
Thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TVs, Fridges, Webcams, Traffic Lights, etc).
https://github.com/rly0nheart/thelordseye
Prerequisites
- shodan.io API Key
Get it here
Installation
Clone repository:
$ git clone https://github.com/rlyonheart/thelordseye.git
$ cd thelordseye
$ pip install -r requirements.txt
Getting started
$ chmod +x eye
$ ./eye --auth [your-shodan-api-key]
Your API key will be stored in a hidden .auth file
Optional Arguments
Flag | MetaVar | Usage |
---|---|---|
-a/--auth |
API key | api authentication with a valid shodan.io api key. |
-q/--query |
QUERY | search query |
-i/--ip |
IP | return information relating to the specified IP address |
-o/--output |
FILENAME | write output to a specified file (will not work with -r/--raw) |
-r/--raw |
return output in raw json format (also returns more detailed information) | |
-v/--verbose |
enable verbosity | |
-u/--update |
fetch program's latest updates | |
--version |
show program's version number and exit |
Disclaimer
This tool was developed sorely for educational purposes and should not be used in environments without legal authorization. Therefore, the author shall not be responsible for the damages that might be done with it.
LICENSE
About author
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Subscribe
0 Comments