Skip to content

Responses Data Collection

This data collection consists of Internet crawling results. Netlas' non-intrusive scanners continuously scan every domain and host currently on the Internet and saves their responses together with some additional information to this data collection.

Documents in this collection include the following:

  • The full server response that was requested by the IP
  • The full server response that was requested by domain (http/https)
  • An SSL certificate that was included in the host response
  • Favicon information (http/https)
  • Application and version detection results
  • Additional data (ip whois, geo location, asn, fqdn, CVE, and other information)

For the http/https protocol, Netlas provides the first server response (GET request for “/”) and the final redirection result.

Ports and Protocols

Port, prot4, prot7 & protocol fields provides several ways to set search criteria for responses search. First of all, you can use the port field to indicate a port or an interval.

  • Examples:*
port:[1000 TO 10000]

Use the prot4 field to filter out services using TCP or UDP as transport.


prot4:udp AND port:161

The prot7 field is intended for filtering by OSI model Layer 7 protocols (an application layer protocols), such as HTTP, FTP, IMAP, SMB and others. The protocol field is basically the same as prot7 except for the differences between protocol versions.


  • Prot7 field can take values http, smtp, pop3 and so on.
  • Protocol field can take values http, https, elasticserach (based on http), smtp, smtps, pop3, pop3s, pop3startls.

The search query protocol:(t3 OR t3s) returns the same as prot7:t3.


protocol:(pop3s OR pop3starttls)
prot7:ssh AND NOT port:22

Queries with Protocol Fields

Netlas responses search engine has advanced support for the most common network protocols, such as HTTP, FTP, SSH, email protocols, database protocols and others. It means that host response fields are available as search query parameters. You can find a list of supported protocols on the mapping panel (fields available to search) under the "Protocols" section.

Available fields are differs depending on the protocol. For some protocols (such as IMAP or T3) only the banner field is available. In other cases, there are many specific fields.



The Netlas team extends application protocols support from time to time. You can post a request to add support for the protocol you need via the feedback form.

Netlas parses and saves the first 100Kbytes of each response during the scan. In the vast majority of cases, this is enough to save a full server response. HTML pages are stored in the http.body field. A full-text search and regex are available for this field. So it is possible to search across the entire body of a web page.

Other useful fields are http.headers and http.unknown_headers. The http.headers field points to 1000 of the most used HTTP headers. Other headers are stored as key-value pairs in the unknown_headers field. Use mapping or autosuggestion to find the header you need (start typing a header name after http.headers. in the search bar).

Please note:

All '-' characters (dashes) in header names are replaced with the '_' characters due to our database limitation. So use http.headers.content_security_policy instead of http.headers.content-security-policy

Some other interesting fields in the http web response:

  • status_code – web server response status code.
  • content_length – html content length (if Netlas does not encode the page, the encoding size will be -1).
  • body_sha256 – body hash, that can be used for example to find page copies.
  • favicon.hash_sha256 – favicon sha256 hash.
  • favicon.last_modified – last-modified header.
  • favicon.image – favicon image encoded with base64.
  • favicon.path or favicon.uri – favicon path (full uri path and only web path).

The Favicon search feature is extremely useful in some cases. For example, sometimes the only way to understand a product version is to use the date in the last-modified favicon header. Use the "Search by favicon" button to upload a favicon file to search by.



  • Web pages with the word “atlassian” in the body section:


  • Web pages with words “camera” and “online”:

    http.body:(camera AND online)

  • Search for Jenkins servers by headers:

    http.headers.x_jenkins:* OR http.headers.x_jenkins_cli2_port:* OR http.headers.x_jenkins_session:*

  • Redirects to another web pages:

    http.status_code:(301 OR 302)

  • Sites with Google's favicon by hash:


Search for Hosts & Services

Scan Results for a Specific Host

The host field is one of the most commonly used filters. It allows searching scan results for a specific host.

As shown in the examples, any host can be requested using an IP address or a domain name. Netlas makes only IP requests for every protocol except HTTP during periodic internet scans. For HTTP-based protocols, sends both types of requests — requests built with IP addresses and with domain names. This allows Netlas to scan multiple web services hosted on the same IP address (virtual sites).

An address used in a request is stored in the host field of any response. So the host field is represented by the IP address if the resource was requested by the IP address, and represented by the domain name in case the resource was requested by the domain name. The type of request is represented by the host_type field. Allowed values are 'ip' and 'domain'.

Compare search results:

  • Responses of the host with IP (all scanned services):


  • The same host requested by domain name (HTTP services only)

  • Web services available by IP address:

    host_type:ip AND http.status_code:200

Vrtual sites scan limit

Due to resources restrictions, Netlas scanners limit the number of virtual sites per IP to 100,000. Because of this limitation, some websites hosted on popular hostings may not be in the search results.

Each service on the internet has its unique resource identifier or URI. This address is stored in the uri filed. Each URI is unique in the Netlas database.

URI search examples:


Be careful with regex within the uri field. Characters used in URIs, like '/' and '.' are reserved as regex operators. To use one of these characters literally, escape it with a preceding backslash. More information about regex usage available here.

URI regex querry examples:

uri:/https?:\/\/files\..*/ AND http.status_code:200

The uri field consists of the protocol field tailored with "://", the host and port fields separated by a colon, and the path field. You can replace a uri query with the combination of these fields.

URI filter replacement examples: port:443 path:"/"
protocol:http path:/.*\/login\/?/

Host, ip and domain fields

There are some differences between fields that look the same. It is important to understand the purpose of these fields to build more accurate search queries.

Purpose of addressing fields:

  • host – IP address or domain name used in a request during the scan.
  • host_type – a type of record in the host field. Allowed values are "ip" and "domain".
  • ip – IP address of the server which sends a response.
  • domain – a list of domain names, associated with the IP address of a response.

Let's try to understand this with an example.

  1. resolves to and (it has two A records) at the moment of creating this manual.

  2. Search query shows responses returned upon requests to

  3. Search query ip:[ TO] returns much more results, including responses from,, and others. It happens because those domains are also resolve to or

  4. Search query is equal to ip:[ TO]. Netlas adds this domain as associated with every response received from and during the scan because resolves to these IP addresses.

A list of associated domains for a response can be found on the Domains tab of any response.

Other examples:

ip:[ TO]
domain:( OR *

Associated domains limit

A list of associated domains is limited to 100 entries per response. In the vast majority of cases, this is enough to save all the associated domains. There is no difference between filtering by the domain field or by the ip field (if you list all the A-records for the domain) in these cases. But some of IP addresses like or are very popular. There are more than 100 domains has A records pointing to these IP addresses.

Try to search the examples below to understand the difference.


  • Concrete service address requested by IP:


  • Responses to requests to IP (all scanned services):


  • Responses to requests to host (HTTP services only):

  • Responses contain domain in the list of associated domains:

  • Responses received from IP


HTTP 301 & 302 redirects

Many web servers make redirections to another address. They use special HTTP responses with codes 301 (Moved Permanently) or 302 (Moved Temporarily). Netlas scanners follow up to 5 HTTP redirects in a row. During this procedure, each response saves as a separate document. Those responses differ in fields host, target, http.status_code and referer (this is not our misspelling, since this is how the HTTP protocol developers wrote the word).

Purpose of fields:

  • target – the initial target of scan, IP or domain. This field contains subfileds target.domain, target.ip and target.type.
  • http.status_code – responses triggering redirects have this field set to 301 or 302.
  • http.headers.location – responses triggering redirects return the target of redirect in this header.
  • host – the IP address or the domain name used in a request. This field is different from the target field for responses captured after redirects.
  • referer – a source of redirect in responses captured after redirects.

The picture bellow shows how Netlas scanners handle redirects.



  • Referer’s for

    referer:* AND

  • Pages with redirects to login page:


While scanning HTTP, Netlas scanners request "/" (root page) by default. Some websites and products (like OWA, Cisco ASA, and others) make a redirect to inner pages like "/login/" or "/owa/login/". The path field can be used to find such responses.


  • Responses from non-root directory:

    NOT path:"/"

  • Responses from pages with the word “login” in the address:


  • Airflow login pages:


Information Fields Search Examples

Tags and Categories

Responses are tagged when it is possible to detect a type of software based on the host response. This feature mostly works with HTTP protocol responses. Tags are grouped into categories. You can build search queries using single tags or entire categories.


  • Search for Atlassian confluence apps:

  • Hosts that are highly likely honeypots:

  • Webmail apps (the whole category):


You can find a list of available tags and categories by clicking on the "Search by tag" button.


Search queries can be constructed in two manners: and tag.some_tag:*. In fact there is no difference. The results will be the same.

Two different ways to shearch Nginx servers by tag:

Netlas detects software versions when possible. So you can try to filter responses by product version.


tag.vbulletin.version:>=4 AND tag.vbulletin.version:<5


Please note a colon before comparison operator!

The geo field contains information about the approximate physical IP location, such as:

  • – Alpha-2 country code.
  • – a city name.
  • geo.continent – a part of the world such as Europe, North America and others.

You can find other fields on the mapping panel which is located on the right part of the search screen.


  • Results of scanning the Europe and Asia internet segments:

    geo.continent:Europe OR geo.continent:Asia

  • Results of scanning the Australian segment of the internet:

  • Responses from hosts in San Francisco (USA):"San Francisco" AND"US"

Another useful search filter is the isp field. Use this field to specify the internet service provider.



Netlas tries to detect the technology, product, and version based on the host response content. CVE information is mapped to the Response collection based on the detected product and version. Netlas stores product information using the CPE format.

Fields in this section:

  • cve.base_score – vulnerability base score version 3 or 2 (for old vulnerability) by
  • cve.description – full vulnerability description.
  • cve.exploit_links – links to third-party tools for testing vulnerabilities.
  • cve.has_exploit – boolean field, true when exploit for this vulnerability is published.
  • – CVE id.
  • cve.severity – vulnerability severity by

Understanding CVE taggin

CVE information is added during the scan. In case any new CVE is published while the scan is in progress (or between two scans), it is likely that some responses will not be marked as vulnerable until the next scan.


  • Search for responses marked with specific CVE id:

  • Search for responses with CVE severity “Critical”:


  • Search for responses with the word “Microsoft” in the CVE description field:


  • Search for potentially vulnerable services with publicly available exploits:


Hit the Biohazard icon under the CVE tab to get exploit links.


BE CAREFUL!!! Do not use if you don't understand what is it.