Web Scanner Datasources

Prev Next

Our Web Scanner feature searches the following datasources:

Datasources Description
Web Scan Raw web and certificate content.
Dark Web Scan Dark web infrastructure from the Tor browser.
Open Directory Scan Open directories and their files.
Banner Scan Non-HTTP services and their banners. For example, SSH and DNS.
WHOIS Scan Domain registration and change information from WHOIS.

Web Scan

Our Web Scan datasource retrieves information from the raw web and certificate content.

Example

Use the Web Scan datasource in Web Scanner to return data about IPs with web servers using PayPal's favicon that are not on PayPal's domain.

Query example:

 favicon_murmur3 = 309020573 AND domain != "http://paypal.com "

Example

You can also use the Web Scan datasource in Web Scanner to return information about IPs with certificates with expiration dates that occur in the next 24 hours.

Query example:

ssl.not_after > "now" AND ssl.not_after < "now+1d"

Dark Web Scan

Our Dark Web Scan datasource retrieves information from dark web infrastructure that is retrieved from the Tor browser.

Example

Use the Dark Web Scan datasource in Web Scanner to return information about dark web websites that reference “paypal” in their title.

Query example:

datasource = ["torscan"] AND htmltitle = "*paypal*"

Example

You can also use the Dark Web Scan datasource in Web Scanner to return information about dark web sites associated with ransomware. For example, leak sites.

Query example:

datasource = ["torscan"] AND htmltitle = "*ransomware*"

Important!: When you run a query in Web Scanner, you can stack Web Scan, Browser Scan, and Dark Web Scan datasources together in pairs or all together. You cannot stack or combine Open Directory Scan, Banner Scan, or WHOIS Scan datasources together.

Example

If you stack Web Scan, Browser Scan, and Dark Web Scan datasources together, you can return information about IPs with server titles that contain “Western Union” across both the surface web and the dark web.

Query example:

datasource = ["browserscan", "webscan", "torscan"] AND htmltitle = "*Western Union*"

Open Directory Scan

Our Open Directory Scan datasource retrieves information from open directories and their files.

Example

Use the Open Directory Scan datasource in Web Scanner to return information about open directories that contain .exe executables that are hosted by Cloudflare ASN 13335.

Query example:

  datasource = ["opendirectory"] AND name = "*exe" AND geoip.asn = 13335

Example

You can also use the Open Directory Scan datasource in Web Scanner to return information about Mimikatz credential dumpers that have been discovered in the last 30 days.

Query example:

datasource = ["opendirectory"] AND name = "mimikatz.exe" AND scan_date >= "now-30d"

Banner Scan

Our Banner Scan datasource retrieves information from non-HTTP services and their banners. For example, SSH and DNS.

Example

Use the Banner Scan datasource in Web Scanner to return information about IPs that run OpenSSH 9.8 on default SSH port 22.

Query example

  datasource = ["services"] AND port = 22 AND banner = "SSH-2.0-OpenSSH_9.8"

Example

You can also use the Banner Scan datasource in Web Scanner to return information about IPs that run PowerDNS on DNS servers hosted on port 53.

Query example:

datasource = ["services"] AND port = 53 AND banner = "*PowerDNS*"

WHOIS Scan

Our WHOIS Scan datasource retrieves information from domain registration and change information from WHOIS.

Example

Use the WHOIS Scan datasource in Web Scanner to return information about domains that are registered through Squarespace with registrants that have not redacted their names.

Example query

datasource = ["whois"] AND registrar = "Squarespace Domains LLC" AND name != "REDACTED FOR PRIVACY"

Example

You can also use the WHOIS Scan datasource in Web Scanner to return information domains that contain “crowdstrike” and are registered by Crowdstrike.

Query example:

datasource = ["whois"] AND domain = "*crowdstrike*" AND organization = "CrowdStrike, Inc."