The Compilation of SHODAN Filters is a reference resource that provides a comprehensive list of search filters for the SHODAN search engine. This compilation enables users to refine their search queries using specific criteria to locate internet-connected devices and services. The resource includes general filters that allow users to narrow down search results based on temporal, geographical, and technical parameters. Date-based filters include "after" and "before" options for specifying time ranges using dd/mm/yyyy format. Location-based filters encompass city names, 2-letter country codes, postal codes (US-only), and geographical coordinates through the "geo" parameter that accepts 2-4 location parameters. Network and infrastructure filters include autonomous system number (ASN), Internet Service Provider (ISP), organization details, and network range specification using CIDR notation. The compilation also covers device-specific filters such as hostname, IP address ranges, operating system identification, and port number targeting. Additional filters focus on data characteristics including hash values of data properties, IPv6 availability status, screenshot presence indicators, product names, and categorical classifications such as industrial control systems (ICS) and malware-related results. These filters enable security researchers, network administrators, and cybersecurity professionals to conduct targeted reconnaissance and asset discovery activities using the SHODAN platform.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A curated collection of companies that have publicly disclosed adversary tactics, techniques, and procedures following security breaches.
A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.
A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.