A curated collection of creative and insightful Shodan search queries to enhance OSINT and network monitoring efforts.
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
This repository serves as a resource for security researchers, threat intelligence analysts, and OSINT practitioners who want to quickly find impactful Shodan queries for discovering vulnerable or interesting internet-connected devices. Users can leverage these queries to identify security risks, monitor exposed assets, or gather intelligence on networked infrastructure.
This repository does not include executable tools or scripts; users must have a Shodan account to run queries. Queries should be used responsibly and ethically, respecting privacy and legal boundaries.
No installation required - this is a documentation repository
Visit https://github.com/jakejarvis/awesome-shodan-queries to browse queries
Use queries directly on https://shodan.io search interface
Enter any query from the collection into the Shodan search bar
Executes the Shodan search to find devices matching the query criteria
Example query: "port:22 country:US"
Finds all devices with SSH port open in the United States
Example query: "product:Apache version:2.4.49"
Searches for Apache servers running a specific vulnerable version