Mapping the Internet
A cybersecurity blog from the team behind Netlas.
The Largest Data Breach Ever? How Hackers Stole 16 Billion Credentials
Hackers leaked 16B credentials from malware logs and past breaches. Learn what was stolen, who’s at risk, and how to check if your data is exposed.
July 9, 2025
→AI-Driven Attack Surface Discovery
Can large language models assist in attack surface mapping? We put them to the test using the Netlas Discovery API in a hands-on classification experiment.
June 20, 2025
→Complete Guide on Attack Surface Discovery
A comprehensive approach to mapping your attack surface, helping you identify vulnerabilities, assess risks, and implement effective security measures.
October 9, 2024
→
Nmap Cheat Sheet: Top 10 Scan Techiques
A practical cheat sheet explaining the top 10 Nmap scan techniques — how they work, when to use them, and how to configure scan scope, speed, and output.
June 19, 2025
→Google Dorking in Cybersecurity: Techniques for OSINT & Pentesting
Explore Google dorking techniques to boost your OSINT and penetration testing. Learn automation tricks, best practices, and top analogues.
June 16, 2025
→DNS History: Exploring Your Domains Past by Inspecting DNS Trails
Discover how historical DNS records reveal domain changes, security trends, and competitive insights to strengthen your online presence.
June 11, 2025
→
Important Updates, Sales & Promos
Email newsletterOnce a month
Please, sign in to manage newsletter subscription
Netlas vs Urlscan: Tools Comparison
At first glance, Netlas and Urlscan seem similar, but their core functions and use cases differ greatly. Discover which tool fits your needs.
June 5, 2025
→Netlas vs IPinfo: Tools Comparison
Explore the features, strengths, pricing, and automation options of Netlas and IPinfo to choose the best IP intelligence tool for your cybersecurity or research needs.
May 20, 2025
→Netlas vs ZoomEye: Platforms Comparison
Compare IoT search engines Netlas and Zoomeye, highlighting their features, strengths, and ideal use cases for security research.
March 21, 2025
→
Using Subfinder with Netlas Module
Instructions for using the Netlas module integrated into Subfinder from ProjectDiscovery.
February 7, 2025
→Netlas Chrome and Firefox Extensions
The article is devoted to installing and using Netlas browser plugins for Chrome and Firefox.
February 5, 2025
→Using Maltego with Netlas Module
This article is about installing and using the Netlas module inside the Maltego application.
January 20, 2025
→
All posts
July 20, 2025
An Expert’s View on DNSSEC: Pros, Cons, and When to Implement
July 18, 2025
Hannibal Stealer vs. Browser Security
July 9, 2025
The Largest Data Breach Ever? How Hackers Stole 16 Billion Credentials
July 7, 2025
DNS Cache Poisoning – Is It Still Relevant?
July 3, 2025
OWASP: Top 10 Web Application Security Risks
June 25, 2025
Modern Cybercrime: Who’s Behind It and Who’s Stopping It
June 25, 2025
theHarvester: a Classic Open Source Intelligence Tool
June 20, 2025
AI-Driven Attack Surface Discovery
June 19, 2025
Nmap Cheat Sheet: Top 10 Scan Techiques
June 18, 2025
Best Nmap Alternatives
June 16, 2025
Google Dorking in Cybersecurity: Techniques for OSINT & Pentesting
June 14, 2025
Domain Recon: Must-Know Tools for Security Professionals