dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,860
- Solutions
- 4
- Reputation
- 27
- Reaction score
- 45,546
- Points
- 1,813
- Credits
- 55,340
7 Years of Service
56%


Disclaimer: This content is for research and ethical testing only. Accessing or interacting with databases without explicit permission is illegal and unethical.
This section focuses on search filters to uncover open, misconfigured, or exposed database services indexed by Shodan. These often contain sensitive data or offer administrative access without credentials.

"product:MySQL"
mysql port:"3306"

"product:MongoDB"
mongodb port:27017
"MongoDB Server Information" port:27017 -authentication
"Set-Cookie: mongo-express=" "200 OK"

port:9200 json
port:9200 all:elastic
port:9200 all:"elastic indices"
kibana content-length:217

"product:Redis"
"product:Redis key-value store"

"product:Memcached"

"product:CouchDB"
port:"5984" "Server: CouchDB/2.1.0"

"port:5432 PostgreSQL"

"product:Cassandra"

"port:8087 Riak"

http.title:"Index of /" http.html:".pem"

onion-location
Next: Part 3 will cover Industrial Control Systems (ICS/SCADA), Electric Infrastructure, Telnet Devices, Smart Homes, and Maritime/Voting/Medical equipment.
Join the thread:
Have you found unprotected databases in the wild? Share sanitized findings or cool tricks using these queries.
Last edited: