{"uuid": "485ae87e-d39b-430c-83ad-de5cac8e666c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-1234", "type": "seen", "source": "https://t.me/q_1xx/4718", "content": "\ud83d\udd0d Shodan: The Search Engine for Internet-Connected Devices  \n*Discover exposed servers, IoT devices, and vulnerabilities worldwide*\n\n\u2728 Top Use Cases  \n- Find vulnerable services  \n- Map network attack surfaces  \n- Research IoT security  \n- Track industrial control systems (ICS)  \n- Monitor honeypots  \n\n\ud83d\udd11 Basic Query Syntax  \nproduct: Search specific software (Apache, Nginx)  \nport: Filter by open ports (80, 443, 22)  \ncountry: Geo-target devices (US, CN, DE)  \nos: Filter by operating system  \nvuln: Find CVE vulnerabilities  \n\n\ud83d\udd25 Powerful Query Examples  \n1. default password  \n   - Devices with default credentials  \n   \n2. port:3389 os:\"Windows\"  \n   - Open Windows RDP ports  \n   \n3. nginx country:US  \n   - Nginx servers in the USA  \n   \n4. ssl:\"Self-signed\" port:443  \n   - HTTPS servers with self-signed certs  \n   \n5. cisco-ios city:\"San Francisco\"  \n   - Cisco devices in SF  \n   \n6. http.title:\"phpMyAdmin\"  \n   - Exposed phpMyAdmin dashboards  \n   \n7. port:23 \"console management\"  \n   - Open Telnet management consoles  \n   \n8. vuln:CVE-2023-1234  \n   - Devices vulnerable to specific CVE  \n\n\ud83d\udca1 Advanced Operators  \n- before/after: Time-based filtering  \n- net: Search entire IP ranges  \n- has_screenshot: Find devices with images  \n- http.status:200 HTTP status filters  \n\n\n\ud83d\udcda Shodan Resources  \n[Official Docs](https://developer.shodan.io)  \n[Query Cheat Sheet](https://www.shodan.io/cheat-sheet)  \n[Exploit Database Integration](https://www.exploit-db.com/shodan)\n\n#shodan", "creation_timestamp": "2025-10-02T12:15:54.000000Z"}