- 06 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
shodan 1.3.0
- Updated on 06 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
shodan - 1.3.0
tags: python | cli | ip | enrichment | adaptive card
Table of Contents
Description
Integration with Shodan is created to support CDC users by providing the enrichments for specific IP address to get all information about the IP such as which ports the IP has open, what SSL/ TLS versions it supports, which country it's located in, what web technologies the website uses, DNS, domain, vulnerabilities and more; which enable CDC users to take an informed decision in Incident response.Shodan provides a comprehensive IP enrichment across the Internet by crawling the entire Internet every week to give you a truly global perspective. We use custom adaptive cards to display the data such as open ports, vulnerabilities, web technologies and more in a meaningful intuitive GUI, to facilitate easy understanding of complex enriched data about the IP.
Integration Type: | Threat Intelligence Enrichment |
Information enriched: | Vulnerabilities, Open ports, web technologies and other details related to the IP Address |
API Supported: | API V1.0.0 |
Input: | IP Address to be enriched |
Output: | Detailed enrichment consisting of IP details, vulnerabilities, web technologies and more |
Customer Configuration
No Customer Configuration
CDC Command Lines
* **get_ip_details_cli**
Command line interface of CDC, of get-ip-details in CDC message thread.
Option | Type | Description | Required |
---|---|---|---|
ip | string | IP to search. | True |
minify | boolean | True to only return the list of ports and the general host information, default False. | False |
Workflows
* **post_get_ip_details**
Post get-ip-details in CDC by ID of incident/message/chanel.
Rules
No rules
Sensors
No sensors
Triggers
No triggers