Mapping the Internet
A cybersecurity blog from the team behind Netlas.
The $1.5B Bybit Hack & How OSINT Led to Its Attribution
Insights on the record-breaking Lazarus heist: how social engineering, AWS token hijacking, and Safe{Wallet} code injection enabled the Bybit hack.
August 6, 2025
→Hannibal Stealer: A Deep Technical Analysis
In-depth analysis of Hannibal Stealer’s evolution, attack chain, credential theft, and data exfiltration techniques based on leaked code.
August 1, 2025
→Proactive Threat Hunting: Techniques to Identify Malicious Infrastructure
Learn how to hunt malicious infrastructure using SSL certs, favicons, HTTP headers, JARM, and IoT search engines like Netlas, Shodan, and Censys.
July 30, 2025
→
Nmap Cheat Sheet: Top 10 Scan Techiques
A practical cheat sheet explaining the top 10 Nmap scan techniques — how they work, when to use them, and how to configure scan scope, speed, and output.
June 19, 2025
→Google Dorking in Cybersecurity: Techniques for OSINT & Pentesting
Explore Google dorking techniques to boost your OSINT and penetration testing. Learn automation tricks, best practices, and top analogues.
June 16, 2025
→DNS History: Exploring Your Domains Past by Inspecting DNS Trails
Discover how historical DNS records reveal domain changes, security trends, and competitive insights to strengthen your online presence.
June 11, 2025
→
Important Updates, Sales & Promos
Email newsletterOnce a month
Please, sign in to manage newsletter subscription
Netlas vs Urlscan: Tools Comparison
At first glance, Netlas and Urlscan seem similar, but their core functions and use cases differ greatly. Discover which tool fits your needs.
June 5, 2025
→Netlas vs IPinfo: Tools Comparison
Explore the features, strengths, pricing, and automation options of Netlas and IPinfo to choose the best IP intelligence tool for your cybersecurity or research needs.
May 20, 2025
→Netlas vs ZoomEye: Platforms Comparison
Compare IoT search engines Netlas and Zoomeye, highlighting their features, strengths, and ideal use cases for security research.
March 21, 2025
→
Using Subfinder with Netlas Module
Instructions for using the Netlas module integrated into Subfinder from ProjectDiscovery.
February 7, 2025
→Netlas Chrome and Firefox Extensions
The article is devoted to installing and using Netlas browser plugins for Chrome and Firefox.
February 5, 2025
→Using Maltego with Netlas Module
This article is about installing and using the Netlas module inside the Maltego application.
January 20, 2025
→
All posts
August 8, 2025
I, Robot + NIST AI RMF = Complete Guide on Preventing Robot Rebellion
August 6, 2025
The $1.5B Bybit Hack & How OSINT Led to Its Attribution
August 1, 2025
Hannibal Stealer: A Deep Technical Analysis
July 30, 2025
Proactive Threat Hunting: Techniques to Identify Malicious Infrastructure
July 25, 2025
The Pyramid of Pain: Beyond the Basics
July 23, 2025
SOCMINT: Intelligence in the Social Media Era
July 20, 2025
An Expert’s View on DNSSEC: Pros, Cons, and When to Implement
July 18, 2025
Hannibal Stealer vs. Browser Security
July 9, 2025
The Largest Data Breach Ever? How Hackers Stole 16 Billion Credentials
July 7, 2025
DNS Cache Poisoning – Is It Still Relevant?
July 3, 2025
OWASP: Top 10 Web Application Security Risks
June 25, 2025
Modern Cybercrime: Who’s Behind It and Who’s Stopping It