DEV Community

sssq ll
sssq ll

Posted on

How to use ZoomEye to check if your website is exposed to the public internet

Many website administrators and developers are unaware that their websites, testing environments, or admin panels have already been exposed to the public internet. With the Cyber Space Mapping Engine ZoomEye, we can quickly determine the exposure status of assets and identify potential security risks.

Step 1: Locate Your Assets

Visit zoomeye.ai, log in, and enter your domain or IP range in the search bar, for example:
domain="example.com and ip="×××.×××.×××.×××"

Step 2: Analyze the Attack Surface

On the results page, you can see open ports, service fingerprints, and banner information for each host.

Pay particular attention to the following:
● Whether there are unusual ports (e.g., 8080, 8443, 9200 — often test or admin ports)
● Whether admin interface keywords appear (e.g., "/admin", "phpMyAdmin", "login")
● Whether CMS or framework version details are detected (e.g., WordPress, Struts)

For example, you may discover an unauthenticated admin panel with a title like "Admin Login," indicating that the backend is fully exposed to the internet.

Finding Backend Login Pages
Many administrators forget to disable default or test backend paths. You can combine your domain with specific keywords in ZoomEye searches.
hostname="example.com" && app="thinkphp"
(Find backend pages of a specific framework)
hostname="example.com" && title="login"
(Find pages whose title contains “login”)

Finding Unauthenticated Directory Listings
Check whether directory listing is unintentionally enabled, allowing users to browse the file structure.
hostname="example.com" && (title="Index of /" || title="Directory Listing for /")

Finding Exposed Configuration Files or Databases
Some people accidentally expose .git directories, .env configuration files, or database management tools.

hostname="example.com" && (title="Index of /" || title="Directory Listing for /") && ".git"
(Find exposed .git directories)

hostname:"example.com" && title="phpMyAdmin"
(Find exposed phpMyAdmin interfaces)

Step 3: Continuous Monitoring

ZoomEye supports scheduled checks via its data subscription feature. You can set monitoring rules to regularly compare scan results so that you can respond promptly when new ports or systems become exposed.

By following these steps, you can determine whether your website is publicly accessible and gain a visual understanding of your overall attack surface.
In cybersecurity, visibility is the foundation of defense.

I heard that ZoomEye is launching a lifetime membership for Black Friday. I think everyone should keep an eye on it.

I saw that ZoomEye is launching a lifetime membership for Black Friday. I think everyone should keep an eye on it.

Top comments (0)