Skip to main content

Guide to Using the Search Function on

The search function on allows you to find specific information about URLs or domains using either a direct search or a custom query language. This guide will walk you through the process of using the search function effectively.

You can click on the magnifying glass icon next to each attribute to search for that value.

To perform a direct search, simply type the word that you want to search directly into the search bar.

Example: example will find all the submitted urls that cointain example.

Custom Query Language

The Custom Query Language allows you to perform more specific searches using attributes, operators, and values. The basic structure of a Custom Query Language search is: ATTRIBUTE OPERATOR VALUE

Available Attributes

The following attributes can be used in the Custom Query Language searches:

  • domain: Scan a domain
  • submitted_url: Submitted URL
  • category: Page category
  • target_url: Redirected URL
  • device: Device type (MOBILE or DESKTOP)
  • user_agent: Web browser user agent
  • origin: Search origin (USER or API)
  • title: Page title
  • ip: IP address
  • org: Organization
  • isp: Internet Service Provider
  • asn: ASN (Autonomous System Number)
  • city: City
  • country_code: Country Code
  • favicon: Favicon hash
  • screenshot: Screenshot hash
  • serial_number: Certificate serial number
  • issuer: Certificate issuer
  • subject: Certificate subject
  • malicious: Flagged as malicious (1 for malicious, 0 for valid)
  • technology: Technology used in the website
  • cookie_name: Cookie name
  • cookie_value: Cookie value

Available Operators

The following operators can be used in the Custom Query Language searches:

  • =: Equal to
  • !=: Not equal to
  • LIKE: Contains
  • !LIKE: Does not contain

Combining Operators

You can combine multiple operators in a single search using the AND keyword.

Example: title LIKE PayPal AND domain != paypal


Here are a few examples to illustrate how to use the Custom Query Language:

  • Search for domains containing "google": domain LIKE google
  • Search for titles containing "PayPal" but not domains containing "paypal": title LIKE PayPal AND domain !LIKE paypal
  • Search for websites flagged as malicious: malicious = 1
  • Search for websites with a specific favicon hash: favicon LIKE d40750994fe739d8

By following this guide, you will be able to effectively use the search function on to find specific information about URLs or domains using either a direct search or the Custom Query Language.

Photo by FLY:D on Unsplash


Popular posts from this blog

Unmasking phishing pages: the power of favicon hunting

Phishing attacks continue to be a pervasive threat in the realm of information security, targeting individuals and organizations alike. As specialized professionals in the field, it is essential to stay updated on the latest phishing trends and techniques. This article presents an overview of the most abused favicons in the   urldna   database. understanding favicons as phishing indicators: Favicons, the small icons associated with websites, play a crucial role in phishing detection. Attackers often replicate legitimate favicons to create deceptive phishing pages, aiming to trick users into believing they are interacting with trusted websites. By familiarizing ourselves with commonly abused favicons, we can enhance our ability to identify and combat phishing attempts effectively. urldna most abused favicons: charting phishing trends: Based on an analysis of recent phishing campaigns, the following chart showcases the  top 10  abused favicons in our databases: Favicon Abused Brand Phash