![]() The vulns property contains information about vulnerabilities that may exist in the service represented by the banner. ![]() Version of the software running the service.ĭevices running the VertX/Edge door controllers. Title of the website as extracted from the HTML source. The timestamp for when the banner was fetched from the device. HTTPS) or support upgrading a connection to SSL/TLS (ex. ![]() Services that run on port 445 and support either SMBv1 or SMBv2.Īny banner generated by the snmp module (typically on 161/UDP).Īny service banner where the initial response starts with “SSH” and subsequently completes a SSH handshake. ![]() It doesn’t store any data about the port/service itself. Information about how the banner was generated. Services on port 520 that successfully respond to a RIP request. Redis services running on the default port 6379/TCP. Name of the software running the service. Port number that the service is operating on. This can include the SSL certificate, robots.txt and other raw information that hasn't yet been formalized into the Banner Specification. NTP daemons supporting at least version 1 or version 2.Ĭontains experimental and supplemental data for the service. Services that run on port 137 and complete a NetBIOS handshake. MQTT services that allow remote connections. MongoDB services that support the binary protocol to interact with the database. Most results are on port 18081, but it can also be available on other ports. If the Monero RPC service is enabled and accepting remote connections. Possible values are: "Ethernet or modem", "generic tunnel or VPN", "DSL", "IPIP or SIT", "SLIP", "IPSec or GRE", "VLAN", "jumbo Ethernet", "Google", "GIF", "PPTP", "loopback", "AX.25 radio modem".ĭevices running the Minecraft game server. Lantronix devices that are running the configuration service. VPN services that use the ISAKMP protocol (such as IKE). The IPv6 address of the host as a string. Miscellaneous information that was extracted about the product. The banner was generated by a HTTP module (http, https, http-simple-new, https-simple-new) and successfully completed a HTTP handshake.ĭevices running InfluxDB time-series database. If the FTP service supports STARTTLS then the starttls tag will be added to the list of tags on the banner and it will also have a top-level ssl property which contains the certificate, SSL testing results and more.ĭevices running Apache Hive servers on any port that Shodan crawls. Ports that are running the etcd service.ĭevices that complete a handshake in either TCP or UDP for the industrial Ethernet/IP protocol.įTP services running on the default port 21/TCP. The etcd service provides a distributed key/value store used by projects such as Kubernetes. The elastic property is available in banners that are identified as belonging to an Elastic service. The type of device (webcam, router, etc.).ĭNS servers that support either UDP or TCP (typically on port 53).ĭocker services that allow remote connections and don’t have authentication enabled.Īn array of strings containing the top-level domains for the hostnames of the device. Services running the IBM DB2 DRDA protocol. connection_name.Ĭassandra database services that allow connections to the client Thrift port (default: 9160/ tcp).ĭevices running CoAP IoT protocol service. This can be useful for understanding the functionality and potential vulnerabilities of the device or system associated with that IP. You must specify the ip in the where clause to query this table.Įxamples List all service information for an IPĮxplore which services are associated with a specific IP address.Utilize it to uncover information about a host's digital footprint, such as open ports and the services running on them. As a security researcher or network administrator, explore service-specific details through this table, including ports, protocols, and product information. The shodan_host_service table provides insights into the services running on a specific host within the Shodan search engine. This information is crucial for security researchers, network administrators, and penetration testers to understand the digital footprint of a host. It provides a wealth of information about hosts, including open ports, protocols, and services. Shodan is a search engine for internet-connected devices. Table: shodan_host_service - Query Shodan Host Services using SQL
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |