Dorks for shodan.io website. Taken from publicly available sources.
Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters.
Find devices in a particular city.
city:"Bangalore"
Find devices in a particular country.
country:"IN"
Find devices by giving geographical coordinates.
geo:"56.913055,118.250862"
Find devices matching the hostname.
server: "gws" hostname:"google"
Find devices based on an IP address or /x CIDR.
net:210.214.0.0/16
Find devices based on operating system.
os:"windows 7"
Find devices based on open ports.
proftpd port:21
Find devices before or after between a given time.
apache after:22/02/2009 before:14/3/2010
Find Citrix Gateway.
title:"citrix gateway"
Helps to find the cleartext wifi passwords in Shodan.
html:"def_wirelesspassword"
With username:admin and password: :P
NETSurveillance uc-httpd
No auth required to access CLI terminal.
"privileged command" GET
But may contain secondary windows auth
"\x03\x00\x00\x0b\x06\xd0\x00\x00\x124\x00"
It may give info about mongo db servers and dashboard
"MongoDB Server Information" port:27017 -authentication
Complete Anon access
"220" "230 Login successful." port:21
Jenkins Unrestricted Dashboard
x-jenkins 200
Routers which got compromised
hacked-router-help-sos
May allow for ATM Access availability
NCR Port:"161"
NO password required for telnet access.
port:23 console gateway
The wp-config.php if accessed can give out the database credentials.
http.html:"* The wp-config.php creation script uses this file"
Find sites hiring.
"X-Recruiting:"
Find android root bridges with port 5555.
"Android Debug Bridge" "Device" port:5555
Shows the miners running ETH.
"ETH - Total speed"
Helps to find the charging status of tesla powerpack.
http.title:"Tesla PowerPack System" http.component:"d3" -ga3ca4f2
Please create a pull request if you want to contribute.