<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: rrrowan</title>
    <description>The latest articles on DEV Community by rrrowan (@rrrowan).</description>
    <link>https://dev.to/rrrowan</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3508271%2F637e066f-0918-4990-835c-b96c51e18462.png</url>
      <title>DEV Community: rrrowan</title>
      <link>https://dev.to/rrrowan</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rrrowan"/>
    <language>en</language>
    <item>
      <title>A Single Dork to Understand Your Infrastructure: Asset Exposure &amp; Configuration Profiling</title>
      <dc:creator>rrrowan</dc:creator>
      <pubDate>Sat, 29 Nov 2025 06:25:13 +0000</pubDate>
      <link>https://dev.to/rrrowan/a-single-dork-to-understand-your-infrastructure-asset-exposure-configuration-profiling-4j0k</link>
      <guid>https://dev.to/rrrowan/a-single-dork-to-understand-your-infrastructure-asset-exposure-configuration-profiling-4j0k</guid>
      <description>&lt;p&gt;In cybersecurity, identifying internet-facing infrastructure and rapidly building configuration profiles is fundamental to effective defense. There are multiple ways to capture this information, and ZoomEye provides a powerful capability that allows analysts to easily discover exposed services and configurations.&lt;/p&gt;

&lt;p&gt;With a single well-crafted dork query, we can enumerate exposed architectures, technology stacks, operating systems, and service configurations.&lt;/p&gt;

&lt;p&gt;This article introduces how to leverage ports, service banners, icon hashes (&lt;strong&gt;iconhash&lt;/strong&gt;), and other metadata to quickly fingerprint infrastructure and help security teams gain visibility into exposure risks.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Exposure Surface &amp;amp; Configuration Profiling of Infrastructure
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1.1 Core Indicators of Asset Exposure
&lt;/h3&gt;

&lt;p&gt;When we perform searches on ZoomEye, we are not simply querying IPs or ports. Instead, we leverage service banners, icon hashes (&lt;strong&gt;iconhash&lt;/strong&gt;), SSL/TLS certificate fields, and other metadata to accurately identify service implementations and system configurations. Common indicators include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Port Numbers:&lt;/strong&gt; Many services run on well-known ports—for example, HTTP on port 80, HTTPS on 443, SSH on 22, and so on. Exposed ports provide initial insight into the type of service running.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Service Banners:&lt;/strong&gt; When a service starts, it typically returns a recognizable banner string that may include software version, operating system, hardware architecture, or framework information. These banners enable precise fingerprinting of the technology stack.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Icon Hash (iconhash):&lt;/strong&gt; By hashing a site’s favicon or icon file, we can identify the CMS, framework, or platform it is built on. CMS platforms such as WordPress, Joomla, and Drupal exhibit distinct favicon fingerprints, making it possible to mass-enumerate sites with similar templates or deployment origins.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;SSL/TLS Certificates:&lt;/strong&gt; Certificate fields such as subject and issuer often reveal important attributes of the service or domain, including certificate owner, issuing CA, organization name, and other metadata relevant to configuration profiling.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  1.2 ZoomEye Query Examples: Rapid Identification of Architecture &amp;amp; Technology Stack
&lt;/h3&gt;

&lt;p&gt;With a single dork query, ZoomEye can quickly reveal publicly exposed services and their underlying technology stack. Below are several common query examples that demonstrate how to identify these components:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Query: Identify Exposed HTTP Services and Version Information&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;(port=80 || port=443) &amp;amp;&amp;amp; banner="Apache"&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Explanation:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
This query enumerates HTTP services exposed on ports &lt;strong&gt;80&lt;/strong&gt; or &lt;strong&gt;443&lt;/strong&gt; where the service banner contains the string &lt;strong&gt;"Apache"&lt;/strong&gt;, indicating that the target is likely running &lt;strong&gt;Apache HTTP Server&lt;/strong&gt;.&lt;br&gt;
&lt;strong&gt;Query: Identify Exposed WordPress Sites&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;title="WordPress" || iconhash="000bf649cc8f6bf27cfb04d1bcdcd3c7"&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Explanation:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;title="WordPress"&lt;/strong&gt; identifies sites that explicitly return a WordPress page title.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;iconhash&lt;/strong&gt; matches sites sharing the same favicon fingerprint, which often correlates with specific CMS platforms or themes.
&lt;/li&gt;
&lt;li&gt;This method enables large-scale enumeration of exposed &lt;strong&gt;Content Management Systems (CMS)&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Query: Identify Exposed Jenkins CI/CD Systems&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;title="Jenkins" || banner="Jenkins CI"&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Explanation:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
This query detects exposed &lt;strong&gt;Jenkins&lt;/strong&gt; services either through the page title or the banner string. Jenkins is widely used for &lt;strong&gt;Continuous Integration / Continuous Delivery (CI/CD)&lt;/strong&gt;, and publicly exposed instances can introduce significant security risks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Query: Find Exposed MySQL Databases&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;port=3306 &amp;amp;&amp;amp; banner="MySQL"&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Explanation:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
This query identifies &lt;strong&gt;MySQL&lt;/strong&gt; services exposed on the default port &lt;strong&gt;3306&lt;/strong&gt;, where the banner confirms a MySQL database instance. Exposing database interfaces directly to the internet represents a &lt;strong&gt;high-risk security issue&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Building an Infrastructure Exposure Profile
&lt;/h2&gt;

&lt;p&gt;Using ZoomEye and other reconnaissance tools, we can rapidly construct a configuration profile of an organization’s public-facing infrastructure. This process typically involves the following steps:&lt;/p&gt;

&lt;h3&gt;
  
  
  2.1 Collecting Service Information
&lt;/h3&gt;

&lt;p&gt;ZoomEye queries allow us to gather key details such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Service Types:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
By analyzing open ports and service banners, we can determine which services are running—such as web servers, databases, and development tools.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Version Information:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Many banners expose software version numbers, enabling analysts to assess whether known vulnerabilities may be present.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Technology Stack Identification:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Specific indicators—such as service banners and icon hashes—provide insight into the underlying technology stack (e.g., &lt;strong&gt;Nginx&lt;/strong&gt;, &lt;strong&gt;Apache&lt;/strong&gt;, &lt;strong&gt;Tomcat&lt;/strong&gt;, &lt;strong&gt;MySQL&lt;/strong&gt;).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2.2 Segmentation by Organization or Geographic Region
&lt;/h3&gt;

&lt;p&gt;Assets can also be filtered by &lt;strong&gt;Autonomous System (AS) number&lt;/strong&gt; or &lt;strong&gt;geographic attributes&lt;/strong&gt; (e.g., &lt;code&gt;country=CN&lt;/code&gt;) to analyze exposure for a specific country, network provider, or organization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Example Query: Identify Exposed Jenkins Instances in China&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;title="Jenkins" &amp;amp;&amp;amp; country=CN&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;This enumerates all publicly exposed &lt;strong&gt;Jenkins CI&lt;/strong&gt; systems located in China, supporting targeted monitoring of a region’s attack surface.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.3 Risk Assessment
&lt;/h3&gt;

&lt;p&gt;Because exposed services may contain known vulnerabilities, &lt;strong&gt;risk assessment&lt;/strong&gt; is a crucial part of configuration profiling. Several approaches include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Version-to-CVE Mapping:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
By correlating exposed service versions with entries in the &lt;strong&gt;CVE (Common Vulnerabilities and Exposures)&lt;/strong&gt; database, analysts can determine whether high-risk vulnerabilities are present.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Default Configuration Review:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Many systems are deployed with insecure defaults, such as default credentials, unnecessary services enabled, or lack of SSL/TLS encryption.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cross-Service Correlation:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
By combining multiple query conditions—e.g., exposed &lt;strong&gt;MySQL&lt;/strong&gt; plus &lt;strong&gt;phpMyAdmin&lt;/strong&gt;, or &lt;strong&gt;Jenkins&lt;/strong&gt; plus &lt;strong&gt;GitLab&lt;/strong&gt;—we can identify compounded attack surfaces and multi-vector risk scenarios.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3. Conclusion
&lt;/h2&gt;

&lt;p&gt;ZoomEye enables analysts to efficiently discover internet-exposed services and identify their underlying technology stacks through indicators such as &lt;strong&gt;open ports&lt;/strong&gt;, &lt;strong&gt;service banners&lt;/strong&gt;, and &lt;strong&gt;icon hashes&lt;/strong&gt;. Leveraging this information, security teams can construct an accurate exposure and configuration profile of their infrastructure, assess associated risks, and implement appropriate defensive measures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommended Practices:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Regular Exposure Surface Monitoring:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Periodically use ZoomEye or similar reconnaissance tools to review the current state of publicly exposed services and detect newly surfaced assets.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Vulnerability Identification &amp;amp; Hardening:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Use version information, configuration metadata, and publicly available intelligence to quickly identify known vulnerabilities and apply timely security hardening measures.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Using ZoomEye to Discover “Convenient Tools”: OSINT-Driven Reconnaissance for Security Researchers</title>
      <dc:creator>rrrowan</dc:creator>
      <pubDate>Wed, 26 Nov 2025 07:00:39 +0000</pubDate>
      <link>https://dev.to/rrrowan/using-zoomeye-to-discover-convenient-tools-osint-driven-reconnaissance-for-security-researchers-2b7i</link>
      <guid>https://dev.to/rrrowan/using-zoomeye-to-discover-convenient-tools-osint-driven-reconnaissance-for-security-researchers-2b7i</guid>
      <description>&lt;h2&gt;
  
  
  1. Introduction: Intelligence Search Engines Are More Than Just “Asset Viewers”
&lt;/h2&gt;

&lt;p&gt;Most people use ZoomEye primarily as an asset-scanning platform — entering an IP, domain, or port to check which services a host exposes to the Internet.&lt;/p&gt;

&lt;p&gt;However, from a security research and offensive–defensive operations perspective, ZoomEye functions more like a search engine for cyberspace. It can help you locate online systems, components, frameworks — and even forgotten open-source tools, testing interfaces, and administrative panels that remain publicly accessible.&lt;/p&gt;

&lt;p&gt;In other words, you can use it not only to find targets, but also to find tools exposed on the Internet.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9m2cztaqc638t4tf8ri.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr9m2cztaqc638t4tf8ri.png" alt=" " width="800" height="395"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Logic of Tool Discovery: From Protocol Fingerprints to Product Identification
&lt;/h2&gt;

&lt;p&gt;ZoomEye’s query syntax is highly flexible. It supports filtering based on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;banner / title / header fields&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Metadata such as port, country, service&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SSL/TLS certificates, iconhash (favicon hash), and HTTP fingerprints&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When the objective is to identify tool-type assets exposed online, the following methodology applies:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2sdppzpffhwtists3s0d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2sdppzpffhwtists3s0d.png" alt=" " width="780" height="297"&gt;&lt;/a&gt;&lt;br&gt;
These queries allow you to quickly identify tools that are publicly reachable but intended to be internal-only, revealing misconfigurations or accidental exposure in an organization’s attack surface.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fghf0n8fzatw9i0pbk9z0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fghf0n8fzatw9i0pbk9z0.png" alt=" " width="800" height="677"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcqcctsz9eym20hl5z5r0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcqcctsz9eym20hl5z5r0.png" alt=" " width="800" height="646"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  3. From “Finding Tools” to “Building a Knowledge Graph”
&lt;/h2&gt;

&lt;p&gt;Once you collect these results in bulk (e.g., via the ZoomEye API), you can process the data in a structured manner, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Extracting domains/IPs&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Grouping by SSL certificate fingerprints&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Aggregating by country/ASN&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Analyzing component versions and exposure timelines&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This enables the construction of a &lt;strong&gt;“security tool ecosystem graph”&lt;/strong&gt;, answering questions like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Which countries or industries expose Kibana most frequently?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Which versions of SonarQube are most prone to public exposure?&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Which organizations are using the same SSL certificate in their testing environments?&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This intelligence not only aids in attack surface research but also reflects the maturity distribution of security practices across organizations.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Example: Identifying Globally Exposed Vulnerability Scanning Systems
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(title="OpenVAS" || title="Nessus") &amp;amp;&amp;amp; country="CN" 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Running this query in ZoomEye reveals a large number of exposed security scanning consoles, some of which lack authentication entirely.&lt;br&gt;
Further filtering by port (e.g., port=9392 or port=8834) or combining with HTTP response indicators such as "HTTP/1.1 200 OK" can help isolate systems that are truly online and reachable.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc10uyce1fd127dnts33y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc10uyce1fd127dnts33y.png" alt=" " width="800" height="356"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fut3508fii5jwvn6alw1g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fut3508fii5jwvn6alw1g.png" alt=" " width="800" height="424"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Security Guidance and Compliance Boundaries
&lt;/h2&gt;

&lt;p&gt;The purpose of these searches is intelligence analysis and defensive strategy, &lt;strong&gt;not intrusion or exploitation&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;You &lt;strong&gt;can&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify exposed assets within your own organization&lt;/li&gt;
&lt;li&gt;Study global deployment trends of security tools&lt;/li&gt;
&lt;li&gt;Build SOC training datasets for offense–defense exercises&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You &lt;strong&gt;must not&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scan or validate vulnerabilities on unauthorized assets&lt;/li&gt;
&lt;li&gt;Share raw, non-sanitized results on public platforms&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  6. Conclusion
&lt;/h2&gt;

&lt;p&gt;ZoomEye is not just a magnifying glass for security researchers, but also a window into the cyber ecosystem.&lt;br&gt;
Learning to use it to “discover tools” reveals a more authentic, chaotic, and intriguing Internet —&lt;br&gt;
 a world full of misconfigurations, debugging interfaces, and forgotten assets.&lt;br&gt;
“The boundary of information security is not the firewall; it is perception.”&lt;/p&gt;

&lt;p&gt;I’ve heard that ZoomEye will also launch a Black Friday promotion. If you need it, now’s a good time to grab a subscription.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flm8ulogfd9m1hlpbuoug.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flm8ulogfd9m1hlpbuoug.webp" alt=" " width="600" height="516"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>A Few Simple Introductions to ZoomEye Pages</title>
      <dc:creator>rrrowan</dc:creator>
      <pubDate>Fri, 26 Sep 2025 08:51:59 +0000</pubDate>
      <link>https://dev.to/rrrowan/a-few-simple-introductions-to-zoomeye-pages-5174</link>
      <guid>https://dev.to/rrrowan/a-few-simple-introductions-to-zoomeye-pages-5174</guid>
      <description>&lt;h1&gt;
  
  
  ZoomEye Search Description Feature
&lt;/h1&gt;

&lt;p&gt;On ZoomEye's search page, the &lt;strong&gt;Search Description&lt;/strong&gt; window provides users with a quick reference to search syntax and logic. This feature serves as a practical guide for both beginners and advanced users, helping them perform queries more efficiently.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Highlights
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Search Scope
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Supports searching for IPv4, IPv6 devices, and websites (domain names).&lt;/li&gt;
&lt;li&gt; Keywords are matched in &lt;strong&gt;"global mode,"&lt;/strong&gt; covering multiple protocols such as HTTP/HTTPS, SSH, FTP, as well as titles, SSL, and protocol headers.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Syntax Matching Rules
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Searches are &lt;strong&gt;case-insensitive&lt;/strong&gt; and matched after segmentation.&lt;/li&gt;
&lt;li&gt; Use &lt;code&gt;==&lt;/code&gt; for strict and precise matching.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Special Characters &amp;amp; Syntax Tips
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Quotation marks are recommended for search strings (e.g., &lt;code&gt;"Cisco System"&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt; Escape characters are supported: &lt;code&gt;\&lt;/code&gt; can be used to escape quotes, brackets, and other symbols.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Search Logic Table
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Lists common logical operators such as &lt;code&gt;=&lt;/code&gt; and &lt;code&gt;==&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt; Each operator includes a description and an example for quick understanding.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Benefits
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Beginner-Friendly:&lt;/strong&gt; Helps new users quickly grasp search syntax.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Advanced Reference:&lt;/strong&gt; Provides detailed syntax rules for researchers needing high-precision searches.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;On-Page Help:&lt;/strong&gt; Always accessible without leaving the search page.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F573q1do74cl2ffus9qcd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F573q1do74cl2ffus9qcd.png" alt=" " width="800" height="481"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7iteb2fr49ikbb8af9wd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7iteb2fr49ikbb8af9wd.png" alt=" " width="546" height="465"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ZoomEye Site Message Feature
&lt;/h1&gt;

&lt;p&gt;The Site Message feature in ZoomEye is designed to keep users updated with the platform's latest news. It mainly pushes notifications about feature updates, promotional events, and security insights, ensuring users don't miss any important information.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Features
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Feature Update Notifications
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Whenever ZoomEye releases a new feature or enhances existing ones, users are notified through Site Messages to stay up to date.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Promotions &amp;amp; Event Announcements
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Includes limited-time discounts, new plan launches, points activities, and more—directly delivered to the inbox.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Security Intelligence Alerts
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Periodic updates on industry reports or risk summaries, such as vulnerabilities in specific sectors, helping users improve awareness and defenses.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Guides &amp;amp; Announcements
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;a.&lt;/strong&gt; Provides quick-start guides for new tools and official announcements, making it easier for users to learn and adopt features.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Benefits
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Instant Updates:&lt;/strong&gt; Receive all important platform news directly within ZoomEye.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Never Miss Deals:&lt;/strong&gt; Get timely alerts about discounts and promotional campaigns.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enhanced Security Awareness:&lt;/strong&gt; Access industry insights and risk notices to stay protected.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fub42b6n9i0uc9krmjism.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fub42b6n9i0uc9krmjism.png" alt=" " width="312" height="237"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9s5lis12x7aikkm3zc6c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9s5lis12x7aikkm3zc6c.png" alt=" " width="800" height="608"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  ZoomEye Profile Page
&lt;/h1&gt;

&lt;p&gt;On the Profile page of ZoomEye, users can manage their account information and access their unique Invitation Code and API Key. These features not only enhance account usability but also provide extra benefits and convenience.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Invitation Code
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Exclusive Referral:&lt;/strong&gt; Every user has a unique invitation code.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Referral Rewards:&lt;/strong&gt; Friends using your code to purchase a membership will receive a 5% discount, and you will earn 10,000 ZoomEye Points per purchase.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;One-Click Copy:&lt;/strong&gt; The code can be copied with a single click, making it easy to share.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Value:&lt;/strong&gt; The invitation system creates a win-win — your friends save money while you earn points.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. API Key
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Unique Key:&lt;/strong&gt; Each account is assigned a personal API Key for accessing ZoomEye’s API.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;API Usage:&lt;/strong&gt; Without logging in, you can send requests with your API Key to automate searches and data collection.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Point Deduction:&lt;/strong&gt; API calls consume points, and the usage will be reflected in your account balance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security Management:&lt;/strong&gt; Users are advised to regularly replace their API Key to maintain account security.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Value:&lt;/strong&gt; The API Key enables users to integrate ZoomEye into their own tools, scripts, or platforms, making large-scale and automated asset searches possible.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faly0xj1m6vqew0ty5vvr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faly0xj1m6vqew0ty5vvr.png" alt=" " width="320" height="216"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm18h3ar7mn0u5vnwdwt4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm18h3ar7mn0u5vnwdwt4.png" alt=" " width="800" height="513"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>ZoomEye vs. Other Search Engines: Why It’s the Top Choice for Security Researchers</title>
      <dc:creator>rrrowan</dc:creator>
      <pubDate>Thu, 18 Sep 2025 08:09:11 +0000</pubDate>
      <link>https://dev.to/rrrowan/zoomeye-vs-other-search-engines-why-its-the-top-choice-for-security-researchers-33g2</link>
      <guid>https://dev.to/rrrowan/zoomeye-vs-other-search-engines-why-its-the-top-choice-for-security-researchers-33g2</guid>
      <description>&lt;p&gt;In today’s cybersecurity research and threat intelligence field, cyberspace mapping search engines play a crucial role. Whether for enterprise security teams, threat analysts, or independent researchers, these tools are indispensable. Common platforms include &lt;strong&gt;ZoomEye, Shodan, FOFA, and Censys&lt;/strong&gt;. While they share some similarities, their differences in functionality, data coverage, and usability are significant.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Data Coverage &amp;amp; Real-Time Updates
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ZoomEye&lt;/strong&gt;: As one of the earliest cyberspace mapping engines, ZoomEye continuously conducts global active scans and passive monitoring, covering devices, services, and web applications. Its real-time updates ensure fast reflection of changes in the global internet landscape.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shodan&lt;/strong&gt;: Strong in industrial control systems (ICS/SCADA) data, but its update frequency in certain regions is less consistent than ZoomEye.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FOFA&lt;/strong&gt;: Offers diverse fingerprint search syntax, but since it partially relies on passive data collection, its breadth of coverage is slightly weaker.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Censys&lt;/strong&gt;: Well-regarded for academic and enterprise research, with strong SSL/TLS certificate scanning capabilities, but its overall coverage is not as broad as ZoomEye.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Search Syntax &amp;amp; Flexibility
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ZoomEye&lt;/strong&gt;: Supports &lt;strong&gt;advanced query syntax&lt;/strong&gt;, such as filtering by protocol (&lt;code&gt;app&lt;/code&gt;), port (&lt;code&gt;port&lt;/code&gt;), service (&lt;code&gt;service&lt;/code&gt;), and vulnerabilities (&lt;code&gt;vul.cve&lt;/code&gt;). This enables highly precise asset discovery and risk identification.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shodan&lt;/strong&gt;: Simple syntax, good for beginners, but limited flexibility in complex scenarios.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FOFA&lt;/strong&gt;: Syntax is more complex, with a steeper learning curve, though it’s still useful for in-depth research.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Censys&lt;/strong&gt;: Uses a structured query language that is very precise but less beginner-friendly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Features &amp;amp; Value-Added Services
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ZoomEye&lt;/strong&gt; provides visualization reports, global threat maps, and specialized datasets for attack surface management and threat monitoring. These features align well with enterprise security teams’ daily needs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shodan&lt;/strong&gt; offers APIs for integration but fewer advanced features.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FOFA&lt;/strong&gt; focuses on information presentation but is weaker in multi-source integration.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Censys&lt;/strong&gt; is widely used in academia, with reliable APIs, but its visualization and commercial security features are less extensive than ZoomEye.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Overall Evaluation
&lt;/h3&gt;

&lt;p&gt;In summary:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;For &lt;strong&gt;broad data coverage, real-time accuracy, flexible syntax, and multi-scenario use&lt;/strong&gt;, &lt;strong&gt;ZoomEye clearly stands out&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Shodan is suitable for ICS/SCADA-focused research.&lt;/li&gt;
&lt;li&gt;FOFA is more friendly for Chinese users but lacks ZoomEye’s international reach and feature set.&lt;/li&gt;
&lt;li&gt;Censys is strong in certificate-related analysis but not as comprehensive overall.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Conclusion
&lt;/h3&gt;

&lt;p&gt;With global cyber threats escalating, researchers must rely on trustworthy search engines for asset discovery, vulnerability monitoring, and threat intelligence gathering. Among all available options, &lt;strong&gt;ZoomEye, with its comprehensive coverage, powerful syntax, and visualization features, is the top choice for security professionals and researchers worldwide&lt;/strong&gt;.&lt;/p&gt;

</description>
      <category>cyberspace</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>The Most Popular Cybersecurity Search Engine ZoomEye and Similar Platforms, and How to Perform Subdomain Collection</title>
      <dc:creator>rrrowan</dc:creator>
      <pubDate>Wed, 17 Sep 2025 07:27:04 +0000</pubDate>
      <link>https://dev.to/rrrowan/a-brief-introduction-to-zoomeye-and-similar-search-engines-and-how-to-perform-subdomain-collection-15ml</link>
      <guid>https://dev.to/rrrowan/a-brief-introduction-to-zoomeye-and-similar-search-engines-and-how-to-perform-subdomain-collection-15ml</guid>
      <description>&lt;h2&gt;
  
  
  I. ZoomEye
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Introduction
&lt;/h3&gt;

&lt;p&gt;ZoomEye is a cyberspace search engine specializing in the discovery and analysis of devices and services connected to the internet. Its primary objective is to provide insights into online devices, security vulnerabilities, and network infrastructure, assisting users in penetration testing, cybersecurity analysis, and asset management.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Official Website
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ZoomEye Official Website&lt;/strong&gt;: &lt;a href="https://www.zoomeye.ai/" rel="noopener noreferrer"&gt;https://www.zoomeye.ai/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Key Features
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Device Search&lt;/strong&gt;: Users can search for specific devices using criteria such as IP address, service type, and response content.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Detection&lt;/strong&gt;: ZoomEye surfaces known security vulnerabilities, aiding users in identifying potential security risks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Real-time Data Updates&lt;/strong&gt;: The platform regularly scans the internet and updates its database to ensure data timeliness and accuracy.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  II. Similar Search Engines
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Shodan
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: The first and most well-known cyberspace search engine, focusing on discovering internet-connected devices (IoT, servers, industrial control systems, etc.).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;: 

&lt;ul&gt;
&lt;li&gt;Supports filtering by IP, port, service, operating system, and geographic location&lt;/li&gt;
&lt;li&gt;Provides API access and real-time data monitoring&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.shodan.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.shodan.io/" rel="noopener noreferrer"&gt;https://www.shodan.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Censys
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A platform specializing in internet asset discovery and security assessment, offering detailed protocol and certificate data analysis.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Tracks TLS/SSL certificates&lt;/li&gt;
&lt;li&gt;Identifies exposed services&lt;/li&gt;
&lt;li&gt;Supports large-scale network reconnaissance&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://censys.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://censys.io/" rel="noopener noreferrer"&gt;https://censys.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. BinaryEdge
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A global cybersecurity search engine that focuses on threat intelligence and attack surface monitoring.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Provides data on exposed services, vulnerabilities, and sensitive data leaks&lt;/li&gt;
&lt;li&gt;Powerful API integration&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.binaryedge.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.binaryedge.io/" rel="noopener noreferrer"&gt;https://www.binaryedge.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Netlas
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A search engine for internet-connected devices and services, offering extensive filtering and data export capabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Supports real-time scanning&lt;/li&gt;
&lt;li&gt;Historical data querying&lt;/li&gt;
&lt;li&gt;Customized alert notifications&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.netlas.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.netlas.io/" rel="noopener noreferrer"&gt;https://www.netlas.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Greynoise
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A specialized platform focused on analyzing internet background noise and filtering out benign scanning activity.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Helps security teams distinguish between targeted threats and mass scanning events&lt;/li&gt;
&lt;li&gt;Reduces alert fatigue&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.greynoise.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.greynoise.io/" rel="noopener noreferrer"&gt;https://www.greynoise.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  III. Subdomain Enumeration
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Introduction
&lt;/h3&gt;

&lt;p&gt;Subdomain enumeration is a critical component of cybersecurity reconnaissance and intelligence gathering, particularly in penetration testing and vulnerability assessment workflows.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Methods for Subdomain Enumeration
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Search Engine Syntax Queries&lt;/strong&gt;:&lt;br&gt;
Utilize cyberspace search engines (e.g., ZoomEye) with advanced syntax (e.g., &lt;code&gt;site:example.com&lt;/code&gt;) to filter and extract subdomain data from search results.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Subdomain Query Websites&lt;/strong&gt;:&lt;br&gt;
Employ WHOIS lookup tools to retrieve domain registration details, which may reveal associated subdomains through DNS records or administrative metadata.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cyberspacemapping</category>
      <category>cybersecuritysearchengines</category>
      <category>subdomainenumeration</category>
    </item>
    <item>
      <title>A brief introduction to ZoomEye and similar search engines, and how to perform subdomain collection.</title>
      <dc:creator>rrrowan</dc:creator>
      <pubDate>Wed, 17 Sep 2025 07:06:32 +0000</pubDate>
      <link>https://dev.to/rrrowan/a-brief-introduction-to-zoomeye-and-similar-search-engines-and-how-to-perform-subdomain-4ci4</link>
      <guid>https://dev.to/rrrowan/a-brief-introduction-to-zoomeye-and-similar-search-engines-and-how-to-perform-subdomain-4ci4</guid>
      <description>&lt;h2&gt;
  
  
  I. ZoomEye
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Introduction
&lt;/h3&gt;

&lt;p&gt;ZoomEye is a cyberspace search engine specializing in the discovery and analysis of devices and services connected to the internet. Its primary objective is to provide insights into online devices, security vulnerabilities, and network infrastructure, assisting users in penetration testing, cybersecurity analysis, and asset management.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Official Website
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ZoomEye Official Website&lt;/strong&gt;: &lt;a href="https://www.zoomeye.ai/" rel="noopener noreferrer"&gt;https://www.zoomeye.ai/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. Key Features
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Device Search&lt;/strong&gt;: Users can search for specific devices using criteria such as IP address, service type, and response content.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Detection&lt;/strong&gt;: ZoomEye surfaces known security vulnerabilities, aiding users in identifying potential security risks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Real-time Data Updates&lt;/strong&gt;: The platform regularly scans the internet and updates its database to ensure data timeliness and accuracy.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  II. Similar Search Engines
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Shodan
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: The first and most well-known cyberspace search engine, focusing on discovering internet-connected devices (IoT, servers, industrial control systems, etc.).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;: 

&lt;ul&gt;
&lt;li&gt;Supports filtering by IP, port, service, operating system, and geographic location&lt;/li&gt;
&lt;li&gt;Provides API access and real-time data monitoring&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.shodan.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.shodan.io/" rel="noopener noreferrer"&gt;https://www.shodan.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. Censys
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A platform specializing in internet asset discovery and security assessment, offering detailed protocol and certificate data analysis.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Tracks TLS/SSL certificates&lt;/li&gt;
&lt;li&gt;Identifies exposed services&lt;/li&gt;
&lt;li&gt;Supports large-scale network reconnaissance&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://censys.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://censys.io/" rel="noopener noreferrer"&gt;https://censys.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. BinaryEdge
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A global cybersecurity search engine that focuses on threat intelligence and attack surface monitoring.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Provides data on exposed services, vulnerabilities, and sensitive data leaks&lt;/li&gt;
&lt;li&gt;Powerful API integration&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.binaryedge.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.binaryedge.io/" rel="noopener noreferrer"&gt;https://www.binaryedge.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. Netlas
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A search engine for internet-connected devices and services, offering extensive filtering and data export capabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Supports real-time scanning&lt;/li&gt;
&lt;li&gt;Historical data querying&lt;/li&gt;
&lt;li&gt;Customized alert notifications&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.netlas.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.netlas.io/" rel="noopener noreferrer"&gt;https://www.netlas.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. Greynoise
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description&lt;/strong&gt;: A specialized platform focused on analyzing internet background noise and filtering out benign scanning activity.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Features&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Helps security teams distinguish between targeted threats and mass scanning events&lt;/li&gt;
&lt;li&gt;Reduces alert fatigue&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.greynoise.io/" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;a href="https://www.greynoise.io/" rel="noopener noreferrer"&gt;https://www.greynoise.io/&lt;/a&gt;
&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  III. Subdomain Enumeration
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Introduction
&lt;/h3&gt;

&lt;p&gt;Subdomain enumeration is a critical component of cybersecurity reconnaissance and intelligence gathering, particularly in penetration testing and vulnerability assessment workflows.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Methods for Subdomain Enumeration
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Search Engine Syntax Queries&lt;/strong&gt;:&lt;br&gt;
Utilize cyberspace search engines (e.g., ZoomEye) with advanced syntax (e.g., &lt;code&gt;site:example.com&lt;/code&gt;) to filter and extract subdomain data from search results.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Subdomain Query Websites&lt;/strong&gt;:&lt;br&gt;
Employ WHOIS lookup tools to retrieve domain registration details, which may reveal associated subdomains through DNS records or administrative metadata.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cyberspacemapping</category>
      <category>cybersecuritysearchengines</category>
      <category>subdomain</category>
    </item>
  </channel>
</rss>
