name: Shodan Reconnaissance and Pentesting
description: This skill should be used when the user asks to "search for exposed devices on the internet," "perform Shodan reconnaissance," "find vulnerable services using Shodan," "scan IP ranges with Shodan," or "discover IoT devices and open ports." It provides comprehensive guidance for using Shodan's search engine, CLI, and API for penetration testing reconnaissance.
Shodan Reconnaissance and Pentesting
Purpose
Provide systematic methodologies for leveraging Shodan as a reconnaissance tool during penetration testing engagements. This skill covers the Shodan web interface, command-line interface (CLI), REST API, search filters, on-demand scanning, and network monitoring capabilities for discovering exposed services, vulnerable systems, and IoT devices.
Inputs / Prerequisites
- Shodan Account: Free or paid account at shodan.io
- API Key: Obtained from Shodan account dashboard
- Target Information: IP addresses, domains, or network ranges to investigate
- Shodan CLI: Python-based command-line tool installed
- Authorization: Written permission for reconnaissance on target networks
Outputs / Deliverables
- Asset Inventory: List of discovered hosts, ports, and services
- Vulnerability Report: Identified CVEs and exposed vulnerable services
- Banner Data: Service banners revealing software versions
- Network Mapping: Geographic and organizational distribution of assets
- Screenshot Gallery: Visual reconnaissance of exposed interfaces
- Exported Data: JSON/CSV files for further analysis
Core Workflow
1. Setup and Configuration
Install Shodan CLI
pip install shodan
easy_install shodan
sudo pacman -S python-shodan
Initialize API Key
shodan init YOUR_API_KEY
shodan info
Check Account Status
shodan info
shodan myip
shodan version
2. Basic Host Reconnaissance
Query Single Host
shodan host 1.1.1.1
Check if Host is Honeypot
shodan honeyscore 192.168.1.100
3. Search Queries
Basic Search (Free)
shodan search apache
shodan search --fields ip_str,port,os smb
Filtered Search (1 Credit)
shodan search product:mongodb
shodan search product:nginx country:US city:"New York"
Count Results
shodan count openssh
shodan count openssh 7
Download Results
shodan download results.json.gz "apache country:US"
shodan download --limit 5000 results.json.gz "nginx"
shodan download --limit -1 all_results.json.gz "query"
Parse Downloaded Data
shodan parse --fields ip_str,port,hostnames results.json.gz
shodan parse --fields location.country_code3,ip_str -f port:22 results.json.gz
shodan parse --fields ip_str,port,org --separator , results.json.gz > results.csv
4. Search Filters Reference
Network Filters
ip:1.2.3.4 # Specific IP address
net:192.168.0.0/24 # Network range (CIDR)
hostname:example.com # Hostname contains
port:22 # Specific port
asn:AS15169 # Autonomous System Number
Geographic Filters
country:US # Two-letter country code
country:"United States" # Full country name
city:"San Francisco" # City name
state:CA # State/region
postal:94102 # Postal/ZIP code
geo:37.7,-122.4 # Lat/long coordinates
Organization Filters
org:"Google" # Organization name
isp:"Comcast" # ISP name
Service/Product Filters
product:nginx # Software product
version:1.14.0 # Software version
os:"Windows Server 2019" # Operating system
http.title:"Dashboard" # HTTP page title
http.html:"login" # HTML content
http.status:200 # HTTP status code
ssl.cert.subject.cn:*.example.com # SSL certificate
ssl:true # Has SSL enabled
Vulnerability Filters
vuln:CVE-2019-0708 # Specific CVE
has_vuln:true # Has any vulnerability
Screenshot Filters
has_screenshot:true # Has screenshot available
screenshot.label:webcam # Screenshot type
5. On-Demand Scanning
Submit Scan
shodan scan submit 192.168.1.100
shodan scan submit --verbose 192.168.1.100
shodan scan submit --filename scan_results.json.gz 192.168.1.100
Monitor Scan Status
shodan scan list
shodan scan status SCAN_ID
shodan download --limit -1 results.json.gz scan:SCAN_ID
Available Scan Protocols
shodan scan protocols
6. Statistics and Analysis
Get Search Statistics
shodan stats nginx
shodan stats --facets domain,port,asn --limit 5 nginx
shodan stats --facets country,org -O stats.csv apache
7. Network Monitoring
Setup Alerts (Web Interface)
1. Navigate to Monitor Dashboard
2. Add IP, range, or domain to monitor
3. Configure notification service (email, Slack, webhook)
4. Select trigger events (new service, vulnerability, etc.)
5. View dashboard for exposed services
8. REST API Usage
Direct API Calls
curl -s "https://api.shodan.io/api-info?key=YOUR_KEY" | jq
curl -s "https://api.shodan.io/shodan/host/1.1.1.1?key=YOUR_KEY" | jq
curl -s "https://api.shodan.io/shodan/host/search?key=YOUR_KEY&query=apache" | jq
Python Library
import shodan
api = shodan.Shodan('YOUR_API_KEY')
results = api.search('apache')
print(f'Results found: {results["total"]}')
for result in results['matches']:
print(f'IP: {result["ip_str"]}')
host = api.host('1.1.1.1')
print(f'IP: {host["ip_str"]}')
print(f'Organization: {host.get("org", "n/a")}')
for item in host['data']:
print(f'Port: {item["port"]}')
Quick Reference
Essential CLI Commands
| Command | Description | Credits |
|---|
shodan init KEY | Initialize API key | 0 |
shodan info | Show account info | 0 |
shodan myip | Show your IP | 0 |
shodan host IP | Host details | 0 |
shodan count QUERY | Result count | 0 |
shodan search QUERY | Basic search | 0* |
shodan download FILE QUERY | Save results | 1/100 results |
shodan parse FILE | Extract data | 0 |
shodan stats QUERY | Statistics | 1 |
shodan scan submit IP | On-demand scan | 1/IP |
shodan honeyscore IP | Honeypot check | 0 |
*Filters consume 1 credit per query
Common Search Queries
| Purpose | Query |
|---|
| Find webcams | webcam has_screenshot:true |
| MongoDB databases | product:mongodb |
| Redis servers | product:redis |
| Elasticsearch | product:elastic port:9200 |
| Default passwords | "default password" |
| Vulnerable RDP | port:3389 vuln:CVE-2019-0708 |
| Industrial systems | port:502 modbus |
| Cisco devices | product:cisco |
| Open VNC | port:5900 authentication disabled |
| Exposed FTP | port:21 anonymous |
| WordPress sites | http.component:wordpress |
| Printers | "HP-ChaiSOE" port:80 |
| Cameras (RTSP) | port:554 has_screenshot:true |
| Jenkins servers | X-Jenkins port:8080 |
| Docker APIs | port:2375 product:docker |
Useful Filter Combinations
| Scenario | Query |
|---|
| Target org recon | org:"Company Name" |
| Domain enumeration | hostname:example.com |
| Network range scan | net:192.168.0.0/24 |
| SSL cert search | ssl.cert.subject.cn:*.target.com |
| Vulnerable servers | vuln:CVE-2021-44228 country:US |
| Exposed admin panels | http.title:"admin" port:443 |
| Database exposure | port:3306,5432,27017,6379 |
Credit System
| Action | Credit Type | Cost |
|---|
| Basic search | Query | 0 (no filters) |
| Filtered search | Query | 1 |
| Download 100 results | Query | 1 |
| Generate report | Query | 1 |
| Scan 1 IP | Scan | 1 |
| Network monitoring | Monitored IPs | Depends on plan |
Constraints and Limitations
Operational Boundaries
- Rate limited to 1 request per second
- Scan results not immediate (asynchronous)
- Cannot re-scan same IP within 24 hours (non-Enterprise)
- Free accounts have limited credits
- Some data requires paid subscription
Data Freshness
- Shodan crawls continuously but data may be days/weeks old
- On-demand scans provide current data but cost credits
- Historical data available with paid plans
Legal Requirements
- Only perform reconnaissance on authorized targets
- Passive reconnaissance generally legal but verify jurisdiction
- Active scanning (scan submit) requires authorization
- Document all reconnaissance activities
Examples
Example 1: Organization Reconnaissance
shodan search 'org:"Target Company"'
shodan stats --facets port,product,country 'org:"Target Company"'
shodan download target_data.json.gz 'org:"Target Company"'
shodan parse --fields ip_str,port,product target_data.json.gz
Example 2: Vulnerable Service Discovery
shodan search 'vuln:CVE-2019-0708 country:US'
shodan search 'product:elastic port:9200 -authentication'
shodan search 'vuln:CVE-2021-44228'
Example 3: IoT Device Discovery
shodan search 'webcam has_screenshot:true country:US'
shodan search 'port:502 product:modbus'
shodan search '"HP-ChaiSOE" port:80'
shodan search 'product:nest'
Example 4: SSL/TLS Certificate Analysis
shodan search 'ssl.cert.subject.cn:*.example.com'
shodan search 'ssl.cert.expired:true org:"Company"'
shodan search 'ssl.cert.issuer.cn:self-signed'
Example 5: Python Automation Script
import shodan
import json
API_KEY = 'YOUR_API_KEY'
api = shodan.Shodan(API_KEY)
def recon_organization(org_name):
"""Perform reconnaissance on an organization"""
try:
query = f'org:"{org_name}"'
results = api.search(query)
print(f"[*] Found {results['total']} hosts for {org_name}")
hosts = {}
for result in results['matches']:
ip = result['ip_str']
port = result['port']
product = result.get('product', 'unknown')
if ip not in hosts:
hosts[ip] = []
hosts[ip].append({'port': port, 'product': product})
for ip, services in hosts.items():
print(f"\n[+] {ip}")
for svc in services:
print(f" - {svc['port']}/tcp ({svc['product']})")
return hosts
except shodan.APIError as e:
print(f"Error: {e}")
return None
if __name__ == '__main__':
recon_organization("Target Company")
Example 6: Network Range Assessment
shodan search 'net:192.168.1.0/24'
shodan stats --facets port 'net:192.168.1.0/24'
shodan search 'net:192.168.1.0/24 vuln:CVE-2021-44228'
shodan download network_scan.json.gz 'net:192.168.1.0/24'
Troubleshooting
| Issue | Cause | Solution |
|---|
| No API Key Configured | Key not initialized | Run shodan init YOUR_API_KEY then verify with shodan info |
| Query Credits Exhausted | Monthly credits consumed | Use credit-free queries (no filters), wait for reset, or upgrade |
| Host Recently Crawled | Cannot re-scan IP within 24h | Use shodan host IP for existing data, or wait 24 hours |
| Rate Limit Exceeded | >1 request/second | Add time.sleep(1) between API requests |
| Empty Search Results | Too specific or syntax error | Use quotes for phrases: 'org:"Company Name"'; broaden criteria |
| Downloaded File Won't Parse | Corrupted or wrong format | Verify with gunzip -t file.gz, re-download with --limit |