Netlas Netlas
  • Features
  • Use-cases
  • Resources
  • Pricing
Contact sales
Log in
Share
Twitter
LinkedIn
Telegram
Reddit
Get started
Subscribe
  • Subscribe via email
  • Follow on X
  • Follow on Telegram
  • Follow on Discord
  • Follow on Medium
  • Subscribe via RSS
Search Tools
  • IoT Search Engine
  • DNS Lookup
  • IPwhois
    IP WHOIS Lookup
  • Dwhois
    Domain WHOIS Lookup
  • SSL Certificates
EASM Tools
  • Attack Surface Discovery Tool
  • Private Scanner
Data Access
  • Datastore
  • Netlas API
Compare: Netlas and ...
  • Shodan Shodan
    Shodan
  • Censys Censys
    Censys
  • Fofa Fofa
    Fofa
  • Zoomeye Zoomeye
    Zoomeye
  • URLscan URLscan
    URLscan
  • IPinfo IPinfo
    IPinfo
Security Analysis
  • Attack surface discovery
  • Non-intrusive security assessment
  • OSINT investigations
  • Uncover shadow IT and phishing threats
Security Research
  • Vulnerable devices search
  • Security of IoT & industrial devices
  • Reputation scoring
  • Threat hunting
Featured Reads
  • June 20, 2025

    AI-Driven Attack Surface Discovery

  • October 9, 2024

    Complete Guide on Attack Surface Discovery

  • August 30, 2024

    Using DNS History in Cybersecurity

Learn
  • Documentation Netlas usage, API specification, SDK & CLI installation
  • ★ Mapping the Internet A cybersecurity blog from the team behind Netlas
  • Netlas Cookbook An ultimate guide on how to make the most of Netlas.io
  • Featured Queries Search queries for IoT, routers, IP cameras & more
  • Scripts & Code Samples Useful scripts to create you own automations
Misc
  • Legal Stuff Netlas LLC, Terms & Conditions, Privacy and other policies
  • Status Page Live Status and Incident Updates
  • About Page App version and list of public data indices
Connect

Newest CVE, Featured Searches, Updates & Announcements

1-2 posts per week

Important Updates, Sales & Promos

Email newsletter

Once a month
Please, sign in to manage newsletter subscription

  • Features Data collections,
    tools & features,
    Interfaces
  • Use-cases Penetration testing,
    attack surface management,
    and other cases
  • Resources
  • Pricing

POSTS TAGGED WITH

Malware

← Back to all posts

  • The Largest Data Breach Ever? How Hackers Stole 16 Billion Credentials

    Hackers leaked 16B credentials from malware logs and past breaches. Learn what was stolen, who’s at risk, and how to check if your data is exposed.

    July 9, 2025

    →
© 2025, Netlas LLC.
  • Legal Stuff
  • Status Page
  • About Netlas