The number of connected devices and online services is large and growing, fortunately, some search engines provide detailed overviews of the online status of these devices and services, allowing security personnel to take measures to protect them and their data from online threats.
These cybersecurity search engines provide information about each device or service, such as operating systems, open ports, and IP addresses. Here are 11 search engines that security researchers use to find specific information about exposed IoT devices, security vulnerabilities, leaked personal data, and more.
11 Top Search Engines#
1. ONYPHE#
The ONYPHE search engine can comprehensively scan the Internet and collect open-source network threat intelligence data for various network defense engines. ONYPHE can also actively scan connected devices on the Internet and cross-reference the scanned data with information collected from website URLs. After data processing, it provides query services for this data through APIs and query languages.
Network security analysts mainly use ONYPHE to identify and collect information about attacked devices, and can search ONYPHE's database using keywords such as IP addresses, domains, geographical location data, and inetnum details.
Link: https://www.onyphe.io/
2. Shodan#
Shodan is a powerful OSINT tool that monitors and searches a shocking range of network data. It is also one of the few engines that can inspect Operational Technology (OT). Without tools like Shodan, there would be a significant gap in collecting open-source intelligence in industries deploying IT and OT.
Creating an account on Shodan is free, but the information that can be queried for free is very limited. If users want to further query more information, they need to purchase Shodan's membership services. In addition to the personal version, Shodan also offers paid versions such as Small Business and Enterprise Advanced, where Small Business can scan up to 65,536 IP addresses and return up to 20 million results; Enterprise Advanced provides unlimited results and up to 327,680 IP scans per month, as well as vulnerability search filters and advanced support services.
Link: https://www.shodan.io/
3. Censys#
Like Shodan, Censys also searches for connected devices and provides detailed information about each device, including operating systems, IP addresses, and open ports. Censys continuously collects data from connected devices and servers, providing accurate information about the devices, including TLS and SSL protocols and open ports. This information is crucial for monitoring and protecting connected devices and services. Additionally, it can identify server versions, routers, operating system versions, web application firewalls, unpatched vulnerabilities, and other details.
Link: https://censys.com/
4. PublicWWW#
PublicWWW is a powerful resource for digital and affiliate marketing research, and it can also help security researchers identify websites related to malicious activities through active library queries.
For users who want to search websites through source code, this search engine is their preferred resource. Users can search for keywords, alphanumeric fragments, or signatures in CSS, HTML, or JS code.
Link: https://publicwww.com/
5. GreyNoise#
GreyNoise is a search engine that allows researchers to know who is scanning the Internet, enabling them to distinguish between targeted scans and random scans to strengthen their defense mechanisms.
GreyNoise uses advanced machine learning algorithms to detect and classify network activities. Users can also use this search engine to identify and classify noise-related activities, such as vulnerability scans, automatic port scans, and malware distribution. By entering an IP address or keyword, GreyNoise Visualizer generates relevant information.
GreyNoise also has an API that allows seamless integration of its information into existing security applications and infrastructure.
Link: https://www.greynoise.io/
6. Hunter#
Hunter is a user-friendly search engine that allows users to easily find and verify email addresses related to specific individuals, domains, or companies.
For example, when entering the name of an organization, users will see a verified email list linked to that domain, including their activity status and the source of obtaining them. It also displays the user's full name, position, and social media accounts.
Link: https://hunter.io/
7. BinaryEdge#
BinaryEdge is a machine learning-based security search engine designed to collect, analyze, and classify public Internet data to generate real-time threat intelligence streams and reports.
This search engine can collect various information, including open ports and vulnerable services, vulnerabilities and exposures affecting IP addresses, invalid SSL certificates, and accessible remote desktop data. Additionally, it supports email account verification to identify potential data leaks.
Link: https://www.binaryedge.io/
8. Have I Been Pwned#
"Have I Been Pwned," created by renowned cybersecurity lecturer Troy Hunt, is a free open-source intelligence search website that allows users to enter their email addresses to check if they are at risk of data breaches. Users can simply enter their username or email address in the search box to see if the corresponding credentials have been leaked.
It is reported that the website's database contains a large amount of leaked data, including billions of email addresses, usernames, passwords, and other personal data stolen by cybercriminals and published on the Internet.
Link: https://haveibeenpwned.com/
9. Fofa (Domestic)#
FOFA is a search engine developed by China's cybersecurity company Huashun Xianan. It is designed to map the global cyberspace and is an important source of Internet assets discovered on the public network. This makes it a valuable tool for security researchers to assess and protect their public-facing assets.
By continuously detecting global Internet assets, FOFA has accumulated over 4 billion assets and 350,000 fingerprint rules. This allows for accurate identification of most software and hardware network assets.
FOFA's search function covers various assets, including cameras, printers, operating systems, and databases. Users can also perform searches on IP, domain, and host, among others.
Link: https://en.fofa.info/
10. ZoomEye (Domestic)#
ZoomEye is a network space search engine created by China's cybersecurity company Knownsec. It allows users to search for and monitor online devices and services. The free OSINT tool uses Wmap and Xmap to collect data from open devices and web services and perform fingerprint analysis.
By entering keywords, IP addresses, or any query, ZoomEye generates data including the total number of hosted websites and discovered devices, open port information, and vulnerability reports.
Link: https://www.zoomeye.org/
11. WiGLE#
WiGLE is a website that integrates location and other data from wireless networks worldwide. This data is collected by volunteers who download the application to their phones, which records all the access points they encounter along with their GPS coordinates. All this data is then input into the WiGLE database. The data is presented to users in an easy-to-use website and application.
Link: https://www.wigle.net/