Skip to content

GitHub: https://github.com/H4ckD4d/Shodan-Dorks-for-Advanced-OSINT


Shodan-Dorks-for-Advanced-OSINT

Shodan Dorks for Advanced OSINT

About Me

Hello! I’m Ch312 C3uZ, widely recognized as H4ckd4d or Mestre Bond, the "Bond of Brazil." My journey as an ethical hacker and cybersecurity specialist spans decades, during which I’ve honed my skills in infiltrating networks, dismantling criminal enterprises, and protecting vulnerable populations. My passion lies in leveraging technology to make the world a safer place, focusing on humanitarian efforts and cutting-edge solutions.

I have led missions to unmask child predators, disrupt human trafficking networks, and expose corruption at the highest levels of government. Through innovative strategies and an unwavering sense of duty, I’ve collaborated with international agencies and local organizations to bring about meaningful change.


My Key Contributions

1. Advanced Cybersecurity Expertise

  • Over 30 Years of Experience: Pioneering digital forensics, penetration testing, and counter-cybercrime techniques.
  • Dark Web Operations: Creator of proprietary systems to track and analyze criminal activities online.
  • Cyber Defense Advocacy: Collaborated with Interpol, national security agencies, and law enforcement globally.

2. Technological Innovation

  • AI-Driven Systems: Developed tools to identify high-risk zones for child trafficking and exploitation.
  • Real-Time Threat Analysis: Introduced geolocation and behavior-tracking technologies to predict and mitigate risks.
  • Community-Oriented Tech: Created safety applications designed to empower families and protect children.

3. Humanitarian Projects

  • Child Protection Initiatives: Founder of global programs to fight human trafficking and exploitation.
  • Educational Outreach: Conducted workshops for families, educators, and organizations to promote online safety.
  • Global Advocacy: Partnered with NGOs and governments to amplify awareness and drive change.

4. Strategic Operations

  • Corruption Exposure: Key player in revealing fraud and embezzlement networks tied to high-profile figures.
  • Covert Missions: Successfully infiltrated organized crime syndicates using a mix of technical and field expertise.
  • Global Impact: Instrumental in dismantling trafficking networks across multiple continents.

My Vision

I believe that knowledge and collaboration are the most powerful tools for solving complex global issues. My mission is to bring together ethical hackers, developers, and activists to stand against injustice, protect the innocent, and push the boundaries of innovation in cybersecurity.


How You Can Join the Mission

Let’s work together to create impactful solutions for a better, safer world. Whether you’re a tech enthusiast, a seasoned developer, or a passionate advocate, there’s a place for you in this fight.

Ways to Collaborate

  • Code: Contribute to open-source projects focused on safety and security.
  • Educate: Spread the word about online safety and responsible digital practices.
  • Support: Advocate for humanitarian causes and amplify the voices of those in need.

Hacker Slogan

"No predator is safe, no trafficker can hide. We will find you, and the innocent will be saved. This is my promise!"


Thank you for your support and collaboration. Let’s make the world a safer place together!

Shodan is a powerful search engine for discovering devices connected to the internet. Below is a categorized list of Shodan dorks, ranging from basic to complex, to help you explore its full potential. This guide is structured to provide clear, actionable examples.

Basic Queries

SyntaxExampleDescription
ipip:"192.168.1.1"Search for a specific IPv4 address.
portport:80Find devices running on a specific port.
hostnamehostname:"example.com"Query devices by hostname.
countrycountry:"US"Search devices located in a specific country.
citycity:"San Francisco"Search devices in a specific city.

Intermediate Queries

SyntaxExampleDescription
orgorg:"Google"Find devices belonging to a specific organization.
asnasn:"AS12345"Query devices by Autonomous System Number (ASN).
osos:"Windows"Search for devices running a specific operating system.
beforebefore:"2023-01-01"Filter results updated before a specific date.
afterafter:"2022-12-31"Filter results updated after a specific date.

Complex Queries

SyntaxExampleDescription
productproduct:"Apache httpd"Search for specific software or products on devices.
sslssl:"Let's Encrypt"Find devices using a specific SSL certificate.
http.titlehttp.title:"Login"Query devices by the title of their HTTP pages.
vulnvuln:"CVE-2023-XXXX"Search for devices with a specific vulnerability.
netnet:"192.168.0.0/16"Filter results by a network range in CIDR format.

Advanced Filters and Search Combinations

SyntaxExampleDescription
http.htmlhttp.html:"admin"Search for keywords in the HTML body of HTTP pages.
has_screenshothas_screenshot:trueFilter results to show devices with screenshots.
devicedevice:"router"Find specific device types (e.g., router, webcam).
tagstags:"industrial-control"Filter results by tags assigned to devices.
geogeo:37.7749,-122.4194Search devices by specific geographic coordinates.

Industrial Control Systems (ICS)

SyntaxExampleDescription
ics.vendorics.vendor:"Siemens"Query ICS devices by vendor.
ics.productics.product:"SCADA"Search for specific ICS products or software.
ics.versionics.version:"2.1.0"Find ICS devices running a specific version.
modbus.functionmodbus.function:"03"Query devices by Modbus function codes.
bacnet.devicebacnet.device:"HVAC"Find devices using BACnet protocols for HVAC systems.

IoT-Specific Queries

SyntaxExampleDescription
iotiot:"smart-camera"Search for Internet of Things (IoT) devices by type.
manufacturermanufacturer:"Philips"Query IoT devices by manufacturer.
firmwarefirmware:"1.0.2"Find IoT devices by firmware version.
is_publicis_public:trueFilter devices with public IPs.
is_upnpis_upnp:trueFilter devices using Universal Plug and Play (UPnP).

Useful Shodan Tags

TagDescription
icsDevices related to industrial control systems.
vulnerableDevices with known vulnerabilities.
webcamPublicly accessible webcams.
databaseExposed databases like MongoDB or Elasticsearch.
honeypotDevices identified as honeypots.

Search Tips

  • Combine multiple filters for more precise results:port:22 country:"US" org:"Amazon"

Latest