<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: StarkMan</title>
    <description>The latest articles on DEV Community by StarkMan (@stark_zhuang_df5076f35c68).</description>
    <link>https://dev.to/stark_zhuang_df5076f35c68</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3505647%2Fa170812c-4424-4701-a003-3135d19ab975.jpg</url>
      <title>DEV Community: StarkMan</title>
      <link>https://dev.to/stark_zhuang_df5076f35c68</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/stark_zhuang_df5076f35c68"/>
    <language>en</language>
    <item>
      <title>Use ZoomEye to find Jupyter servers without identity verification enabled</title>
      <dc:creator>StarkMan</dc:creator>
      <pubDate>Fri, 26 Sep 2025 06:42:00 +0000</pubDate>
      <link>https://dev.to/stark_zhuang_df5076f35c68/use-zoomeye-to-find-jupyter-servers-without-identity-verification-enabled-5ehb</link>
      <guid>https://dev.to/stark_zhuang_df5076f35c68/use-zoomeye-to-find-jupyter-servers-without-identity-verification-enabled-5ehb</guid>
      <description>&lt;h2&gt;
  
  
  1. Abstract
&lt;/h2&gt;

&lt;p&gt;In the process of using Jupyter Notebook and JupyterLab, some users lack security awareness and do not enable the authentication function, so that any user can directly access their own Jupyter server and view the code and documents on their server.&lt;/p&gt;

&lt;p&gt;We use the ZoomEye cyberspace search engine to find those Jupyter servers on the Internet that do not enable authentication through specific search keywords. The leaked code and documents on these servers, if exploited by criminals, may cause data leakage and asset loss.&lt;/p&gt;

&lt;p&gt;We recommend that all Jupyter users follow the official security recommendations when starting the Jupyter service, and set it to log in through token or password.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Overview
&lt;/h2&gt;

&lt;p&gt;ZoomEye [1] is a cyberspace search engine. Through the global deployment of detection nodes, it conducts uninterrupted in-depth detection of global Internet exposed assets, builds Internet security basic situation mapping maps, and provides comprehensive asset basic data for security research.&lt;/p&gt;

&lt;p&gt;Jupyter Notebook [2] is a program that opens in the form of a web page. You can directly write and run code on the web page, and the running result of the code will also be displayed directly under the code block. If you need to write an instruction document during the programming process, you can write it directly on the same page, which is convenient for explanation [3]. It is one of the most familiar and commonly used tool for data scientists.&lt;/p&gt;

&lt;p&gt;JupyterLab [4] is an interactive development environment, which is the next generation of Jupyter Notebook. You can use it to write Notebook, operate terminal, edit MarkDown text, open interactive mode, view csv files and pictures, etc. It can be said that JupyterLab is a more mainstream development environment for developers in the next stage [5].&lt;/p&gt;

&lt;p&gt;In this article, we describe how to use ZoomEye to find Jupyter servers without identity verification enabled, and access their code and documentation through a web browser.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Installation and startup of Jupyter
&lt;/h2&gt;

&lt;h3&gt;
  
  
  3.1 Jupyter Notebook
&lt;/h3&gt;

&lt;p&gt;In this chapter, we introduce how to install, startup normally, startup Jupyter Notebook without authentication, and the effect of the corresponding web browsing access.&lt;/p&gt;

&lt;p&gt;For the installation method of Jupyter Notebook, refer to its official website [6]. You only need to enter a sentence command on the command line, which is simple and convenient.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;pip install notebook
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The normal way to startup Jupyter Notebook is to enter a one-sentence command. By default, a web service is opened on port 8888 of localhost, and a token value for user authentication is generated.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;jupyter notebook
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;At this point, when you enter &lt;code&gt;http://localhost:8888&lt;/code&gt; in your web browser to access Jupyter Notebook, the page will prompt you to enter a password or token.&lt;/p&gt;

&lt;p&gt;We enter the token value obtained when the command line is started on the page to pass the authentication and use the product functions of Jupyter Notebook.&lt;/p&gt;

&lt;p&gt;Some users need to access their Jupyter Notebook service through the Internet, and in order to avoid the trouble of entering a password or token, they will use the following command to expose the Jupyter Notebook service to the Internet IP without enabling authentication.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;jupyter notebook --ip="*" --NotebookApp.token="" --NotebookApp.password=""
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;At this time, any user who knows the Internet IP of the Jupyter Notebook service can enter &lt;code&gt;http://*.*.*.*:8888&lt;/code&gt; in the web browser to access the Jupyter Notebook service without authentication. Review the code and files on the server. Note that in this case, the title of the page reads: "Home Page - Select or create a notebook".&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffay77jti3p28rz8eubpc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffay77jti3p28rz8eubpc.png" alt=" " width="684" height="556"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3.2 JupyterLab
&lt;/h3&gt;

&lt;p&gt;In this chapter, we introduce how to install, startup JupyterLab normally, startup JupyterLab without authentication, and the effect of the corresponding web browsing access.&lt;/p&gt;

&lt;p&gt;For the installation method of JupyterLab, refer to its official website [7]. You only need to enter a sentence command on the command line, which is simple and convenient.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;pip install jupyterlab
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The normal way to startup JupyterLab is to enter a command. By default, a web service is opened on port 8888 of localhost, and a token value for user authentication is generated.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;jupyter-lab
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;At this point, when you enter &lt;code&gt;http://localhost:8888&lt;/code&gt; in the web browser to access Jupyter Lab, the page will prompt you to enter a password or token.&lt;/p&gt;

&lt;p&gt;We enter the token value obtained when the command line is started on the page to pass the authentication and use the product functions of JupyterLab.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkmnzo0t1wq09bel9vym7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkmnzo0t1wq09bel9vym7.png" alt=" " width="606" height="477"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Some users need to access their JupyterLab service through the Internet, and in order to avoid the trouble of entering a password or token, they will expose the JupyterLab service to the Internet IP through the following command, and do not enable authentication.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;jupyter-lab --ip="*" --NotebookApp.token="" --NotebookApp.password=""
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;At this time, any user who knows the Internet IP of the JupyterLab service can enter &lt;code&gt;http://...:8888&lt;/code&gt; in the web browser to access the JupyterLab service without authentication, and can directly view the server code and documentation on. &lt;strong&gt;Note that the content of the page title in this case is: “JupyterLab”.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmo8zkyvw75wzs81vfrha.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmo8zkyvw75wzs81vfrha.png" alt=" " width="637" height="484"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Find Jupyter servers without identity verification enabled
&lt;/h2&gt;

&lt;p&gt;As mentioned in the previous section, the title content of the Jupyter Notebook service without authentication is “Home Page — Select or create a notebook”, and the title content of the JupyterLab service without authentication is “JupyterLab”.&lt;/p&gt;

&lt;p&gt;We used the following keywords to search on ZoomEye, and found the Jupyter Notebook server IP address and port that can be directly viewed and used without authentication, with a total of 1362 results.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;title="Home Page - Select or create a notebook"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2svu4wiikey0vrnd88yz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2svu4wiikey0vrnd88yz.png" alt=" " width="800" height="572"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We used the following keywords to search on ZoomEye, and found the JupyterLab server IP address and port that can be directly viewed and used without authentication, with a total of 2071 results.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;title="JupyterLab"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qkxs0fyjj08dbsczxby.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qkxs0fyjj08dbsczxby.png" alt=" " width="800" height="477"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Hazards of Jupyter Serving without identity verification enabled
&lt;/h2&gt;

&lt;p&gt;When the user builds the Jupyter service, the identity verification is not enabled. Although it is convenient for daily use and does not need to enter a password; If sensitive information such as name/password, API key/secret is used by criminals, it may cause data leakage and asset loss.&lt;/p&gt;

&lt;p&gt;Example 1:&lt;/p&gt;

&lt;p&gt;As shown in the figure below, the code in the Jupyter server leaked: the key and secret of the user API of the bitFlyer cryptocurrency exchange, the username and password of the Gmail mailbox.&lt;/p&gt;

&lt;p&gt;Criminals can use the key and secret of the bitFlyer cryptocurrency exchange API to create transactions and cancel transactions on the exchange, which may cause asset losses; use the username and password of Gmail mailboxes to log in to Gmail mailboxes, which may cause privacy Data leakage.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0bsufxuzuyqjnr5500a4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0bsufxuzuyqjnr5500a4.png" alt=" " width="720" height="390"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;ol&gt;
&lt;li&gt;Leaked key and secret of bitFlyer cryptocurrency exchange API&lt;/li&gt;
&lt;li&gt;Leaked Gmail username and password &lt;/li&gt;
&lt;/ol&gt;
&lt;/blockquote&gt;

&lt;p&gt;Example 2:&lt;/p&gt;

&lt;p&gt;As shown in the figure below, the code in the Jupyter server leaked: the ACCESS KEY ID and SECRET ACCESS KEY of the Amazon AWS account.&lt;/p&gt;

&lt;p&gt;Criminals can use the ACCESS KEY ID and SECRET ACCESS KEY of the Amazon AWS account to obtain the account permissions of Amazon AWS, upload files to Amazon S3 cloud storage space, and even create new cloud servers on Amazon AWS.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ov5spmg5rd1ywazctuk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ov5spmg5rd1ywazctuk.png" alt=" " width="716" height="655"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;ol&gt;
&lt;li&gt;Leaked ACCESS KEY ID of Amazon AWS account&lt;/li&gt;
&lt;li&gt;Leaked SECRET ACCESS KEY of Amazon AWS account&lt;/li&gt;
&lt;/ol&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  6. Conclusion
&lt;/h2&gt;

&lt;p&gt;When using Jupyter, try not to expose its web services on the Internet, but open them for use in the local area network to avoid being accessed by unrelated people.&lt;/p&gt;

&lt;p&gt;If there is a need to expose Jupyter’s web services to the Internet, you must set up a token or password login instead of disabling authentication for convenience. For specific operations, please refer to Jupyter’s official security advice blog: Please don’t disable authentication in Jupyter servers [8].&lt;/p&gt;

&lt;h2&gt;
  
  
  7. Reference
&lt;/h2&gt;

&lt;p&gt;[1] ZoomEye cyberspace search engine&lt;br&gt;
&lt;a href="https://www.zoomeye.ai" rel="noopener noreferrer"&gt;https://www.zoomeye.ai&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[2] Jupyter Notebook&lt;br&gt;
&lt;a href="https://jupyter.org" rel="noopener noreferrer"&gt;https://jupyter.org&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[3] Jupyter Notebook introduction, installation and usage tutorial&lt;br&gt;
&lt;a href="https://zhuanlan.zhihu.com/p/33105153" rel="noopener noreferrer"&gt;https://zhuanlan.zhihu.com/p/33105153&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[4] JupyterLab&lt;br&gt;
&lt;a href="https://jupyter.org" rel="noopener noreferrer"&gt;https://jupyter.org&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[5] Introduction to JupyterLab and common operations&lt;br&gt;
&lt;a href="https://support.huaweicloud.com/engineers-modelarts/modelarts_23_0209.html" rel="noopener noreferrer"&gt;https://support.huaweicloud.com/engineers-modelarts/modelarts_23_0209.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[6] Installation method of Jupyter Notebook&lt;br&gt;
&lt;a href="https://jupyter.org/install" rel="noopener noreferrer"&gt;https://jupyter.org/install&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[7] Istallation method of JupyterLab&lt;br&gt;
&lt;a href="https://jupyter.org/install" rel="noopener noreferrer"&gt;https://jupyter.org/install&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[8] Please dont disable authentication in Jupyter servers&lt;br&gt;
&lt;a href="https://blog.jupyter.org/please-dont-disable-authentication-in-jupyter-servers-dd197206e7f6" rel="noopener noreferrer"&gt;https://blog.jupyter.org/please-dont-disable-authentication-in-jupyter-servers-dd197206e7f6&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
    <item>
      <title>Best Practices for Enhancing Attack Surface Management and Accelerating Vulnerability Response</title>
      <dc:creator>StarkMan</dc:creator>
      <pubDate>Tue, 23 Sep 2025 06:39:53 +0000</pubDate>
      <link>https://dev.to/stark_zhuang_df5076f35c68/best-practices-for-enhancing-attack-surface-management-and-accelerating-vulnerability-response-4h3i</link>
      <guid>https://dev.to/stark_zhuang_df5076f35c68/best-practices-for-enhancing-attack-surface-management-and-accelerating-vulnerability-response-4h3i</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7hzayhyweudly6pza31e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7hzayhyweudly6pza31e.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Attack Surface Management (ASM) has become a cornerstone of modern cybersecurity. As enterprises expand across on-premise systems, cloud services, and third-party platforms, their external attack surface grows continuously. The mission of ASM is to maintain visibility into exposed assets, reduce blind spots, and respond swiftly to newly discovered risks. Rapid vulnerability response is tightly aligned with ASM: knowing exactly which internet-facing systems are vulnerable allows teams to prioritize remediation and protect business operations.&lt;/p&gt;

&lt;p&gt;This article introduces several best practices for ASM and rapid vulnerability response, using Shodan and ZoomEye as practical examples. These two platforms highlight how cybersecurity search engines can be applied effectively in real-world scenarios.&lt;/p&gt;

&lt;p&gt;Cybersecurity search engine platforms are among the most powerful tools for this task. They continuously discover and analyze exposed assets across the Internet, offering organizations data support from tactical monitoring to strategic risk management. For security service providers, these platforms are critical to delivering higher-value protection and actionable insights.&lt;/p&gt;

&lt;p&gt;Key Value These Platforms Deliver:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Strengthen Attack Surface Management: Detect and control exposed internet assets in real time, enabling proactive risk mitigation.&lt;/li&gt;
&lt;li&gt;Accelerate Vulnerability Response: Rapidly quantify affected assets during emerging vulnerabilities, ensuring critical issues are prioritized and remediated.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  ASM Scenarios
&lt;/h2&gt;

&lt;p&gt;Monitoring exposed remote access services Example: Track RDP endpoints tied to Microsoft organization.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shodan best practice: &lt;code&gt;port:3389 org:"microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;ZoomEye best practice: &lt;code&gt;port="3389" &amp;amp;&amp;amp; org="microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Monitoring exposed directory listings Example: Detect misconfigured servers where files and sensitive data may be browsed directly.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shodan best practice: &lt;code&gt;http.title:"Index of /" org:"microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;ZoomEye best practice: &lt;code&gt;title="Index of /" &amp;amp;&amp;amp; org="microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Rapid Vulnerability Response Scenarios
&lt;/h2&gt;

&lt;p&gt;Identifying assets exposed to CVE-2025-53770. Example: Discover Microsoft-related assets vulnerable to this CVE, enabling teams to quickly quantify risk, prioritize remediation, and contain potential exploitation.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shodan best practice: &lt;code&gt;"MicrosoftSharePointTeamServices" org:"microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;ZoomEye best practice: &lt;code&gt;vul.cve="CVE-2025-53770" &amp;amp;&amp;amp; org="microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Identifying assets exposed to CVE-2025-47812. Example: Locate Microsoft-related assets vulnerable to this CVE.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shodan best practice: &lt;code&gt;"Wing FTP Server" org:"microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;ZoomEye best practice: &lt;code&gt;vul.cve="CVE-2025-47812" &amp;amp;&amp;amp; org="microsoft"&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Cybersecurity search engine platforms are indispensable for organizations seeking to strengthen Attack Surface Management and accelerate vulnerability response. Shodan excels in quick discovery and broad monitoring, while ZoomEye delivers richer and more granular filters—covering certificates, CVEs, hashes, bug bounty tags, and time-based queries.&lt;/p&gt;

&lt;p&gt;By combining both platforms, security teams gain continuous visibility into their attack surface, respond faster to emerging vulnerabilities, and deliver greater value to stakeholders. This dual-platform approach reduces exposure, enhances resilience, and keeps defenses aligned with the ever-changing digital threat landscape.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
    <item>
      <title>Shodan vs ZoomEye Query Syntax Comparison</title>
      <dc:creator>StarkMan</dc:creator>
      <pubDate>Tue, 23 Sep 2025 06:17:30 +0000</pubDate>
      <link>https://dev.to/stark_zhuang_df5076f35c68/shodan-vs-zoomeye-query-syntax-comparison-17hh</link>
      <guid>https://dev.to/stark_zhuang_df5076f35c68/shodan-vs-zoomeye-query-syntax-comparison-17hh</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article provides a side-by-side comparison of the most common query operators in Shodan vs the latest syntax in ZoomEye.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwn3kkyg5e5z0cvt33kvc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwn3kkyg5e5z0cvt33kvc.png" alt=" " width="800" height="223"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When it comes to cyberspace search engines, Shodan and ZoomEye are two of the most widely used platforms.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shodan is often described as “the search engine for the Internet of Things,” indexing banners and metadata from connected devices worldwide.&lt;/li&gt;
&lt;li&gt;ZoomEye, is another powerful search engine for internet-wide scanning, particularly popular in the security research community.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Both platforms allow analysts, penetration testers, and defenders to search for exposed services, vulnerable hosts, and network fingerprints.&lt;br&gt;
&lt;strong&gt;However, their query syntax is different — and mixing them up can lead to zero results or misleading queries.&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  1. Comparison Table
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7fe9mhgx6yluqglxko8l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7fe9mhgx6yluqglxko8l.png" alt=" " width="720" height="664"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  2. Example Queries
&lt;/h2&gt;

&lt;p&gt;Find exposed RDP (3389) assets&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Shodan:     port:3389
ZoomEye:    port=3389
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find RDP servers in the US&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Shodan:     port:3389 country:US
ZoomEye:    port=3389 &amp;amp;&amp;amp; country="US"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Search for Log4Shell exposure&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Shodan:     (no direct CVE filter, need to search service/version)
ZoomEye:    vul.cve="CVE-2021–44228"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  3. Practical Use Cases
&lt;/h2&gt;

&lt;p&gt;Find Internet-exposed webcams&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Shodan:     title:"webcamXP" port:8080
ZoomEye:    title="webcamXP" &amp;amp;&amp;amp; port=8080`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Discover SSL certificates issued to a company&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Shodan:     (limited - search by org or hostname)
ZoomEye:    ssl.cert.issuer.cn="DigiCert Inc"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Locate vulnerable Apache servers&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Shodan:     product:Apache version:2.4.49
ZoomEye:    app="Apache httpd" &amp;amp;&amp;amp; version="2.4.49"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Find industrial control systems (ICS) devices&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Shodan:     port:502 modbus
ZoomEye:    port=502 &amp;amp;&amp;amp; service="modbus"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  4. Key Takeaways
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Shodan is simpler and effective for quick searches.&lt;/li&gt;
&lt;li&gt;ZoomEye provides richer filters (certificates, CVEs, hashes, bug bounty tags, time filters).&lt;/li&gt;
&lt;li&gt;Always use the correct syntax style: &lt;code&gt;filter:value&lt;/code&gt; for Shodan vs. &lt;code&gt;field=value&lt;/code&gt; for ZoomEye.&lt;/li&gt;
&lt;li&gt;Mastering both platforms gives analysts a stronger toolkit for reconnaissance, attack surface monitoring, and threat hunting.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  5. Further Reading
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Shodan official documentation: &lt;a href="https://help.shodan.io/the-basics/search-query-fundamentals" rel="noopener noreferrer"&gt;Search Query Fundamentals&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;ZoomEye latest syntax guide: &lt;a href="https://dev.to/stark_zhuang_df5076f35c68/a-complete-guide-to-the-latest-zoomeye-search-syntax-4loo"&gt;A Complete Guide to the Latest ZoomEye Search Syntax&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
    <item>
      <title>A Complete Guide to the Latest ZoomEye Search Syntax</title>
      <dc:creator>StarkMan</dc:creator>
      <pubDate>Tue, 23 Sep 2025 06:03:48 +0000</pubDate>
      <link>https://dev.to/stark_zhuang_df5076f35c68/a-complete-guide-to-the-latest-zoomeye-search-syntax-4loo</link>
      <guid>https://dev.to/stark_zhuang_df5076f35c68/a-complete-guide-to-the-latest-zoomeye-search-syntax-4loo</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhglqcwdj3nfi1auvwsq6.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhglqcwdj3nfi1auvwsq6.webp" alt=" " width="720" height="248"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;ZoomEye, a leading cyberspace search engine, has updated its query syntax to provide more precise and flexible search capabilities. This guide consolidates the latest syntax rules from the official documentation, offering cybersecurity professionals a ready reference for asset discovery, attack surface mapping, and threat hunting.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Description
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Search scope covers devices (IPv4, IPv6) and websites (domain names)&lt;/li&gt;
&lt;li&gt;When entering a search string, the system will match the keywords in “global” mode, covering content from various protocols such as HTTP, SSH, FTP, etc. (e.g., HTTP/HTTPS protocol headers, body, SSL, title, and other protocol banners)&lt;/li&gt;
&lt;li&gt;The search string is case-insensitive and will be matched after segmentation (the search results page provides a “segmentation” test function). Use == for precise matching and strict restriction of search syntax case sensitivity.&lt;/li&gt;
&lt;li&gt;Please use quotation marks for search strings.
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;e.g., "Cisco System" or 'Cisco System'

If there are quotation marks in the search string, use \ for escape, 
e.g., "a\"b"

If there are brackets in the search string, use \ for escape,
e.g., portinfo\(\)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  1. Search Logic Operations
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Searchlogic: =&lt;/code&gt;&lt;br&gt;
Description: Search for assets containing keywords&lt;br&gt;
Example: title=“knownsec”&lt;br&gt;
Search for websites with titles containing Knowsec’s assets&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Searchlogic: ==&lt;/code&gt;&lt;br&gt;
Description: Accurate search, indicating a complete match of keywords (case sensitive), can search for data with empty values&lt;br&gt;
Example: title==“knownsec”&lt;br&gt;
Precise search, which means exact match of keywords (case sensitive), and can search for data with empty values Search for assets with the website title “Knownsec”&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Searchlogic: ||&lt;/code&gt;&lt;br&gt;
Description: Enter “||” in the search box to indicate the logical operation of “or”&lt;br&gt;
Example: service=“ssh” || service=”http”&lt;br&gt;
Search for SSH or HTTP data&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Searchlogic: &amp;amp;&amp;amp;&lt;/code&gt;&lt;br&gt;
Description: Enter “&amp;amp;&amp;amp;” in the search box to indicate the logical operation of “and”&lt;br&gt;
Example: device=“router” &amp;amp;&amp;amp; after=“2020–01–01”&lt;br&gt;
Search for routers after Jan 1, 2020&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Searchlogic: !=&lt;/code&gt;&lt;br&gt;
Description: Enter “!=” in the search box to indicate the logical operation of “not”&lt;br&gt;
Example: country=“US” &amp;amp;&amp;amp; subdivisions!=“new york”&lt;br&gt;
Search for data in united states excluding new york&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Searchlogic: ()&lt;/code&gt;&lt;br&gt;
Description: Enter “()” in the search box to indicate the logical operation of “priority processing”&lt;br&gt;
Example: (country=“US” &amp;amp;&amp;amp; port!=80) || (country=“US” &amp;amp;&amp;amp; title!=“404 Not Found”)&lt;br&gt;
Search excluding port 80 in US or “404 not found” in the US&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Searchlogic: *&lt;/code&gt;&lt;br&gt;
Description: Fuzzy search, use * for search&lt;br&gt;
Example: title=“google*”&lt;br&gt;
Fuzzy search, use * to search Search for assets containing google in the website title, and the title can end with any character&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Geographical Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: country="CN"&lt;/code&gt;&lt;br&gt;
Description: Search for country assets&lt;br&gt;
Tips: Input country abbreviations or names, e.g. country=“china”&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: subdivisions="beijing"&lt;/code&gt;&lt;br&gt;
Description: Search for assets in the specified administrative region&lt;br&gt;
Tips: Input in English, e.g. subdivisions=“beijing”&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: city="changsha"&lt;/code&gt;&lt;br&gt;
Description: Search for city assets&lt;br&gt;
Tips: Input in English, e.g. city=“changsha”&lt;/p&gt;

&lt;h2&gt;
  
  
  3. Certificate Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: ssl="google"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with “google” string in ssl certificate&lt;br&gt;
Tips: Often used to search for corresponding targets by product name and company name&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&amp;gt; Filter: ssl.cert.fingerprint="F3C98F223D82CC41CF83D94671CCC6C69873FABF"&lt;/code&gt;&lt;br&gt;
Description: Search for certificate-related fingerprint assets&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: ssl.cert.issuer.cn="pbx.wildix.com"&lt;/code&gt;&lt;br&gt;
Description: Search for the common domain name of the user certificate issuer&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: ssl.cert.subject.cn="example.com"&lt;/code&gt;&lt;br&gt;
Description: Search for the common domain name of the user certificate holder&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: ssl.jarm="29d29d15d29d29d00029d29d29d29dea0f89a2e5fb09e4d8e099befed92cfa"&lt;/code&gt;&lt;br&gt;
Description: Search for assets related to Jarm Fingerprint content&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: ssl.ja3s=45094d08156d110d8ee97b204143db14&lt;/code&gt;&lt;br&gt;
Description: Find assets related to specific JA3S fingerprints&lt;/p&gt;

&lt;h2&gt;
  
  
  4. IP or Domain Name Related Information Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: ip="8.8.8.8"&lt;/code&gt;&lt;br&gt;
Description: Search for assets related to the specified IPv4 address&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: ip="2600:3c00::f03c:91ff:fefc:574a"&lt;/code&gt;&lt;br&gt;
Description: Search for assets related to specified IPv6 address&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: cidr="52.2.254.36/24"&lt;/code&gt;&lt;br&gt;
Description: Search for C-class assets of IP&lt;br&gt;
Tips:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;cidr=“52.2.254.36/16” is the B class of the IP&lt;/li&gt;
&lt;li&gt;cidr=“52.2.254.36/8” is the A class of the IP&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;Filter: org="Stanford University"&lt;/code&gt;&lt;br&gt;
Description: Search for assets of related organizations&lt;br&gt;
Tips: Used to locate IP assets corresponding to universities, structures, and large Internet companies&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: isp="China Mobile"&lt;/code&gt;&lt;br&gt;
Description: Search for assets of related network service providers&lt;br&gt;
Tips: Can be supplemented with org data&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: asn=42893&lt;/code&gt;&lt;br&gt;
Description: Search for IP assets related to corresponding ASN (Autonomous system number)&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: port=80&lt;/code&gt;&lt;br&gt;
Description: Search for related port assets&lt;br&gt;
Tips: Currently does not support simultaneous open multi-port target search&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: hostname="google.com"&lt;/code&gt;&lt;br&gt;
Description: Search for assets of related IP “hostname”&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: domain="baidu.com"&lt;/code&gt;&lt;br&gt;
Description: Search for domain-related assets&lt;br&gt;
Tips: Used to search domain and subdomain data&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: banner="FTP"&lt;/code&gt;&lt;br&gt;
Description: Search by protocol messages&lt;br&gt;
Tips: Used for searching HTTP response header data&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: http.header="http"&lt;/code&gt;&lt;br&gt;
Description: Search by HTTP response header&lt;br&gt;
Tips: Used for searching HTTP response header data&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: http.header_hash="27f9973fe57298c3b63919259877a84d"&lt;/code&gt;&lt;br&gt;
Description: Search by the hash values calculated from HTTP header.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: http.header.server="Nginx"&lt;/code&gt;&lt;br&gt;
Description: Search by server of the HTTP header&lt;br&gt;
Tips: Used for searching the server data in HTTP response headers&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: http.header.version="1.2"&lt;/code&gt;&lt;br&gt;
Description: Search by version number in the HTTP header&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: http.header.status_code="200"&lt;/code&gt;&lt;br&gt;
Description: Search by HTTP response status code&lt;br&gt;
Tips: Search for assets with HTTP response status code 200 or other status codes, such as 302, 404, etc.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: http.body="document"&lt;/code&gt;&lt;br&gt;
Description: Search by HTML body&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: http.body_hash="84a18166fde3ee7e7c974b8d1e7e21b4"&lt;/code&gt;&lt;br&gt;
Description: Search by hash value calculated from HTML body&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Fingerprint Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: app="Cisco ASA SSL VPN"&lt;/code&gt;&lt;br&gt;
Description: Search for Cisco ASA-SSL-VPN devices&lt;br&gt;
Tips: Entering keywords such as “Cisco” in the search box will display related app prompts&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: service="ssh"&lt;/code&gt;&lt;br&gt;
Description: Search for assets related to the specified service protocol&lt;br&gt;
Tips: Common service protocols include: http, ftp, ssh, telnet, etc. (other services can be found in the domain name sidebar aggregation display of search results)&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: device="router"&lt;/code&gt;&lt;br&gt;
Description: Search for router-related device types&lt;br&gt;
Tips: Common types include router, switch, storage-misc, etc. (other types can be found in the domain name sidebar aggregation display of search results)&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: os="RouterOS"&lt;/code&gt;&lt;br&gt;
Description: Search for related operating systems&lt;br&gt;
Tips: Common systems include Linux, Windows, RouterOS, IOS, JUNOS, etc. (other systems can be found in the domain name sidebar aggregation display of search results)&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: title="Cisco"&lt;/code&gt;&lt;br&gt;
Description: Search for data with “Cisco” in the title of the HTML content&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: industry="government"&lt;/code&gt;&lt;br&gt;
Description: Search for assets related to the specified industry type&lt;br&gt;
Tips: Common industry types include technology, energy, finance, manufacturing, etc. (other types can be supplemented with org data)&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: product="Cisco"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with “Cisco” in the component information&lt;br&gt;
Tips: Support mainstream asset component search&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: protocol="TCP"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with the transmission protocol as TCP&lt;br&gt;
Tips: Common transmission protocols include TCP, UDP, TCP6, SCTP&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: is_honeypot="True"&lt;/code&gt;&lt;br&gt;
Description: Filter for honeypot assets&lt;/p&gt;

&lt;h2&gt;
  
  
  6. Time-based Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: after="2020–01–01" &amp;amp;&amp;amp; port="50050"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with an update time after Jan 1, 2020 and a port 50050&lt;br&gt;
Tips: Time filters need to be combined with other filters&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: before="2020–01–01" &amp;amp;&amp;amp; port="50050"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with an update time before Jan 1, 2020 and a port 50050&lt;br&gt;
Tips: Time filters need to be combined with other filters&lt;/p&gt;

&lt;h2&gt;
  
  
  7. Dig Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: dig="baidu.com 220.181.38.148"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with related dig content&lt;/p&gt;

&lt;h2&gt;
  
  
  8. Vulnerability Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: vul.cve="CVE-2021–44228"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with cve related content&lt;/p&gt;

&lt;h2&gt;
  
  
  9. Iconhash Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: iconhash="f3418a443e7d841097c714d69ec4bcb8"&lt;/code&gt;&lt;br&gt;
Description: Analyze the target data by MD5 and search for assets with related content based on the icon&lt;br&gt;
Tips: Search for assets with the “google” icon&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: iconhash="1941681276"&lt;/code&gt;&lt;br&gt;
Description: Analyze the target data by MMH3 and search for assets with related content based on the icon&lt;br&gt;
Tips: Search for assets with the “amazon” icon&lt;/p&gt;

&lt;h2&gt;
  
  
  10. Filehash Search
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: filehash="0b5ce08db7fb8fffe4e14d05588d49d9"&lt;/code&gt;&lt;br&gt;
Description: Search for assets with related content based on the parsed file data&lt;br&gt;
Tips: Search for assets parsed with “Gitlab”&lt;/p&gt;

&lt;h2&gt;
  
  
  11. BugBounty Related
&lt;/h2&gt;

&lt;p&gt;&lt;code&gt;Filter: is_bugbounty=true&lt;/code&gt;&lt;br&gt;
Description: Filter for bug bounty assets collected by ZoomEye&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: bugbounty.source=all&lt;/code&gt;&lt;br&gt;
Description: Bugbounty Data sources&lt;br&gt;
Tips: “hackerone”, “bugcrowd”, “intigriti”, “yeswehack”, “openbugbounty”, “all”&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: is_changed=true&lt;/code&gt;&lt;br&gt;
Description: Asset changed within 7 days&lt;br&gt;
Tips: Including both new and updated assets&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Filter: is_new=true&lt;/code&gt;&lt;br&gt;
Description: Asset newly discovered within the last 7 days&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The new ZoomEye query syntax brings much more flexibility and precision compared to earlier versions. By mastering these filters — ranging from certificates, ports, banners, IP ranges, to CVEs and bug bounty assets — analysts can perform deep reconnaissance and attack surface monitoring more effectively.&lt;/p&gt;

&lt;p&gt;ZoomEye continues to evolve, so staying updated with syntax changes is crucial for maximizing its potential in security research and threat intelligence operations.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
    <item>
      <title>Top 5 Domain and IP Intelligence Tools in OSINT</title>
      <dc:creator>StarkMan</dc:creator>
      <pubDate>Tue, 23 Sep 2025 05:49:09 +0000</pubDate>
      <link>https://dev.to/stark_zhuang_df5076f35c68/top-5-domain-and-ip-intelligence-tools-in-osint-2a73</link>
      <guid>https://dev.to/stark_zhuang_df5076f35c68/top-5-domain-and-ip-intelligence-tools-in-osint-2a73</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnnqm1f006nzfwhne9u2y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnnqm1f006nzfwhne9u2y.png" alt=" " width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Open Source Intelligence (OSINT) has become a cornerstone for cybersecurity professionals, researchers, and investigative journalists. By collecting and analyzing publicly available information, OSINT tools enable deeper insights into threats, infrastructure, and digital footprints.&lt;/p&gt;

&lt;p&gt;Within the wide landscape of OSINT tools, one critical category is Domain and IP Intelligence. These tools specialize in gathering data about domains, IP addresses, SSL certificates, and related digital assets. &lt;strong&gt;They are essential for uncovering suspicious infrastructure, tracking malicious activities, and monitoring organizational exposure.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Below are the Top 5 Domain/IP Intelligence tools worth highlighting.&lt;/p&gt;

&lt;h2&gt;
  
  
  WhoisXML API
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://whoisxmlapi.com" rel="noopener noreferrer"&gt;https://whoisxmlapi.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: WhoisXML API provides one of the largest databases for domain and IP WHOIS information, along with DNS and threat intelligence feeds. It helps trace domain ownership, monitor registration changes, and correlate IP infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for&lt;/strong&gt;: Investigating domain ownership and history.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who is it for&lt;/strong&gt;: Cybersecurity teams, threat hunters, fraud investigators, and brand protection specialists.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Top features&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Comprehensive WHOIS and DNS data&lt;/li&gt;
&lt;li&gt;Historical WHOIS records&lt;/li&gt;
&lt;li&gt;Threat intelligence feeds with malicious domains/IPs&lt;/li&gt;
&lt;li&gt;API integrations for automation&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  DomainTools
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.domaintools.com" rel="noopener noreferrer"&gt;https://www.domaintools.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: DomainTools is a widely recognized platform for domain and IP profiling, offering advanced pivoting capabilities to map connections across infrastructure. It is especially strong in attribution and tracking adversary infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for&lt;/strong&gt;: Infrastructure mapping and threat attribution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who is it for&lt;/strong&gt;: Threat intelligence analysts, SOC teams, law enforcement.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Top features&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reverse WHOIS and IP lookups&lt;/li&gt;
&lt;li&gt;Domain history and registration tracking&lt;/li&gt;
&lt;li&gt;Risk scoring for domains&lt;/li&gt;
&lt;li&gt;Iris Investigate platform for pivot analysis&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  SecurityTrails
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://securitytrails.com" rel="noopener noreferrer"&gt;https://securitytrails.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: SecurityTrails focuses on domain and IP data enrichment, offering a detailed view of DNS records, subdomains, and historical infrastructure data. It provides both web-based access and robust APIs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for&lt;/strong&gt;: Asset discovery and external attack surface management.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who is it for&lt;/strong&gt;: Red teams, penetration testers, ASM providers, enterprise security teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Top features&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Current and historical DNS records&lt;/li&gt;
&lt;li&gt;Subdomain enumeration&lt;/li&gt;
&lt;li&gt;Reverse IP and domain lookups&lt;/li&gt;
&lt;li&gt;API-friendly integrations for automation&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  ThreatMiner
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.threatminer.org" rel="noopener noreferrer"&gt;https://www.threatminer.org&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: ThreatMiner is a free OSINT resource designed for security researchers. It aggregates threat-related intelligence around domains, IPs, hashes, and reports, linking them together for context.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for&lt;/strong&gt;: Quick, free enrichment of suspicious indicators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who is it for&lt;/strong&gt;: Security researchers, independent analysts, malware hunters.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Top features&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Domain and IP reputation data&lt;/li&gt;
&lt;li&gt;Links between domains, IPs, and malware reports&lt;/li&gt;
&lt;li&gt;Searchable malware hashes and reports&lt;/li&gt;
&lt;li&gt;Simple interface with free access&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  CIRCL Passive DNS (Ail framework / Passive DNS project)
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://www.circl.lu/services/passive-dns/" rel="noopener noreferrer"&gt;https://www.circl.lu/services/passive-dns/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;: CIRCL’s Passive DNS is a community-driven intelligence project that stores DNS query/response pairs observed from large networks. It enables researchers to see domain-IP relationships over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best for&lt;/strong&gt;: Identifying malicious infrastructure and mapping related domains.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who is it for&lt;/strong&gt;: Threat hunters, academic researchers, incident response teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Top features&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Historical DNS resolutions&lt;/li&gt;
&lt;li&gt;Domain-to-IP and IP-to-domain mapping&lt;/li&gt;
&lt;li&gt;Community-driven, open-source ethos&lt;/li&gt;
&lt;li&gt;Supports automated querying through API&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Domain and IP Intelligence is a critical pillar of OSINT. The five tools above — WhoisXML API, DomainTools, SecurityTrails, ThreatMiner, and CIRCL Passive DNS — cover the spectrum from commercial-grade enterprise platforms to open and community-driven resources. Depending on your needs, whether for professional threat intelligence or independent security research, these tools provide the visibility necessary to uncover hidden relationships, track malicious infrastructure, and strengthen your overall intelligence capabilities.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
    <item>
      <title>The Hunter Behind the Hacker</title>
      <dc:creator>StarkMan</dc:creator>
      <pubDate>Mon, 22 Sep 2025 10:12:17 +0000</pubDate>
      <link>https://dev.to/stark_zhuang_df5076f35c68/the-hunter-behind-the-hacker-4gb4</link>
      <guid>https://dev.to/stark_zhuang_df5076f35c68/the-hunter-behind-the-hacker-4gb4</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz8xj5rfdtuhf5rtul3zj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz8xj5rfdtuhf5rtul3zj.png" alt=" " width="800" height="435"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  0x01. Executive Summary
&lt;/h2&gt;

&lt;p&gt;During cyberattacks, adversaries often rely on Command-and-Control (C2) servers, loader servers, or even their own "workstations" for staging and data transfer. In some cases, these systems inadvertently expose themselves by enabling web servers with directory browsing or file download functionality.&lt;/p&gt;

&lt;p&gt;Our analysis revealed multiple Cobalt Strike controllers and attacker-operated machines that publicly exposed malicious binaries, exploitation scripts, payloads, and scan results. In certain instances, external actors had already traversed these directories and downloaded entire toolkits — indicating the presence of "hunters" actively targeting hacker workstations to steal their tools and intelligence.&lt;/p&gt;

&lt;h2&gt;
  
  
  0x02. Background
&lt;/h2&gt;

&lt;p&gt;While hackers seek to compromise and exfiltrate data from their victims, they are equally vulnerable to counter-exploitation. For example, a hacker may unknowingly download a scanning tool laced with a backdoor, thereby falling under the control of a more sophisticated operator.&lt;/p&gt;

&lt;p&gt;This report explores how publicly exposed web servers — commonly used by attackers for quick malware distribution and data transfer — can be discovered through cyberspace search engines like ZoomEye. We demonstrate how such exposure enables security researchers (or rival actors) to become “hunters behind the hackers,” intercepting the very tools meant for malicious campaigns.&lt;/p&gt;

&lt;p&gt;Many attackers prefer lightweight methods for distributing malware, such as spinning up a temporary HTTP service and instructing compromised hosts to fetch files via curl or wget. Languages like Python make this trivial with a one-line command: &lt;code&gt;python3 -m http.server&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fla9uw16hmju6k0f2sy2n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fla9uw16hmju6k0f2sy2n.png" alt=" " width="800" height="537"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While efficient, this practice leaves attackers themselves exposed. Any party identifying the server can collect the tools, exploits, and even stolen data stored there.&lt;/p&gt;

&lt;h2&gt;
  
  
  0x03. Methodology: Using ZoomEye to Locate Hacker Workstations
&lt;/h2&gt;

&lt;p&gt;To systematically discover attacker-operated machines, we leveraged ZoomEye to search for web servers exposing directory listings. By combining title fingerprints with keywords frequently associated with exploitation frameworks, we could identify attacker "workstations" with high confidence.&lt;/p&gt;

&lt;p&gt;Example queries in ZoomEye:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability exploits:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(title="Index of /" || title="Directory List" || title="Directory listing for /") &amp;amp;&amp;amp; "exp"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;log4j exploitation tools:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(title="Index of /" || title="Directory List" || title="Directory listing for /") &amp;amp;&amp;amp; "log4j"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Cobalt Strike:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(title="Index of /" || title="Directory List" || title="Directory listing for /") &amp;amp;&amp;amp; "cobaltstrike"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Metasploit:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(title="Index of /" || title="Directory List" || title="Directory listing for /") &amp;amp;&amp;amp; "Metasploit"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Exploits with CVE identifiers:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(title="Index of /" || title="Directory List" || title="Directory listing for /") &amp;amp;&amp;amp; "cve"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Payloads and test binaries:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;(title="Index of /" || title="Directory List" || title="Directory listing for /") &amp;amp;&amp;amp; "payload"
(title="Index of /" || title="Directory List" || title="Directory listing for /") &amp;amp;&amp;amp; "calc.exe"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;One such exposed host revealed a toolkit containing:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Cobalt Strike payloads&lt;/li&gt;
&lt;li&gt;Exploits for CVE-2019–7609&lt;/li&gt;
&lt;li&gt;General-purpose payload code&lt;/li&gt;
&lt;li&gt;Exploits for Apache James Server RCE&lt;/li&gt;
&lt;li&gt;Multiple CVE-tagged exploitation tools&lt;/li&gt;
&lt;li&gt;General-purpose exploit code&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Such findings highlight how attacker workstations can unintentionally serve as open repositories of offensive tradecraft.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fode1l8k4fh93lifxqxlm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fode1l8k4fh93lifxqxlm.png" alt=" " width="800" height="637"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  0x04. Evidence of Existing "Hunters"
&lt;/h2&gt;

&lt;p&gt;Our investigation also uncovered indications that attackers themselves are being systematically targeted. For example, one workstation hosted at &lt;code&gt;83.136.*.*:8000&lt;/code&gt; contained a nohup.out log file that recorded inbound requests.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3gozryik1p7ail62ehla.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3gozryik1p7ail62ehla.png" alt=" " width="800" height="1205"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Analysis of this log revealed multiple suspicious IP addresses, including &lt;code&gt;34.140.*.*&lt;/code&gt;, which performed recursive downloads across all directories. These were not search engine crawlers but deliberate actors — likely “hunters” — collecting every accessible file.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkzhrz79dg8sw8pbka23u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkzhrz79dg8sw8pbka23u.png" alt=" " width="784" height="902"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Three additional IP addresses exhibited identical behavior, strongly suggesting the existence of a broader ecosystem of hunters scanning the internet for attacker workstations and harvesting their contents.&lt;/p&gt;

&lt;h2&gt;
  
  
  0x05. Conclusion
&lt;/h2&gt;

&lt;p&gt;Hackers may operate solo — limited by their own skills and blind spots — or within teams where narrowly defined roles leave critical gaps in security awareness. These structural weaknesses make their infrastructure vulnerable to discovery and exploitation.&lt;/p&gt;

&lt;p&gt;By using tools like ZoomEye, defenders and rival threat actors alike can identify attacker workstations, capture their toolkits, and gain valuable insights into adversary tradecraft.&lt;/p&gt;

&lt;p&gt;In short, not all hackers are skilled defenders. &lt;strong&gt;Many become prey to higher-level hunters. This dynamic illustrates the constant evolution of offense and defense in cyberspace — where the question is no longer just who gets hacked, but who hunts the hacker.&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
    <item>
      <title>Top 5 Technical Asset Discovery Tools in OSINT</title>
      <dc:creator>StarkMan</dc:creator>
      <pubDate>Tue, 16 Sep 2025 07:08:37 +0000</pubDate>
      <link>https://dev.to/stark_zhuang_df5076f35c68/top-5-technical-asset-discovery-tools-in-osint-5a64</link>
      <guid>https://dev.to/stark_zhuang_df5076f35c68/top-5-technical-asset-discovery-tools-in-osint-5a64</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flc9qjlf03gdz5efx0kgu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flc9qjlf03gdz5efx0kgu.png" alt=" " width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Open Source Intelligence (OSINT) is a vital component of cybersecurity research and threat hunting. It enables security professionals, investigators, and researchers to gather intelligence from publicly available sources. Within OSINT, there are several subcategories of tools, each designed to serve specific investigative needs.&lt;/p&gt;

&lt;p&gt;One of the most important categories is Technical Asset Discovery, also known as Network Scanning and Fingerprinting. These tools focus on identifying exposed hosts, open ports, running services, and digital infrastructure across the internet. By mapping the “attack surface,” they provide the foundation for vulnerability analysis, red teaming, and defensive security strategies.&lt;/p&gt;

&lt;p&gt;Below are the Top 5 tools in this category.&lt;/p&gt;

&lt;h2&gt;
  
  
  Shodan
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.shodan.io" rel="noopener noreferrer"&gt;https://www.shodan.io&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shodan is often called the “search engine for connected devices.” It continuously scans the internet, indexing banners, ports, and metadata from exposed hosts and services.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Discovering exposed services and IoT devices.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Who is it for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security researchers, penetration testers, attack surface management teams.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Top features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Searchable database of IPs, ports, and banners&lt;/li&gt;
&lt;li&gt;Filters by organization, location, or technology&lt;/li&gt;
&lt;li&gt;Alerts for newly exposed assets&lt;/li&gt;
&lt;li&gt;API support for automation&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Censys
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://censys.io" rel="noopener noreferrer"&gt;https://censys.io&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Censys provides in-depth internet-wide scanning and a structured database of services, certificates, and hosts. Known for its data quality and research focus, it allows detailed queries about protocols and SSL/TLS certificates.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Infrastructure analysis and compliance monitoring.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Who is it for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Academic researchers, enterprise security teams, digital forensics experts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Top features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Comprehensive SSL/TLS certificate data&lt;/li&gt;
&lt;li&gt;Query-based search with structured filters&lt;/li&gt;
&lt;li&gt;Internet-wide scanning results updated regularly&lt;/li&gt;
&lt;li&gt;API and data exports for analysis&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  ZoomEye
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.zoomeye.ai" rel="noopener noreferrer"&gt;https://www.zoomeye.ai&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ZoomEye, developed in China, is a global cyberspace search engine. It indexes services and websites through port scanning and banner grabbing, with a large dataset useful for both attack and defense research.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Threat hunting and adversary infrastructure discovery.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Who is it for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Red teamers, OSINT analysts, security vendors in APAC.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Top features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Search by IP, domain, port, service, or banner string&lt;/li&gt;
&lt;li&gt;Geolocation filters for regional investigations&lt;/li&gt;
&lt;li&gt;Dataset focused on both web and non-web services&lt;/li&gt;
&lt;li&gt;API support with flexible query syntax&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  BinaryEdge
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.binaryedge.io" rel="noopener noreferrer"&gt;https://www.binaryedge.io&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;BinaryEdge focuses on internet-wide scanning for cyber risk management. It provides data feeds on exposed services, vulnerabilities, and cloud assets, often used by enterprises for monitoring their digital footprint.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Attack surface monitoring and enterprise risk management.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Who is it for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enterprises, MSSPs, financial institutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Top features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Exposure data for services and cloud assets&lt;/li&gt;
&lt;li&gt;Customizable feeds for integration into SIEM/SOAR&lt;/li&gt;
&lt;li&gt;Insights on vulnerable infrastructure&lt;/li&gt;
&lt;li&gt;Subscription models for continuous monitoring&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Netlas
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://netlas.io" rel="noopener noreferrer"&gt;https://netlas.io&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Netlas is a modern network intelligence platform offering fast and customizable queries across internet assets. It combines banner data, certificates, and metadata to support both reconnaissance and defensive monitoring.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Flexible asset discovery and OSINT investigations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Who is it for:&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security analysts, penetration testers, threat hunters.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Top features:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Real-time search engine for internet-connected assets&lt;/li&gt;
&lt;li&gt;SSL/TLS certificate and service metadata queries&lt;/li&gt;
&lt;li&gt;JSON-based results for automation workflows&lt;/li&gt;
&lt;li&gt;Strong focus on speed and modern interface&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Technical Asset Discovery tools are the backbone of OSINT investigations into the digital attack surface. Platforms like Shodan, Censys, ZoomEye, BinaryEdge, and Netlas empower security teams to identify exposed infrastructure, monitor changes, and anticipate threats. Whether for academic research, enterprise defense, or offensive security testing, these tools are indispensable in modern cybersecurity practice.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
  </channel>
</rss>
