Complete Shodan Dork Cheat Sheet

TEAM
Complete Shodan Dork Cheat Sheet 2025 - Ultimate Guide for Security Researchers

Complete Shodan Dork Cheat Sheet

Your Ultimate Guide to Mastering the World's Most Powerful IoT Search Engine

What is Shodan?

Shodan is a specialized search engine that's fundamentally different from Google or Bing. Instead of searching for content, Shodan scans the internet for connected devices including cameras, servers, IoT devices, industrial control systems, and much more.

Unlike traditional search engines, Shodan provides a way to discover which devices are connected to the internet, where they're located, and who is using them. It's an invaluable tool for security researchers, penetration testers, and IT professionals.

Legal Disclaimer: Use Shodan for educational and legal research purposes only. Unauthorized access to systems is illegal in most countries. Always obtain proper authorization before testing systems.

Primary Keywords:

Shodan Shodan Dorks Penetration Testing Cybersecurity IoT Security Pentesting Security Research OSINT Bug Bounty Ethical Hacking

Table of Contents

  • Basic Search Filters
  • Network & Location Filters
  • HTTP/Web Filters
  • SSL/TLS Filters
  • Advanced Device Filters
  • Pro Tips & Combinations

Basic Search Filters

hostname - Search by Hostname

Description: Search for devices based on specific hostname or domain name.

hostname:google.com

Component Examples:

http.component:"WordPress"
http.component:"jQuery"
http.component:"Bootstrap"
http.component:"Angular"
http.component:"React"
  • Identify technology stack
  • Find sites using specific frameworks
  • Research technology adoption

http.favicon.hash - Search by Favicon Hash

Description: Find websites with specific favicon (using MurmurHash).

http.favicon.hash:12345678

Use Case:

http.favicon.hash:-1388948703 (Jenkins)
http.favicon.hash:81586312 (pfSense)
  • Identify specific applications by favicon
  • Find all instances of a platform
  • Track web application deployments

SSL/TLS Certificate Filters

ssl - Search SSL Certificates

Description: Search within SSL/TLS certificate information.

ssl:"Google"

SSL Examples:

ssl.cert.subject.cn:"example.com"
ssl.cert.issuer.cn:"Let's Encrypt"
ssl.cert.expired:true
ssl.cert.subject.cn:*.google.com
  • Find expired certificates
  • Identify organizations by certificates
  • Track SSL/TLS implementations

ssl.cert.subject.cn - Certificate Common Name

Description: Search by SSL certificate common name.

ssl.cert.subject.cn:"*.example.com"

Common Name Examples:

ssl.cert.subject.cn:"localhost"
ssl.cert.subject.cn:"*.cloudflare.com"
ssl.cert.subject.cn:"mail.example.com"
  • Find domains with SSL certificates
  • Discover wildcard certificates

ssl.cert.issuer.cn - Certificate Issuer

Description: Search by certificate authority/issuer.

ssl.cert.issuer.cn:"Let's Encrypt"

Issuer Examples:

ssl.cert.issuer.cn:"DigiCert"
ssl.cert.issuer.cn:"GeoTrust"
ssl.cert.issuer.cn:"Comodo"
ssl.cert.issuer.cn:"GlobalSign"
  • Find certificates by CA
  • Research CA usage statistics

Advanced Device & Service Filters

device - Search by Device Type

Description: Search for specific types of devices.

device:"webcam"

Device Types:

device:"router"
device:"firewall"
device:"printer"
device:"storage"
device:"camera"
device:"phone"
  • Find IoT devices
  • Discover network equipment
  • Locate specific hardware

has_screenshot - Devices with Screenshots

Description: Find devices where Shodan has captured screenshots.

has_screenshot:true port:3389

Screenshot Examples:

has_screenshot:true port:80
has_screenshot:true http.title:"Dashboard"
  • Visual verification of services
  • Identify visual interfaces

vuln - Search by Vulnerability (CVE)

Description: Find devices with known vulnerabilities.

vuln:CVE-2021-44228

Vulnerability Examples:

vuln:CVE-2017-0144 (EternalBlue)
vuln:CVE-2014-0160 (Heartbleed)
vuln:CVE-2021-44228 (Log4Shell)
  • Find vulnerable systems
  • Security research and testing
  • Vulnerability assessment

tag - Search by Service Tag

Description: Search for devices tagged with specific service categories.

tag:iot

Tag Examples:

tag:database
tag:webcam
tag:industrial
tag:vpn
tag:cloud
  • Find categorized services
  • Discover IoT devices

before/after - Search by Date

Description: Filter results by scan date.

apache after:01/01/2024

Date Examples:

nginx before:31/12/2023
ssh after:15/06/2024
product:"MySQL" after:01/01/2024 before:31/12/2024
  • Find recently scanned devices
  • Track changes over time

hash - Search by Banner Hash

Description: Search for services with identical banner hashes.

hash:12345678

Use Case:

hash:-553166942 (Common SSH banner)
  • Find identical services
  • Identify service fingerprints

Pro Tips for Mastering Shodan

  • Combine Multiple Filters: Use multiple filters together for precise results: country:US port:22 os:"Ubuntu" product:"OpenSSH"
  • Use Quotation Marks: For exact phrase matching: http.title:"Admin Panel"
  • Exclude Results: Use minus sign to exclude terms: apache -country:US
  • Wildcard Searches: Use asterisk for wildcards: hostname:*.edu
  • Boolean Logic: Use AND, OR, NOT operators for complex queries
  • Learn from Examples: Study Shodan's official documentation regularly
  • Ethical Usage: Always use Shodan ethically and legally
  • Save Searches: Use Shodan's monitor feature to track changes
  • Use Filters Wisely: Start broad, then narrow down with filters
  • Check Scan Dates: Remember that Shodan data isn't real-time

Advanced Query Combinations

Real-World Examples:

# Find vulnerable Apache servers in the US
country:US product:"Apache" vuln:CVE-2021-41773

# Locate MongoDB databases without authentication
product:"MongoDB" port:27017 "mongodb server information"

# Find cameras with default credentials
device:"webcam" http.title:"IP Camera" country:US

# Discover Elasticsearch instances
port:9200 product:"Elasticsearch"

# Find exposed RDP servers
port:3389 country:DE has_screenshot:true

# Locate industrial control systems
tag:industrial port:502 country:US

# Find WordPress sites with specific plugin
http.component:"WordPress" http.html:"wp-content/plugins/vulnerable-plugin"

# Discover IoT devices by manufacturer
device:iot org:"Internet of Things Inc"

# Find Jenkins servers
http.title:"Dashboard [Jenkins]" port:8080

# Locate exposed MySQL databases
product:"MySQL" port:3306 -authentication

Security & Legal Guidelines

  • Legal Authorization: Always obtain explicit permission before testing systems
  • Responsible Disclosure: Report vulnerabilities to appropriate parties
  • Know the Law: Understand cybersecurity laws in your jurisdiction
  • Ethical Hacking: Use Shodan for legitimate security research only
  • Documentation: Keep records of your security research activities
  • Data Privacy: Respect privacy and don't access sensitive information
  • Education First: Use Shodan as a learning tool for cybersecurity

Useful Resources

  • Official Documentation: https://help.shodan.io
  • Shodan Filters: https://www.shodan.io/search/filters
  • Shodan Academy: Learn advanced techniques
  • Community Forum: Connect with other researchers
  • Shodan API: Automate your searches
  • Shodan CLI: Command-line interface tools

Created for Educational Purposes Only

For more cybersecurity content, follow our blog

Remember: With great power comes great responsibility. Use Shodan ethically and legally.

© 2025 - All Rights Reserved

Complete Shodan Dork Cheat Sheet

Practical Examples:

hostname:microsoft.com
hostname:*.edu
hostname:example.org
hostname:*.gov
  • Find servers belonging to specific companies
  • Explore infrastructure of a specific domain
  • Identify subdomains and related services

port - Search by Port Number

Description: Find services running on a specific port number.

port:22

Common Ports:

port:80 (HTTP)
port:443 (HTTPS)
port:22 (SSH)
port:21 (FTP)
port:23 (Telnet)
port:3389 (RDP)
port:3306 (MySQL)
port:5432 (PostgreSQL)
port:27017 (MongoDB)
port:6379 (Redis)
  • Discover SSH servers
  • Find web services
  • Locate database instances
  • Identify specific protocols

product - Search by Product/Software

Description: Search for specific software products or services.

product:"Apache httpd"

Popular Products:

product:"nginx"
product:"MySQL"
product:"MongoDB"
product:"OpenSSH"
product:"Microsoft IIS"
product:"Cisco IOS"
product:"Apache Tomcat"
product:"WordPress"
  • Find specific technologies
  • Identify vulnerabilities in specific products
  • Research technology usage statistics

version - Search by Version Number

Description: Find specific versions of products or services.

version:"2.4.1"

Version Examples:

product:"Apache" version:"2.4.49"
product:"OpenSSH" version:"7.4"
product:"nginx" version:"1.18.0"
  • Find outdated versions with vulnerabilities
  • Identify specific versions for testing
  • Track version distribution

os - Search by Operating System

Description: Find devices running a specific operating system.

os:"Windows 10"

Operating Systems:

os:"Linux"
os:"Windows Server 2019"
os:"Ubuntu"
os:"CentOS"
os:"FreeBSD"
os:"macOS"
os:"Windows 7"
  • Target specific operating systems
  • Find OS-specific vulnerabilities
  • Research OS distribution statistics

Network & Location Filters

net - Search by Network/IP Range

Description: Search for devices within a specific IP range using CIDR notation.

net:192.168.1.0/24

Network Examples:

net:8.8.8.0/24
net:10.0.0.0/8
net:172.16.0.0/12
net:203.0.113.0/24
  • Scan entire networks
  • Search corporate IP ranges
  • Analyze local networks

country - Search by Country

Description: Filter results by country using two-letter country codes.

country:US

Country Codes:

country:US (United States)
country:GB (United Kingdom)
country:DE (Germany)
country:CN (China)
country:JP (Japan)
country:RU (Russia)
country:BR (Brazil)
  • Geographically locate devices
  • Study country-specific infrastructure
  • Comply with regional regulations

city - Search by City

Description: Search for devices in a specific city.

city:"New York"

City Examples:

city:"London"
city:"Tokyo"
city:"Paris"
city:"Singapore"
city:"Dubai"
  • Target specific geographic areas
  • Analyze local infrastructure

org - Search by Organization

Description: Search for devices belonging to specific organizations.

org:"Google"

Organization Examples:

org:"Amazon"
org:"Microsoft"
org:"Digital Ocean"
org:"Cloudflare"
  • Find company-owned infrastructure
  • Research organizational assets

asn - Search by Autonomous System Number

Description: Search for devices within a specific ASN.

asn:AS15169

ASN Examples:

asn:AS15169 (Google)
asn:AS16509 (Amazon)
asn:AS8075 (Microsoft)
  • Find devices by network provider
  • Research ISP infrastructure

HTTP/Web Filters

http.title - Search by Page Title

Description: Search for web pages with specific titles.

http.title:"Dashboard"

Title Examples:

http.title:"Welcome to nginx"
http.title:"Login"
http.title:"phpMyAdmin"
http.title:"Admin Panel"
http.title:"Router"
  • Find admin panels
  • Discover login pages
  • Identify specific web applications

http.html - Search in HTML Content

Description: Search for specific text within HTML content.

http.html:"password"

HTML Search Examples:

http.html:"admin"
http.html:"default password"
http.html:"index of"
  • Find specific content in pages
  • Discover exposed information

http.status - Search by HTTP Status Code

Description: Filter results by HTTP response status code.

http.status:200

Status Codes:

http.status:200 (OK)
http.status:401 (Unauthorized)
http.status:403 (Forbidden)
http.status:500 (Server Error)
  • Find accessible pages
  • Discover authentication pages

http.component - Search by Web Component

Description: Search for specific web technologies or frameworks.

http.component:"WordPress"

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Check Now
Ok, Go it!