Discover, scan and monitor any online assets
With Netlas, it takes just a few minutes to build a scope and investigate it
Thousands of IT security experts use Netlas.io as a reliable source of information for their day‑to‑day operations
![DefendeEdge logo](/images/logos/defendedge_logo-l_hu5b0f71851f3050b1637b1f9680fa71a3_4769_214x73_resize_q80_h2_lanczos_3.webp)
![DefendeEdge logo](/images/logos/defendedge_logo-d_hu253b322251d3c73d18b4125324389d76_3468_320x73_resize_q80_h2_lanczos_3.webp)
![Hacket logo](/images/logos/hacket_logo-l_hu963b812740e7bcfda5a57b00edadba80_5604_320x44_resize_q80_h2_lanczos_3.webp)
![Hacket logo](/images/logos/hacket_logo-d_hu4e48295449f82ac8840de96adaa22dd2_2098_320x44_resize_q80_h2_lanczos_3.webp)
![Cybermaxx logo](/images/logos/cybermaxx_logo-l_hu4e82b35871a2b9734e939e8d26e4f713_5458_411x72_resize_q80_h2_lanczos_3.webp)
![Cybermaxx logo](/images/logos/cybermaxx_logo-d_hu112d816baec5233f681760523e8eed6c_6839_411x72_resize_q80_h2_lanczos_3.webp)
![Logically logo](/images/logos/logically_logo-l_huc9fea2b997c99ebf0deaa75cdd949afe_34184_220x0_resize_lanczos_3.png)
![Logically logo](/images/logos/logically_logo-d_huc9fea2b997c99ebf0deaa75cdd949afe_34536_220x0_resize_lanczos_3.png)
![Specterops logo](/images/logos/specterops_logo-l_huaf6655e332f6cd0b73b6bad38ab8ece6_4424_220x0_resize_lanczos_3.png)
![Specterops logo](/images/logos/specterops_logo-d_hu51b2df1bdea8ae4b7e1873407214cc75_4476_320x77_resize_q80_h2_lanczos_3.webp)
🙌 @netlas_io A valuable tool and a fantastic product that’s making life easier for pentesters and bug hunters!
🐞🔍 With its advanced reconnaissance and automation features, Netlas is a game-changer for identifying security threats and vulnerabilities.
![Begin n Bounty](/images/testimonials/begin_n_bounty_hu9a62e3d423fd962638bdaaf7e1ce2741_3716_80x80_resize_q80_h2_lanczos.webp)
Begin n Bounty
Practical bug bounty tips channel
Today I tested @Netlas_io (since I needed a replacement for @securitytrails).
Its worth the money — some of you know I am heavily into automation, data quality is important. When it comes to price/performance ratio — Netlas is currently the way to go.
![Damian Strobel](/images/testimonials/damian_strobel_hu03d67a2bb15f6ad2f05e505d7d0cb51f_10297_80x80_resize_q80_h2_lanczos.webp)
Damian Strobel
Founder of dsecured.com
By aiding in the hunt for new cyber threats, they’re not just providing a service, but fostering a community-driven approach to cybersecurity.
Such partnerships amplify the importance of collective vigilance and shared knowledge in combating evolving digital threats.
![Hieu Ngo (Hieupc)](/images/testimonials/hieu_ngo_hudcd28685ab538a06242f882a58d86034_240169_80x80_resize_q80_h2_lanczos_3.webp)
Hieu Ngo (Hieupc)
Threat hunter at NCSC Viet Nam
Here is the best alternative to #shodan or #censys: @Netlas_io I got to know about it yesterday and it’s really awesome.
![N$🍥](/images/testimonials/ns_hub70ebfc2eef1be3e3c61ef2e4b150651_776_80x80_resize_q80_h2_lanczos.webp)
N$🍥
Bug hunter, ethical hacker
I recently started using @Netlas_io I’m really enjoying the tool, it’s fast, and it brings fascinating things!
![👑 OFJAAAH 👑](/images/testimonials/ofjaaah_hu7555e855f812f5810673bb430091c8fd_34072_80x80_resize_q80_h2_lanczos.webp)
👑 OFJAAAH 👑
Bug hunter, ethical hacker
I’m loving Netlas.io!
So much great tools for pentesting.
![Chiagoziem Mba-Oji](/images/testimonials/chiagoziem_hucc67a15da54c0ef7df5c0fdc186dec8e_17425_80x80_resize_q80_h2_lanczos.webp)
Chiagoziem Mba-Oji
Security vulnerability researcher
Best-in-Class OSINT Apps
Tools for reconnaissance, non-intrusive security assessment, and security‑related research
![Image alt text](/images/features/netlas-data-sources-l_hu595ac8b06c4157e93c7aee9ffdf5950b_254285_1110x0_resize_lanczos_3.png)
![Image alt text](/images/features/netlas-data-sources-d_hu1e3c0b7ff7f6be22fd7941e4717d7a2b_256305_1110x0_resize_lanczos_3.png)
Non-intrusive Internet Scanner
Netlas.io scans every IPv4 address and crawls every known website and web application utilizing such protocols as HTTP, FTP, SMTP, POP3, IMAP, SMB/CIFS, SSH, Telnet, SQL and others. Collected data is enriched with additional info and available through Netlas.io Search tools.
![Image alt text](/images/features/netlas_search_string-l_hud71595cc8a269454aa73c6356ce62e7c_60175_1110x0_resize_lanczos_3.png)
![Image alt text](/images/features/netlas_search_string-d_hu97076f68dd0b72e368f7824da8aa998a_161897_1110x0_resize_lanczos_3.png)
Powerful Search Engine
There are five general data collections available right now: internet scan results, DNS registry, IP WHOIS, Domain WHOIS and SSL certificates. You can build search queries with different conditions and operators. Try to search using whois fields, GeoIP data, DNS registry data, protocol fields, technology and product names and even vulnerabilities.
![Image alt text](/images/features/netlas_discovery_tool-l_hu60e73a2ad7056b6576c7f2a501203403_226619_1110x0_resize_lanczos_3.png)
![Image alt text](/images/features/netlas_discovery_tool-d_hu99699a78b394a340afc2fb30969ff660_233619_1110x0_resize_lanczos_3.png)
Attack Surface Discovery tool
Start with a single domain or an IP address and build a complete attack surface for your target in a few clicks. Save it, share it, or download it as a list of targets for further scanning. Netlas.io Attack Surface Discovery tool is so easy to use and produces great results!
![Image alt text](/images/features/netlas_data_provider-l_hue8d3272499bdc0f0d0cc4e6b51c44a49_425737_1110x0_resize_lanczos_3.png)
![Image alt text](/images/features/netlas_data_provider-d_hu315dfa45e2bc75dec78938ba859e27dd_377941_1110x0_resize_lanczos_3.png)
Reliable Data Provider
Do you want to use Netlas.io data in your own application or database? It’s easy! Full-REST API is available to every registered user. There is another option: download our bulk data. Check out already generated datasets and let us know if you don’t find the data you are looking for. We will prepare a custom dataset especially for you.
Netlas.io Features
Superior scanning technology and powerful search engine
High Level of Data Coupling
Various pieces of information are already linked together to provide an extended context
Data mining is easier with Netlas.io. There are three main sources of information used for scan results enrichment. These are whois databases, DNS records and SSL certificates. Netlas.io provides interfaces for working with these sources directly and for working with already enriched scan results.
![Netlas Responses search document example](/images/highlights/netlas_document-l_hu18c2391ee7fcb9b5d98baf317e142250_173750_1110x0_resize_lanczos_3.png)
![Netlas Responses search document example](/images/highlights/netlas_document-d_hu8642ac76cf5c83517e30db4f9e9b6ff1_165771_1110x0_resize_lanczos_3.png)
Complex Queries
Use wildcards, regexp, fuzzy & proximity searches
Data mining is easier with Netlas.io. There are three main sources of information used for scan results enrichment. These are whois databases, DNS records and SSL certificates. Netlas.io provides interfaces for working with these sources directly and for working with already enriched scan results.
![Netlas complex query sample](/images/highlights/netlas_query_language-l_hu9808ffb4bf8437f608db3005ab97104f_71499_1110x0_resize_lanczos_3.png)
![Netlas complex query sample](/images/highlights/netlas_query_language-d_hu358cd32ddd551d41f7e77bb0e3227052_232925_1110x0_resize_lanczos_3.png)
Queries with Protocol Fields
Queries that are more specific lead to results that are more accurate
Netlas.io search engine has advanced support of the most common network protocols. It means that host response fields are available as search query parameters. The mapping (fields available to search) consists of more than 10,000 fields. It’s increasing continuously with each new protocol supported.
Please, take a moment to read through the help section of the application to understand the search capabilities.
![Using protocol fields with Netlas Responses search](/images/highlights/netlas_protocols_search-l_hu46bced71a26ff7f4c64795ec4bb7193a_95058_1110x0_resize_lanczos_3.png)
![Using protocol fields with Netlas Responses search](/images/highlights/netlas_protocols_search-d_hu8105acaf1db996f5feac5a2390f1bf35_244801_1110x0_resize_lanczos_3.png)
Global Security Data
Cybersecurity research goes global with Netlas.io
The passive scan method used by Netlas.io identifies products and technologies from about 3 out of 4 host responses. In about a third of cases, the product version is also recognized. Vulnerabilities are identified based on product versions according to the U.S. Government National Vulnerability Database and updated with each new scan. Netlas.io also provides information about exploits availability.
![Vulnerable devices distribution on the world map](/images/highlights/netlas_cve_search-l_hu4ff8aacf0eb74ffbe729a422ac074700_136586_1110x0_resize_lanczos_3.png)
![Vulnerable devices distribution on the world map](/images/highlights/netlas_cve_search-d_hu8cb42da11d68a495b47c3914b400fbb9_316905_1110x0_resize_lanczos_3.png)
Netlas.io Integrations
Fetch Netlas.io data from apps you already use
Made for Automation
You can easily integrate Netlas.io in your own app
Full-REST API
The Netlas web app uses an API that is available to any Netlas user. This means that you can call any function in the web app via the API from any third-party application.
DocumentationNetlas SDK & Examples
Check out the Netlas Github repository. There you will find some Netlas usage examples and an SDK for the Python language. SDK implementations for other languages will come later.
Github RepositoryNetlas API in Swagger UI
The Netlas team welcomes the independent development of Netlas-based tools. These could be anything ranging from simple scripts to complex automation. Netlas API is available in the OpenAPI format.
Interract with Netlas APICommand-Line Friendly
Use Netlas.io to orchestrate your needs. Utilize it in your automation scripts for data search and enrichment
The Netlas Python SDK includes a command-line interface. If you have Python installed, just use the Python package installer to setup the SDK. Once you have completed that step, you can interact with Netlas.io using the command-line.
user@host ~ % netlas
Usage: netlas [OPTIONS] COMMAND [ARGS]...
Options:
-h, --help Show this message and exit.
Commands:
count Calculate count of query results.
download Download data.
host Host (ip or domain) information.
indices Get available data indices.
profile Get user profile data.
savekey Save API key to the local system.
search (query) Search query.
stat Get statistics for query.