:US  #  Voting Machines in the United States
http.title:"Nordex Control" "Windows 2000 5.0 x86" "Jetty/3.1 (JSP 1.1; Servlet 2.2; java 1.6.0_14)"  #  Nordex Wind Turbine Farms
http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2  #  Tesla PowerPack Charging Status
mikrotik streetlight  #  Traffic Light Controllers / Red Light Cameras
P372 "ANPR enabled"  #  Automatic License Plate Readers
port:5006,5007 product:mitsubishi  #  And for Mitsubishi Electric, the MELSEC-Q protocol is commonly used by control system machines/networks
title:"Slocum Fleet Mission Control"  #  Submarine Mission Control Dashboards
title:"xzeres wind"  #  to find XZERES Wind Turbines

Untitled

Webcams

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
ACTi  #  various IP camera and video management system products.
has_screenshot:true IP Webcam  #  another version of the above search, see how the results might differ?
Netwave IP Camera Content-Length: 2574  #  access to the Netwave make IP cameras.
product:Yawcam has_screenshot:true  #  Yawcam stands for Yet Another WebCAM, free live streaming and webcam software.
server: GeoHttpServer  #  GeoVision (GeoHttpServer) Webcams, older webcam software with some had well documented vulnerabilities.
server: VVTK-HTTP-Server  #  Vivotek IP cameras.
server: webcamxp  #  webcamXP is one of the most popular and commonly encountered network camera software for Windows OS. 
server: i-Catcher Console  #  another example of an IP-based CCTV system.
server: "webcam 7"  #  webcam 7 cameras; not as popular as the above type, but still they are still popular and encountered out there.
title:camera  #  general search for anything matching the “camera” keyword.
title:tm01  #  unsecured Linksys webcams, a lot of them with screenshots.
title:”Avigilon”  #  access to the Avigilion brand camera and monitoring devices.
Network Camera VB-M600  #  Canon manufactured megapixel security cameras.
title:ui3  #  UI3 is a  HTML5 web interface for Blue Iris mentioned above.
webcam has_screenshot:true  #  a general search for any IoT device identified as a webcam that has screenshots available.
WVC80N  #  Linksys WVC80N cameras.
WWW-Authenticate: “Merit LILIN Ent. Co., Ltd.”  #  a UK-based house automation / IP camera provider.

Untitled

Database Searches

1
2
3
4
5
6
7
8
9
10
11
product:MySQL  #  broad search for MySQL databases.
mongodb port:27017  #  MongoDB databases on their default port. Unsecured by default.
"MongoDB Server Information" port:27017  #  another variation of the above search.
"MongoDB Server Information" port:27017 -authentication # To find MongoDB database servers which have open authentication over the public internet within Shodan, the following search query can be used:
"MongoDB Server Information { "metrics":"  #  fully open MongoDBs.
"Set-Cookie: mongo-express=" "200 OK"  #  MongoDB open databases.
kibana content-length:217  #  Kibana dashboards accessible without authentication.
port:"9200" all:elastic  #  Elasticsearch open databases.
port:5432 PostgreSQL  #  remote connections to PostgreSQL servers.
product:"CouchDB"  #  Apache CouchDB databases listed.
port:"5984"+Server: "CouchDB/2.1.0"  #  vulnerable CouchDB where remote code execution may be possible.

Untitled

Network Infrastructure

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
title:"Weave Scope" http.favicon.hash:567176827  #  Weave Scope Dashboards
"Docker Containers:" port:2375  #  Docker APIs
"Docker-Distribution-Api-Version: registry" "200 OK" -gitlab  #  Docker Private Registries
"dnsmasq-pi-hole" "Recursion: enabled"  #  Pi-hole Open DNS Servers
"root@" port:23 -login -password -name -Session  #  Already Logged-In as root via Telnet
"Android Debug Bridge" "Device" port:5555  #  Android Root Bridges
Lantronix password port:30718 -secured  #  Lantronix Serial-to-Ethernet Adapter Leaking Telnet Passwords
"Citrix Applications:" port:1604  #  Citrix Virtual Apps
"smart install client active"  #  Cisco Smart Install
PBX "gateway console" -password port:23  #  PBX IP Phone Gateways
http.title:"- Polycom" "Server: lighttpd"  #  Polycom Video Conferencing
"Polycom Command Shell" -failed port:23  #  Telnet Configuration
"Server: Bomgar" "200 OK"  #  Bomgar Help Desk Portal
"Intel(R) Active Management Technology" port:623,664,16992,16993,16994,16995  #  Intel Active Management CVE-2017-5689
HP-ILO-4 !"HP-ILO-4/2.53" !"HP-ILO-4/2.54" !"HP-ILO-4/2.55" !"HP-ILO-4/2.60" !"HP-ILO-4/2.61" !"HP-ILO-4/2.62" !"HP-iLO-4/2.70" port:1900  #  HP iLO 4 CVE-2017-12542
"x-owa-version" "IE=EmulateIE7" "Server: Microsoft-IIS/7.0"  #  Exchange 2007
"x-owa-version" "IE=EmulateIE7" http.favicon.hash:442749392  #  Exchange 2010
"X-AspNet-Version" http.title:"Outlook" -"x-owa-version"  #  Exchange 2013 / 2016
"X-MS-Server-Fqdn"  #  Lync / Skype for Business

Files & Directories

1
2
3
4
5
6
7
8
9
10
11
12
http.title:"Index of /"  #  open lists of files and directories on various servers.
port:80 title:"Index of /"  #  slight variation of the above, note how the results might differ.
http.title:"Index of /" http.html:".pem"  #  Apache Directory Listings
"220" "230 Login successful." port:21  #  FTP resources potentially accessible without login credentials.
230 "anonymous@ login ok"  #  anonymous login allowed to FTP resources.
"Anonymous+access+allowed" port:"21"  #  as above.
vsftpd 2.3.4  #  legacy Linux based FTP service with a widely known security vulnerability
ftp port:"10000" #  Network Data Management Protocol (NDMP), used for backup of network-attached storage (NAS) devices.
"Authentication: disabled" port:445 product:"Samba"  #  SMB file sharing
"QuickBooks files OverNetwork" -unix port:445  #  default settings for sharing QuickBooks files.
filezilla port:"21"  #  popular file sharing software Filezilla.
proftpd port:21  #  For FTP, querying for proftpd, a popular FTP server

Network Attached Storage (NAS)

1
2
3
4
5
6
7
8
"Authentication: disabled" port:445  #  SMB (Samba) File Shares
"Authentication: disabled" NETLOGON SYSVOL -unix port:445  #  Specifically domain controllers
"Authentication: disabled" "Shared this folder to access QuickBooks files OverNetwork" -unix port:445  #  Concerning default network shares of QuickBooks files
"Set-Cookie: iomega=" -"manage/login.html" -http.title:"Log In"  #  Iomega / LenovoEMC NAS Drives 
Redirecting sencha port:9000  #  Buffalo TeraStation NAS Drives
"Server: Logitech Media Server" "200 OK"  #  Logitech Media Servers 
"X-Plex-Protocol" "200 OK" port:32400  #  Plex Media Servers
"CherryPy/5.1.0" "/home"  #  Tautulli / PlexPy Dashboards

VOIP Devices

1
2
3
4
5
6
7
8
9
39 voip  #  some more VoIP services, mostly behind login screens
AddPac  #  an older VoIP provider, nearly exclusively legacy devices.
device:"voip phone"  #  more specific search for anything VoIP containing a “phone” keyword.
device:"voip"  #  general search for Voice over IP devices.
mcu: tandberg  #  Tandberg is a hardware manufacturer of multi-point control units for video conferencing.
Server: MSOS/2.0 mawebserver/1.1  #  VoIP media gateway, commonly used by services such as Patton SN4112 FXO.
server: snom  #  Snom is a VoIP provider with some legacy devices online.
title:"openstage"  #  Siemens Openstage brand IP phones.
title:"polycom"  #  Polycom is another VoIP communication brand.

Maritime devices

1
2
3
4
5
6
7
8
9
10
ECDIS  #  abbreviation for Electronic Chart Display and Information Systems, used in navigation and autopilot systems.
inmarsat  #  as above, but a slightly less known equipment vendor.
maritime  #  general search for anything related to maritime devices.
org:marlink  #  general search; Marlink is the world’s largest maritime satellite communications provider.
sailor  #  another wide search, could yield unrelated results!
satcom  #  another maritime satellite communications services provider.
ssl:"Cobham SATCOM"  #  maritime radio and locations systems.
title:"Slocum Fleet Mission Control"  #  maritime mission control software.
uhp vsat terminal software -password  #  satellite network router without a password.
vsat  #  abbreviation for “very-small-aperture terminal”, a data transmitter / receiver commonly used by maritime vessels.

SSL certificates

1
ssl.cert.subject.cn:*.example.com  #  to find the IP addresses of company-owned certificates.

Legacy Windows operating systems

1
2
3
4
5
6
7
8
9
10
os:"Windows 5.0"  #  Windows 2000; support ended in 2010.
os:"Windows 5.1"  #  Windows XP; support ended in 2014.
os:Windows 2003  #  Windows Server 2003; support ended in 2015.
os:"Windows Vista"  #  Windows Vista; support ended in 2017.
os:Windows 2008  #  Windows Server 2008; support ended in 2020.
os:"Windows 7"  #  Windows 7; support ended in 2020.
os:"Windows 8"  #  Windows 8; support ended in 2016.
os:Windows 2011  #  Windows Home Server 2011; support ended in 2016.
os:"Windows 8.1"  #  Windows 8.1; support ended in 2018.
os:Windows 2012  #  Windows Server 2012; support ended in 2018.

Default - Generic credentials

1
2
3
4
5
6
7
8
9
10
admin 1234  #  basic very unsecure credentials.
html:"def_wirelesspassword"  #  default login pages for routers.
port:23 console gateway  #  remote access via Telnet, no password required.
test test port:"80"  #  generic test credentials over HTTP.
"authentication disabled" port:5900,5901  #  VNC services without authentication.
"authentication disabled" "RFB 003.008"  #  no authentication necessary.
"default password"  #  speaks for itself…
"polycom command shell"  #  possible authentication bypass to Polycom devices.
"root@" port:23 -login -password -name -Session  #  accounts already logged in with root privilege over Telnet, port 23.
"server: Bomgar" "200 OK"  #  Bomgar remote support service.

Printers

1
2
3
4
5
6
7
8
9
10
11
12
http 200 server epson -upnp  #  HTTP accessible Epson printers.
port:161 hp  #  HP printers that can be restarted remotely via port 161.
port:23 "Password is not set"  #  open access via Telnet to printers without set passwords.
Printer Type: Lexmark  #  access to control panels for Lexmark make printers.
printer  #  general search for printers.
ssl:"Xerox Generic Root"  #  remote access to Xerox printers.
title:"syncthru web service"  #  older Samsung printers, not secured by default.
"HP-ChaiSOE" port:"80"  #  HP LaserJet printers accessible through HTTP.
"Laser Printer FTP Server"  #  printers accessible via FTP with anonymous login allowed.
"Location: /main/main.html" debut  #  admin pages of Brother printers, not secured.
"Server: CANON HTTP Server"  #  Canon printer servers through HTTP connection.
"Server: EPSON-HTTP" "200 OK"  #  another variation of the above search.

Compromised devices and websites

1
2
3
4
5
6
7
8
9
10
11
bitcoin has_screenshot:true  #  searches for the ‘bitcoin’ keyword, where a screenshot is present (useful for RDP screens of endpoints infected with ransomware).
hacked  #  general search for the ‘hacked’ label.
http.title:"0wn3d by"  #  resourced labelled as ‘owned’ by a threat agent, hacker group, etc.
http.title:"Hacked by"  #  another variation of the same search filter.
port:4444 system32  #  compromised legacy operating systems. Port 4444 is the default port for Meterpreter  #  a Metasploit attack payload with an interactive shell for remote code execution.
port:"27017" "send_bitcoin_to_retrieve_the_data"  #  databases affected by ransomware, with the ransom demand still associated with them.
"attention"+"encrypted"+port:3389  #  ransomware infected RDP services.
"hacked by"  #  another variation of the above search.
"HACKED FTP server"  #  compromised FTP servers.
"HACKED-ROUTER-HELP-SOS-HAD-DEFAULT-PASSWORD"  #  compromised hosts with the name changed to that phrase.
"HACKED-ROUTER"  #  compromised routers, labelled accordingly.

Miscellaneous

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
http.html:"* The wp-config.php creation script uses this file"  #  misconfigured WordPress websites.
http.title:"control panel"  #  as above, but whatever is labelled as control panels.
http.title:"dashboard"  #  literally anything labelled ‘dashboard’, with many not accessible due to security by default.
http.title:"Nordex Control"  #  searches for Nordex wind turbine farms.
http.title:"Tesla"  #   anything with the term “Tesla” in the banner.
solar  #  controls for solar panels and similar solar devices.
"DICOM Server Response" port:104  #  DICOM medical machinery.
"ETH  #  Total speed"  #  Ethereum cryptocurrency miners.
"in-tank inventory" port:10001  #  petrol pumps, including their physical addresses.
"Server: EIG Embedded Web Server" "200 Document follows"  #  EIG electricity meters.
port:"11211" product:"Memcached"  # UDP amplification attacks leading to huge DDoS attacks
"X-Jenkins" "Set-Cookie: JSESSIONID" http.title:"Dashboard"  #  often the starting point of any software being built for release
"port: 53" Recursion: Enabled  #  DNS servers with recursion enabled can be a huge source of network threats.
title:"OctoPrint" -title:"Login" http.favicon.hash:1307375944  #  OctoPrint 3D Printer Controllers
"ETH - Total speed"  #  Etherium Miners
http.html:"* The wp-config.php creation script uses this file"  #  Misconfigured WordPress
"Minecraft Server" "protocol 340" port:25565  #  Too Many Minecraft Servers
net:175.45.176.0/22,210.52.109.0/24,77.94.35.0/24  #  Literally Everything in North Korea
TCP Quote of the Day  #  TCP Quote of the Day

Or you can get help about what you are looking for here. (Use ctrl + F.)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
ABB AC 800M # "ABB - AC 800M Controller"
ABB RTU560 # "ABB - RTU560 Substation automation product"
ABB RTU-Helpdesk # "ABB - RTU500 Remote Terminal Unit"
ABB SREA-01 # "ABB - SREA-01 Ethernet Adapter Module"
ABB Webmodule # "ABB - Generic Multiple Devices"
AKCP Embedded Web Server # "ACKP - Generic Multiple Devices, often data center monitoring"
A440 Wireless Modem # "Adcon Telemetry - A440 Wireless Modem Base Station"
A850 Telemetry Gateway # "Adcon Telemetry - A850 Telemetry Gateway Base Station for Adcon Wireless Sensor Networks"
addUPI Server # "Adcon Telemetry - addUPI-OPC Server"
addVANTAGE # "Adcon Telemetry - addVANTAGE Pro 6.X HMI"
title:adcon # "Adcon Telemetry - Generic Generic"
IPC@CHIP # "Beck IPC - IPC@CHIP PLC"
Cimetrics Eplus Web Server # "Cimetrics - Eplus - B/IP to B/WS Gateway Firewall networking products for distributed monitoring and control systems"
ISC SCADA Service HTTPserv:00001 # "Clorius Controls A/S - ISC SCADA SCADA Software"
Webvisu # "Codesys - WebVisu"
Visu Remote Login # "CodeSys - WebVisu"
port:2455 operating system # "Codesys"
3S-Smart Software Solutions # "CodeSys"
DELTA enteliTOUCH # "Delta Controls - enteliTOUCH HMI Building automation"
i.LON # "Echelon - i.LON SmartServer 2.0 Building Energy Management Solution, LonWorks/IP Server, Internet Server"
CIMPLICITY WebView # "General Electric - CIMPLICITY WebView CIMPLICITY is HMI/SCADA"
CIMPLICITY-HttpSvr # "General Electric - Cimplicity CIMPLICITY is HMI/SCADA"
ProficyPortal # "General Electric - Proficy Historian (now named GE Digital)"
port:18245,18246 product:"general electric" # "General Electric - Service Request Transport Protocol (GE-SRTP)"
port:502 # "Generic - Modus"
port:20000 source address # "Generic - dnp"
port:47808 # "Generic - BACnet protocol (Data Communication Protocol for Building Automation and Control Networks)"
port:44818 # "Generic - EtherNet/IP"
port:5094 hart-ip # "Generic - The HART Communications Protocol (Highway Addressable Remote Transducer Protocol) is an early implementation of Fieldbus, a digital industrial automation protocol."
GoAhead-Webs InitialPage.asp # "Generic - goAhead embedded webserver"
Modbus Bridge # "Generic"
ModbusGW # "Generic"
PLC type # "Generic - Generic Generic"
PLC name # "Generic - Generic Generic"
Powerlink # "Generic - Industrial Ethernet system, open-source used by various vendoes openPowerlink, ethernet-powerlink.org devices (PLC HMI ..)"
SCADA # "Generic"
webSCADA # "Generic"
HMS AnyBus-S WebServer # "HMS - EtherNet/IP / Modbus-TCP Interface Generic"
eiPortal # "Honeywell EnergyICT - eiPortal Energy Monitoring Software"
EnergyICT RTU # "Honeywell EnergyICT - RTU Remote Data Concentrator"
port:20547 PLC # "KW Software, Inc. - ProConOS / PLC"
lantronix # "Lantronix"
lantronix port:9999 # "Lantronix - default telnet port"
port:30718 lantronix # "Lantronix"
port:5006,5007 product:mitsubishi # "Mitsubishi Electric - MELSEC-Q Series"
Moscad ACE # "Motorola - Moscad"
MovWebClientX # "Movicon/Progea - Web-Client"
ioLogik Web Server # "Moxa - ioLogik Web Server SCADA Software"
port:4800 'Moxa Nport' # "Moxa - Nport and OnCell devices"
title:'NPort web console' # "Moxa - Nport devices"
MoxaHttp # "Moxa - AirWorks AWK-3131-RCC/Railway Remote I/O (ioLogik E12xx)/Cellular Micro RTU Controller (ioLogik W53xx, ioLogik)/VPort 461 Industrial Video Encoder/IA240 Embedded computer/IA241 Embedded computer/OnCell Central Manager/EDS-505A Series/EDS-508A Series/OnCell G3100 Series/Generic generic"
port:4800 'OnCell' # "Moxa - OnCell devices"
WindWeb # "NRG Systems - WindCube Wind Speed Meter"
port:9600 response code # "Omron - FINS, Factory Interface Network Service,"
Visu+ Web Client # "Phoenix Contact GmbH - SCADA visualization system"
port:1962 PLC # "Phonix Contact - PCWorxs"
PLC Type: AXC # "Phonix Contact - AXC is a modular small-scale controller for the Axioline I/O system PCWorxs"
PLC Type: ILC # "Phonix Contact - ILC controllers PCWorxs"
Quantum BACnet # "Quantum - Multiple Devices"
title:phasefale Z-World Rabbit # "Rabbit - Z-World Rabbit Multiple Devices"
Z-World Rabbit # "Rabbit - Generic Multiple Devices"
port:789 product:"Red Lion Controls" # "Red Lion Controls - Red Lion Controls G306a human machine interface (HMI)."
Reliance 4 Control Server # "Reliance - Reliance 4 SCADA/HMI system SCADA/HMI Software"
Rockwell Automation # "Rockwell Automation - Generic Generic"
Allen-Bradley # "Rockwell Automation / Allen-Bradley - Generic Generic"
Micrologix # "Rockwell Automation / Allen-Bradley - small programmable logic controller solution"
Series C Revision # "Rockwell Automation / Allen-Bradley - Generic Generic"
RTS SCADA Server # "RTS Services - General SCADA Software"
IMasterSaia5_15_03.jar # "SBC - Saia Burgess Control Applet"
Saia PG5 Web Editor # "SBC"
Schleifenbauer SPbus gateway # "Schleifenbauer - SPbus gateway Network Gateway"
CitectSCADA # "Schneider Electric - CitectSCADA HMI / SCADA software package"
ClearSCADA # "Schneider Electric - Generic SCADA software"
EGX100MG # "Schneider Electric - PowerLogic EGX EGX100MG"
Modicon # "Schneider Electric - Modicon generic"
Modicon M340 # "Schneider Electric - Modicon M340 PLC"
port:23 'Meter ION' # "Schneider Electric - PowerLogic ION7650 Energy and power meter Energy and power meter"
Power Measurement Ltd # "Schneider Electric - Generic Energy and power meter"
PowerLogic # "Schneider Electric - PowerLogic Series Power Monitoring Module"
Schneider Electric # "Schneider Electric - generic generic"
Schneider-WEB # "Schneider Electric - General Multiple Devices"
TELEMECANIQUE BMX # "Schneider Electric - Modicon generic"
title:PowerLogic # "Schneider Electric - Generic Generic"
Schneider Electric EGX300 # "Schneider Electric - EGX300"
HMI XP277 # "Siemens - Simatic HMI HMI"
Portal0000 # "Siemens - Simatic S7-1200 PLC"
Portal0000.htm # "Siemens - Simatic S7-300 (pre-2009 versions) PLC"
S7-200 # "Siemens - Simatic S7-200 PLC"
S7-300 # "Siemens - Simatic S7-300 PLC"
Scalance # "Siemens - Scalance generic SCALANCE X Industrial Ethernet switches / SCALANCE W Industrial Wireless LAN / SCALANCE M Industrial routers / SCALANCE S Industrial Security"
Copyright: Original Siemens Equipment # "Siemens - Generic Generic"
Simatic # "Siemens - Simatic HMI Generic"
Welcome to the Windows CE Telnet Service on HMI_Panel # "Siemens - Simatic HMI Generic"
XP277 # "Siemens - Simatic"
port:102 # "Siemens - PLC port can not be deactivated by user"
/gc/flash.php # "Sierra Wireless"
SoftPLC # "SoftPLC"
title:Somfy # "Somfy - General Smart Home Devices"
SpiderControl # "SpiderControl - Generic HMI"
Stulz GmbH Klimatechnik # "Stulz GmbH - Generic Generic"
server: iq3 # "Trend - IQ3xcite Controller"
port:1911,4911 product:Niagara # "Tridium - Fox protocol developed as part of Niagara framework"
Niagara Web Server # "Tridium - NiagaraAX (ver 1) Software for JACE-2 JACE-403 or JACE-545"
niagara_audit # "Tridium - NiagaraAX (ver 2) Software for JACE-2 JACE-403 or JACE-545"
niagara_audit -login # "Tridium - NiagaraAX (ver 3) Software for JACE-2 JACE-403 or JACE-545"
Niagara-Platform: QNX # "Tridium - Niagara Framework"
os.name=s:QNX # "Tridium - Niagara Framework"
Server: VTScada # "Trihedral - VTScada ODBC Server"
title:WAGO # "Wago - Generic Generic"
VxWorks # "Wind River - VxWorks SCADA Software"
WindRiver-WebServer # "Wind River - Generic Generic"
title:'xzeres wind' # "Xzeres - 442SR small wind turbine"
port:2404 asdu address # "Generic - IEC 60870 part 5 is one of the IEC 60870 set of standards which define systems used for SCADA in electrical engineering and power system automation applications."
title:'Carel pCOWeb Home Page' # "Carel - pCO sistema pCOWeb is used to interface pCO Sistema to networks that use the HVAC protocols like BACnet IP Modbus TCP/IP or SNMP"
title:'Heatmiser Wifi Thermostat' # "Heatmiser - wireless room thermostats"
tag:ics # "generic - searching tag values requires suitable account"
tag:iot # "generic - searching tag values requires suitable account"
Local BACnet Device object"Tridium" # "Tridium - BACNet Devices"
Carel BACnet Gateway # "Carel - BACNet Devices"
Siemens BACnet Field Panel # "Siemens - BACNET Devices"
BACnet Broadcast Management Device # "generic - BACNet Devices"
I20100 port:10001 # "Veeder-root - Automated Tank Gauge (Vendor most likely Veeder-Root but not guaranteed) results typically contain a lot of honyepots (conpot)"
screenshot.label:ics # "Generic - Screenshots tagged as ICS (will contain some false positives)"
port:1883"MQTT Connection Code" # "Generic - standard port for MQTT + MQTT banner / MQTT -> MQ Telemetry Transport"
port:8883"MQTT Connection Code" # "Generic - standard port for MQTT over SSL + MQTT banner / MQTT -> MQ Telemetry Transport / UNTESTED"
port:1883 Fronius # "Fronius - Generic solar energy, most likely inverters"
Press Enter for Setup Mode port:9999 # "Lantronix - default telnet port without password enabled hint: Lantronix includes MAC address in banner which can be used for extra validation"
Server: CarelDataServer"200 Document follows" # "Carel - PlantVisor"
"http.title:""Nordex Control""""Windows 2000 5.0 x86""""Jetty/3.1 (JSP 1.1 Servlet 2.2 java 1.6.0_14)"" # "" Nordex - Wind Farm Portal"
hostname:edu country:us port:22 # "dministration - .edu US SSH"
admin 1234 # "Administration - admin/1234"
port:80 admin # "Administration - admin"
200 OK -Microsoft -Virata -Apache Allegro # "Administration - Allegro"
1.1-rr-std-b12 port:80 # "Administration - AMX Control Systems"
Anonymous+access+allowed # "Administration - Anonymous Access Allowed"
anonymous access granted # "Administration - Anonymous Access Granted"
APC Management Card # "Administration - APC Management Card"
apc # "Administration - apc"
barracuda # "Administration - Barracuda targets"
bigfix # "Administration - bigfix"
CarelDataServer # "Administration - CarelDataServer"
CERN 3.0 # "Administration - Cern 3.0"
a license exception # "Administration - Coldfusion Developer Edition"
computershare # "Administration - CPU"
Remote Access Controller port:80 # "Administration - Dell Remote Access Controller"
delta # "Administration - Delta Networks Inc"
fast dns port:80 # "Administration - DNS"
etcd # "Administration - etcd"
firewall 200 # "Administration - Firewalls"
port:22 # "Administration - General SSH"
230-Hewlett-Packard # "Administration - Hewlett Packard print ftp"
HitboxGateway9 # "Administration - hitbox"
HP-ChaiSOE # "Administration - HP LaserJet 4250"
jetdirect # "Administration - JetDirect HP Printer"
liebert - liebert.com # "Administration - Liebert Devices"
Exchange # "Administration - Micro$oft Exchange"
nga.mil # "Administration - ngamil"
port:5060 Nortel # "Administration - Nortel SIP devices"
ossim # "Administration - ossim"
port:23"list of built-in commands" # "Administration - Root shell"
wince Content-Length: 12581 # "Administration - SAPHIR"
SimpleShare # "Administration - SimpleShare NAS"
snom embedded # "Administration - Snom"
admin 1234 # "Administration - test"
firewall 200 - date -Internet -netgear -proxy -charset -length -220 # "Administration - Watchguard fierwalls"
ZENworks # "Administration - ZENworks"
Zhone SLMS # "Administration - Zhone Single-Line Multi-Service"
cisco-ios # "Cisco - Cisco Devices"
cisco port:23,80 # "Cisco - cisco elnet web"
cisco-ios country:IN # "Cisco - CISCO IOS India"
cisco-ios country:DZ # "Cisco - Cisco Iso in Algeria"
cisco-ios"last-modified" country:BR # "Cisco - cisco no brasil"
cisco last-modified Accept-Ranges: none # "Cisco - Cisco Open Web Boxs"
Cisco VPN Concentrator admin.html # "Cisco - Cisco VPN Concentrator - admin"
Cisco VPN Concentrator # "Cisco - Cisco VPN Concentrator"
7912 cisco # "Cisco - CiscoPhone 7912"
7940 cisco # "Cisco - CiscoPhone 7940"
1993"cisco-ios" +"last-modified" # "Cisco - IOS HACK - old"
drupal # "CMS - Drupal"
joomla # "CMS - Joomla"
wordpress # "CMS - Wordpress"
proxy.php # "Common Files - Proxy.php"
default password # "Default Credentials - default password"
Default Login Authenticate # "Default Credentials - Passwords"
PowerDNS # "DNS Server - PowerDNS"
X-dotDefender-denied # "Firewall - dotDefender WAF"
port:21 230 # "FTP - Anonymous FTP"
country:CN port:21 # "FTP - China FTP"
filezilla # "FTP - Filezilla"
Anonymous user logged in # "FTP - FTP anon successful"
Anonymous+access+allowed connected # "FTP - FTP anon successful"
ftp 230 -unknown -print # "FTP - FTP anonymous or guest access"
GoldenFTP # "FTP - GoldenFTP 4.70"
Golden FTP Server # "FTP - GoldenFTP Server"
X-Powered-By: PHP # "Languages - PHP"
centos # "Operating System - CentOS"
Fedora # "Operating System - Fedora"
IPCop # "Operating System - IPCop"
RedHat # "Operating System - RedHat"
Ubuntu # "Operating System - Ubuntu"
Windows 2000 # "Operating System - Windows 2000"
Windows 2003 # "Operating System - Windows 2003"
Fuji Xerox # "Printer - Fuji Xerox Servers"
jetdirect # "Printer - JetDirect"
Xerox 4150 # "Printer - Xerox 4150"
Airstation # "Router - Airstation"
dd-wrt port:80 # "Router - DD-WRT"
SmartAX MT882 # "Router - HUAWEI Routers"
SmartAX MT882 country:RU # "Router - HUAWEI ROUTERS"
netgear # "Router - netgear routers"
netgear # "Router - netgear"
Network Switch # "Router - Network Switches"
OpenWRT # "Router - OpenWRT"
admin+1234 # "Router - Router w/ Default Info"
bacnet # "SCADA and ICS - BACnet devices"
EIG Embedded Web Server # "SCADA and ICS - Electro Industries GaugeTech"
niagara_audit -login # "SCADA and ICS - Open SCADA Niagara systems"
sunny webbox port:80 # "SCADA and ICS - Photovoltaic"
slc 505 # "SCADA and ICS - Rockwell SLC-505 PLC"
scada country:US # "SCADA and ICS - SCADA USA"
Niagara Web Server # "SCADA and ICS - SCADA"
scada # "SCADA and ICS - SCADA"
siemens s7 # "SCADA and ICS - Siemens s7"
port:161 simatic # "SCADA and ICS - Siemens SIMATIC"
Simatic -S7 -HMI # "SCADA and ICS - Simatic NET"
Simatic+S7 # "SCADA and ICS - Simatic S7 SCADA"
Simatic S7 # "SCADA and ICS - Simatic S7"
telemetry gateway # "SCADA and ICS - Telemetry Gateway"
X-Powered-By:W3 Total Cache # "Server Modules - W3 Total Cache"
allied telesys port:23 # "Television - Allied telesyn equipment"
dreambox SE # "Television - Dreambox SE"
Enigma2 WebInterface Server # "Television - Dreambox/Enigma2 WebInterface"
dreambox # "Television - Dreambox"
spinetix # "Television - spinetix hyper media player"
Tandberg Television Web server # "Television - Tandberg Television Web server"
Ubicom -401 # "Television - Ubicom"
AddPac # "VOIP - AddPac Technology"
AddPac # "VOIP - AddPac VoIP"
airtel # "VOIP - airtel"
asterisk # "VOIP - asterisk"
SIP User-Agent BT Home Hub # "VOIP - BT Home Hub"
7940 cisco # "VOIP - Cisco 7940"
CISCO 200 port:5060 # "VOIP - Cisco SIP proxy"
hostname:firmex.com # "VOIP - firmex.com"
port:5060 Nortel # "VOIP - Nortel SIP devices"
snom embedded 200 OK # "VOIP - Snom phones without passwords"
port:5060 snom # "VOIP - Snom SIP"
snom embedded # "VOIP - Snom VOIP phones with no authentication"
Tenor # "VOIP - Tenor"
trixbox port:5060 # "VOIP - trixbox sip server"
huawei -301 -302 -400 -401 # "VOIP - Web interface for Huawei IP phones--no authentication required"
Virata-EmWeb # "Web Server - Virata-EmWeb"
apache 0.9* port:80 # "Web Server - AFHCAN Telehealth"
country:in apache centos hostname:exacttouch.com # "Web Server - Centos apache"
Commodore 64 # "Web Server - Commodore 64 Web servers"
iisstart.htm # "Web Server - Default IIS Web Pages"
F5-TrafficShield # "Web Server - F5 Traffic Shield"
google # "Web Server - Google"
Gordian Embedded # "Web Server - Gordian Embedded"
200 OK i.LON # "Web Server - i.LON"
IBM-HTTP-Server # "Web Server - IBM HTTP Server"
IIS 3.0 -"6.0" -"7.0" -"7.5" -"5.0" -"5.1" # "Web Server - IIS 3.0 webservers"
iis4.0 country:AU # "Web Server - IIS 4.0 in AU"
IIS 4.0 -"6.0" -"7.0" -"7.5" -"5.0" -"5.1" -"404" -"403" -"302" # "Web Server - IIS 4.0 webservers"
IIS 4.0 -"6.0" -"7.0" -"7.5" -"5.0" -"5.1" -"404" -"403" -"302" # "Web Server - IIS 4.0"
IIS 4.0 -"6.0" -"7.0" -"7.5" -"5.0" -"5.1" -"404" -"403" -"302" port:80 country:IN # "Web Server - IIS 4.0"
iis 5.0 # "Web Server - iis 5.0"
iis 6.0 webdav # "Web Server - iis 6.0 webDav"
port:80 country:US X-Content-Security-Policy asp.net # "Web Server - IIS in the US with CSP"
Server: iWeb HTTP # "Web Server - iWeb"
KM-MFP-http # "Web Server - KM MFP HTTP Server"
iPhone lighttpd # "Web Server - lighttpd on iphones"
Server: LiteSpeed # "Web Server - LiteSpeed"
mod_antiloris # "Web Server - mod_antiloris"
mod_security # "Web Server - mod_security"
Oracle_Web_Listener # "Web Server - Oracle Web Listener"
Profense # "Web Server - Profense"
SkyX HTTPS # "Web Server - SkyX HTTPS gateway"
nginx de country:DE # "Web Server - SUCKUP.de: Mein IT-Blog"
apache 2.2.13 302 5000 # "Web Server - Synology Disk Station"
apache # "Web Server - Test Apache"
wince # "Web Server - Windows CE"
WindWeb # "Web Server - WindWeb server"
Xerver # "Web Server - Xerver HTTP Server"
(zOS) -Apache -IIS -Extraweb -kerio -sestbc510 # "Web Server - z/oS"
linux upnp avtech # "Webcam - AVTech IP Camera"
netcam # "Webcam - Belkin NetCam"
dcs 5220 # "Webcam - DCS-5220"
Server: GeoHttpServer # "Webcam - GeoHttpServer WebCam"
TeleEye # "Webcam - TeleEye"
Vivotek Network Camera 200 # "Webcam - Vivotek Network Camera"
imagiatek ipcam # "Webcam - webcam imagiatek"
sq-webcam # "Webcam - webcam VIDEO WEB SERVER"
Boa ipcam # "Webcam - webcam vipcap vilar"
Server: SQ-WEBCAM # "Webcam - Webcam"
country:BG port:443 os:windows # "Windows - win"
RAC_ONE_HTTP # "ZENworks - Remote Access Controller"
This post is licensed under CC BY 4.0 by the author.

Recon-ng Tutorials for Enumeration Targets

Security Devices and Software types to Detect Scans

Comments powered by Disqus.

Powered by 0xhav0c © 2022