ReconDock By Kdairatchi
Go To ReconDock
MyRepo
MyRepo
  • Pastebin Services
  • Awesome Ai Talk
  • Bug Bounty Testing, Techniques, and Tools
  • Cybersources
  • Targets
  • Bug checklist
  • Bug Bounty Platforms
  • Awesome Bug Bounty Tips Awesome
    • CVE Exploits and PoC Collection
  • ============ Awesome Bugs
    • Awesome One-liner Bug Bounty
  • Awesome CS Courses
  • Awesome Cyber Co
  • Awesome Dev
  • Awesome Free Certs
  • Awesome Git
  • Awesome Github
  • Awesome Go
  • Awesome Interviews
  • Awesome Keys
  • Awesome Mac OpenSource
  • Awesome Mac
  • Awesome Python
    • Awesome Tool
  • Awesome-Selfhosted
    • Awesome Hacker Search Engines
  • Awesome Shell
  • Awesome Shodan Search Queries
  • Awesome Static Website Services Awesome
  • Awesome Vulnerable Applications
  • Awesome WAF
  • Awesome First PR Opportunities
  • Awesome-Bugbounty-Writeups
  • Awesome-web3-Security awesome
  • Bug-Bounty
  • CTF Tools
  • Awesome Blockchain Bug Bounty
  • Awesome Bug Bounty
  • awesome-design-systems
  • Awesome Google VRP Writeups
  • Web Scraping
  • awesome
  • bug-bounty-reference
  • the-book-of-secret-knowledge
  • APACHE
  • AWS
  • AZURE
  • CISCO
  • CLOUDFLARE
  • Cross Origin Resource Sharing (CORS)
  • CRLF Injection || HTTP Response Splitting
  • CSV Injection
  • Content Injection
  • CRLF Injection || HTTP Response Splitting
  • JENKINS
  • JIRA
  • LFI
  • OR
  • PostgreSQL Environment Variable Manipulation Vulnerability
  • RCE
  • Recon
  • SSRF
  • Proof OF Concept (POC): SharePoint Vulnerability Detection
  • Template Injection
  • WORDPRESS
  • XSLT Injection
  • XSS
  • XXE
  • Books
  • Firebase Subdomain Enumeration & PoC Testing
  • SQLI
  • Special Tools
  • Account Takeover
  • Authentication
  • Broken Link Hijacking
  • Business Logic Errors
  • Default Credentials
  • Email Spoofing
  • ExposedAPIkeys
  • ForgotPasswordFunctionality
  • JWT Vulnerabilities
  • OWASPTestingChecklist1
  • Tabnabbing
  • Web Cache Poisoning
  • Wordpress Endpoints to look
  • lfi_vulnerble_targets
  • (LFI)passwrd
  • LostSec
  • POCS
    • CVES
      • CVE-2021-36873
      • BreadcrumbsSQL_Injection_cve_2024
      • CVE-2024-0195
      • CVE-2024-29269 Exploit
  • 403-ByPass
  • Chat-bot_xss_payloads
  • burp
    • Match & Replace
    • Zap
  • cloudflare-waf-bypass
  • infosec
    • Customize the bash shell environments
    • automation
    • Website Ideas
  • 2FA bypass
  • Account Takeover
  • OWASP Web Application Security Testing Checklist
  • Projects
  • OWASP Top Ten
  • links
  • Bug Bounty Builder ¯\(ツ)/¯
  • Awesome
    • AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
  • Cheatsheets
  • Checklists
    • Here’s a clear, step by step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy to follow commands, explanations, and examples where applicable.
  • Dorks
  • Scripts
  • Loads
  • OWASP
    • Checklist
  • ai
    • Ai Best for Information and Coding
  • Medium Recent Writeups
  • 🌟 Useful Extensions for Bug Bounty Hunting 🌟
  • Customize the bash shell environments
  • Fabric
    • Test Application Platform Configuration
  • Docker
  • Git auto
  • Bug Bounty Beginner's Roadmap
  • Methodology 2025
    • Advanced Recon Methodology
Powered by GitBook
On this page
  • Table of Contents
  • Industrial Control Systems
  • Samsung Electronic Billboards 🔎 →
  • Gas Station Pump Controllers 🔎 →
  • Automatic License Plate Readers 🔎 →
  • Traffic Light Controllers / Red Light Cameras 🔎 →
  • Voting Machines in the United States 🔎 →
  • Telcos Running Cisco Lawful Intercept Wiretaps 🔎 →
  • Prison Pay Phones 🔎 →
  • Tesla PowerPack Charging Status 🔎 →
  • Electric Vehicle Chargers 🔎 →
  • Maritime Satellites 🔎 →
  • Submarine Mission Control Dashboards 🔎 →
  • CAREL PlantVisor Refrigeration Units 🔎 →
  • Nordex Wind Turbine Farms 🔎 →
  • C4 Max Commercial Vehicle GPS Trackers 🔎 →
  • DICOM Medical X-Ray Machines 🔎 →
  • GaugeTech Electricity Meters 🔎 →
  • Siemens Industrial Automation 🔎 →
  • Siemens HVAC Controllers 🔎 →
  • Door / Lock Access Controllers 🔎 →
  • Railroad Management 🔎 →
  • Remote Desktop
  • Unprotected VNC 🔎 →
  • Windows RDP 🔎 →
  • Network Infrastructure
  • Weave Scope Dashboards 🔎 →
  • MongoDB 🔎 →
  • Mongo Express Web GUI 🔎 →
  • Jenkins CI 🔎 →
  • Docker APIs 🔎 →
  • Docker Private Registries 🔎 →
  • Pi-hole Open DNS Servers 🔎 →
  • Already Logged-In as root via Telnet 🔎 →
  • Android Root Bridges 🔎 →
  • Lantronix Serial-to-Ethernet Adapter Leaking Telnet Passwords 🔎 →
  • Citrix Virtual Apps 🔎 →
  • Cisco Smart Install 🔎 →
  • PBX IP Phone Gateways 🔎 →
  • Polycom Video Conferencing 🔎 →
  • Bomgar Help Desk Portal 🔎 →
  • Intel Active Management CVE-2017-5689 🔎 →
  • HP iLO 4 CVE-2017-12542 🔎 →
  • Outlook Web Access:
  • Lync / Skype for Business 🔎 →
  • Network Attached Storage (NAS)
  • SMB (Samba) File Shares 🔎 →
  • FTP Servers with Anonymous Login 🔎 →
  • Iomega / LenovoEMC NAS Drives 🔎 →
  • Buffalo TeraStation NAS Drives 🔎 →
  • Logitech Media Servers 🔎 →
  • Plex Media Servers 🔎 →
  • Tautulli / PlexPy Dashboards 🔎 →
  • Webcams
  • Yawcams 🔎 →
  • webcamXP/webcam7 🔎 →
  • Android IP Webcam Server 🔎 →
  • Security DVRs 🔎 →
  • Printers & Copiers:
  • HP Printers 🔎 →
  • Xerox Copiers/Printers 🔎 →
  • Epson Printers 🔎 →
  • Canon Printers 🔎 →
  • Home Devices
  • Yamaha Stereos 🔎 →
  • Apple AirPlay Receivers 🔎 →
  • Chromecasts / Smart TVs 🔎 →
  • Crestron Smart Home Controllers 🔎 →
  • Random Stuff
  • OctoPrint 3D Printer Controllers 🔎 →
  • Etherium Miners 🔎 →
  • Apache Directory Listings 🔎 →
  • Misconfigured WordPress 🔎 →
  • Too Many Minecraft Servers 🔎 →
  • Literally Everything in North Korea 🇰🇵 🔎 →
  • TCP Quote of the Day 🔎 →
  • Find a Job Doing This! 👩‍💼 🔎 →
  • License

Awesome Shodan Search Queries

PreviousAwesome ShellNextAwesome Static Website Services Awesome

Last updated 4 months ago

Over time, I've collected an assortment of interesting, funny, and depressing search queries to plug into , the () internet search engine. Some return facepalm-inducing results, while others return serious and/or ancient vulnerabilities in the wild.

You can assume these queries only return unsecured/open instances when possible. For your own legal benefit, do not attempt to login (even with default passwords) if they aren't! Narrow down results by adding filters like country:US or org:"Harvard University" or hostname:"nasa.gov" to the end.

The world and its devices are quickly becoming more connected through the shiny new — and exponentially as a result. To that end, I hope this list spreads awareness (and, quite frankly, pant-wetting fear) rather than harm.

And as always, ! 🤓


Table of Contents


Industrial Control Systems

"Server: Prismview Player"
"in-tank inventory" port:10001
P372 "ANPR enabled"
mikrotik streetlight
"voter system serial" country:US
"Cisco IOS" "ADVIPSERVICESK9_LI-M"

Lawful intercept is the lawfully authorized interception and monitoring of communications of an intercept subject. The term "intercept subject" [...] refers to the subscriber of a telecommunications service whose communications and/or intercept related information (IRI) has been lawfully authorized to be intercepted and delivered to some agency.

"[2J[H Encartele Confidential"
http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2
"Server: gSOAP/2.8" "Content-Length: 583"
"Cobham SATCOM" OR ("Sailor" "VSAT")
title:"Slocum Fleet Mission Control"
"Server: CarelDataServer" "200 Document follows"
http.title:"Nordex Control" "Windows 2000 5.0 x86" "Jetty/3.1 (JSP 1.1; Servlet 2.2; java 1.6.0_14)"
"[1m[35mWelcome on console"
"DICOM Server Response" port:104
"Server: EIG Embedded Web Server" "200 Document follows"
"Siemens, SIMATIC" port:161
"Server: Microsoft-WinCE" "Content-Length: 12581"
"HID VertX" port:4070
"log off" "select the appropriate"

Remote Desktop

"authentication disabled" "RFB 003.008"

99.99% are secured by a secondary Windows login screen.

"\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"

Network Infrastructure

Command-line access inside Kubernetes pods and Docker containers, and real-time visualization/monitoring of the entire infrastructure.

title:"Weave Scope" http.favicon.hash:567176827
"MongoDB Server Information" port:27017 -authentication
"Set-Cookie: mongo-express=" "200 OK"
"X-Jenkins" "Set-Cookie: JSESSIONID" http.title:"Dashboard"
"Docker Containers:" port:2375
"Docker-Distribution-Api-Version: registry" "200 OK" -gitlab
"dnsmasq-pi-hole" "Recursion: enabled"
"root@" port:23 -login -password -name -Session
"Android Debug Bridge" "Device" port:5555
Lantronix password port:30718 -secured
"Citrix Applications:" port:1604
"smart install client active"
PBX "gateway console" -password port:23
http.title:"- Polycom" "Server: lighttpd"
"Polycom Command Shell" -failed port:23
"Server: Bomgar" "200 OK"
"Intel(R) Active Management Technology" port:623,664,16992,16993,16994,16995
HP-ILO-4 !"HP-ILO-4/2.53" !"HP-ILO-4/2.54" !"HP-ILO-4/2.55" !"HP-ILO-4/2.60" !"HP-ILO-4/2.61" !"HP-ILO-4/2.62" !"HP-iLO-4/2.70" port:1900

Outlook Web Access:

"x-owa-version" "IE=EmulateIE7" "Server: Microsoft-IIS/7.0"
"x-owa-version" "IE=EmulateIE7" http.favicon.hash:442749392
"X-AspNet-Version" http.title:"Outlook" -"x-owa-version"
"X-MS-Server-Fqdn"

Network Attached Storage (NAS)

Produces ~500,000 results...narrow down by adding "Documents" or "Videos", etc.

"Authentication: disabled" port:445
"Authentication: disabled" NETLOGON SYSVOL -unix port:445
"Authentication: disabled" "Shared this folder to access QuickBooks files OverNetwork" -unix port:445
"220" "230 Login successful." port:21
"Set-Cookie: iomega=" -"manage/login.html" -http.title:"Log In"
Redirecting sencha port:9000
"Server: Logitech Media Server" "200 OK"
"X-Plex-Protocol" "200 OK" port:32400
"CherryPy/5.1.0" "/home"

Webcams

Example images not necessary. 🤦

"Server: yawcam" "Mime-Type: text/html"
("webcam 7" OR "webcamXP") http.component:"mootools" -401
"Server: IP Webcam Server" "200 OK"
html:"DVR_H264 ActiveX"

Printers & Copiers:

"Serial Number:" "Built:" "Server: HP HTTP"
ssl:"Xerox Generic Root"
"SERVER: EPSON_Linux UPnP" "200 OK"
"Server: EPSON-HTTP" "200 OK"
"Server: KS_HTTP" "200 OK"
"Server: CANON HTTP Server"

Home Devices

"Server: AV_Receiver" "HTTP/1.1 406"

Apple TVs, HomePods, etc.

"\x08_airplay" port:5353
"Chromecast:" port:8008
"Model: PYNG-HUB"

Random Stuff

title:"OctoPrint" -title:"Login" http.favicon.hash:1307375944
"ETH - Total speed"

Substitute .pem with any extension or a filename like phpinfo.php.

http.title:"Index of /" http.html:".pem"
http.html:"* The wp-config.php creation script uses this file"
"Minecraft Server" "protocol 340" port:25565
net:175.45.176.0/22,210.52.109.0/24,77.94.35.0/24
port:17 product:"Windows qotd"
"X-Recruiting:"

Bon voyage, fellow penetrators! 😉

License

Mirrored from a blog post at https://jarv.is/notes/shodan-search-queries/.

Samsung Electronic Billboards

Example: Electronic Billboards

Gas Station Pump Controllers

Example: Gas Station Pump Inventories

Automatic License Plate Readers

Example: Automatic License Plate Reader

Traffic Light Controllers / Red Light Cameras

Voting Machines in the United States

Telcos Running Wiretaps

Wiretapping mechanism outlined by Cisco in :

Prison Pay Phones

Charging Status

Example: Tesla PowerPack Charging Status

Electric Vehicle Chargers

Maritime Satellites

Shodan made a pretty sweet that maps ship locations in real time, too!

Example: Maritime Satellites

Submarine Mission Control Dashboards

Refrigeration Units

Example: CAREL PlantVisor Refrigeration Units

Farms

Commercial Vehicle GPS Trackers

Example: C4 Max Vehicle GPS

Medical X-Ray Machines

Secured by default, thankfully, but these 1,700+ machines still being on the internet.

Electricity Meters

Example: GaugeTech Electricity Meters

Siemens Industrial Automation

Siemens HVAC Controllers

Door / Lock Access Controllers

Railroad Management

Unprotected VNC

is a great supplementary tool to browse screenshots, by the way!

The first result right now. 😞

Windows RDP

Dashboards

Example: Weave Scope Dashboards

MongoDB

Older versions were insecure by default.

Example: MongoDB

Web GUI

Like the but for MongoDB.

Example: Mongo Express GUI

Jenkins CI

Example: Jenkins CI

Docker APIs

Docker Private Registries

Open DNS Servers

Already Logged-In as root via Telnet

Android Root Bridges

A tangential result of Google's sloppy fractured update approach. 🙄

Lantronix Serial-to-Ethernet Adapter

Citrix Virtual Apps

Example: Citrix Virtual Apps

Cisco Smart Install

(kind of "by design," but especially when exposed).

PBX IP Phone Gateways

Video Conferencing

Telnet Configuration:

Example: Polycom Video Conferencing

Portal

Intel Active Management

HP iLO 4

Exchange 2007

Example: OWA for Exchange 2007

Exchange 2010

Example: OWA for Exchange 2010

Exchange 2013 / 2016

Example: OWA for Exchange 2013/2016

Lync / Skype for Business

SMB (Samba) File Shares

Specifically domain controllers:

Concerning files:

FTP Servers with Anonymous Login

Iomega / LenovoEMC NAS Drives

Example: Iomega / LenovoEMC NAS Drives

Buffalo TeraStation NAS Drives

Example: Buffalo TeraStation NAS Drives

Logitech Media Servers

Example: Logitech Media Servers

Media Servers

Dashboards

Example: PlexPy / Tautulli Dashboards

Yawcams

webcamXP/webcam7

Android IP Webcam Server

Security DVRs

HP Printers

Example: HP Printers

Xerox Copiers/Printers

Example: Xerox Copiers/Printers

Epson Printers

Example: Epson Printers

Canon Printers

Example: Canon Printers

Yamaha Stereos

Example: Yamaha Stereos

Apple AirPlay Receivers

Chromecasts / Smart TVs

Controllers

OctoPrint 3D Printer Controllers

Example: OctoPrint 3D Printers

Etherium Miners

Example: Etherium Miners

Apache Directory Listings

Misconfigured WordPress

Exposed files containing database credentials.

Too Many Minecraft Servers

Literally in North Korea 🇰🇵

TCP Quote of the Day

Port 17 () has a ...

Find a Job Doing This! 👩‍💼

If you've found any other juicy Shodan gems, whether it's a search query or a specific example, definitely on the blog or .

To the extent possible under law, has waived all copyright and related or neighboring rights to this work.

🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
Cisco Lawful Intercept
🔎 →
RFC 3924
🔎 →
Tesla PowerPack
🔎 →
🔎 →
🔎 →
Ship Tracker
🔎 →
CAREL PlantVisor
🔎 →
Nordex Wind Turbine
🔎 →
C4 Max
🔎 →
DICOM
🔎 →
have no business
GaugeTech
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
Shodan Images
🔎 →
🔎 →
Weave Scope
🔎 →
🔎 →
Very scary.
Mongo Express
🔎 →
infamous phpMyAdmin
🔎 →
🔎 →
🔎 →
Pi-hole
🔎 →
🔎 →
🔎 →
More information here.
Leaking Telnet Passwords
🔎 →
🔎 →
🔎 →
Vulnerable
🔎 →
Polycom
🔎 →
🔎 →
Bomgar Help Desk
🔎 →
CVE-2017-5689
🔎 →
CVE-2017-12542
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
default network shares of QuickBooks
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
Plex
🔎 →
Tautulli / PlexPy
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
Crestron Smart Home
🔎 →
🔎 →
🔎 →
🔎 →
🔎 →
wp-config.php
🔎 →
Everything
🔎 →
🔎 →
RFC 865
bizarre history
🔎 →
drop a comment
open an issue/PR here on GitHub
Jake Jarvis
Jarvs Blog
Shodan
literal
Most search filters require a Shodan account.
Internet of Things Sh*t
more dangerous
discover and disclose responsibly
Industrial Control Systems
Remote Desktop
Network Infrastructure
Network Attached Storage (NAS)
Webcams
Printers & Copiers
Home Devices
Random Stuff