Skip to main content

Guide to Using the Search Function on urldna.io


The search function on urldna.io allows you to find specific information about URLs or domains using either a direct search or a custom query language. This guide will walk you through the process of using the search function effectively.

You can click on the magnifying glass icon next to each attribute to search for that value.

To perform a direct search, simply type the word that you want to search directly into the search bar.

Example: example will find all the submitted urls that cointain example.

Custom Query Language

The Custom Query Language allows you to perform more specific searches using attributes, operators, and values. The basic structure of a Custom Query Language search is: ATTRIBUTE OPERATOR VALUE

Available Attributes

The following attributes can be used in the Custom Query Language searches:

  • domain: Scan a domain
  • submitted_url: Submitted URL
  • category: Page category
  • target_url: Redirected URL
  • device: Device type (MOBILE or DESKTOP)
  • user_agent: Web browser user agent
  • origin: Search origin (USER or API)
  • title: Page title
  • ip: IP address
  • org: Organization
  • isp: Internet Service Provider
  • asn: ASN (Autonomous System Number)
  • city: City
  • country_code: Country Code
  • favicon: Favicon hash
  • screenshot: Screenshot hash
  • serial_number: Certificate serial number
  • issuer: Certificate issuer
  • subject: Certificate subject
  • malicious: Flagged as malicious (1 for malicious, 0 for valid)
  • technology: Technology used in the website
  • cookie_name: Cookie name
  • cookie_value: Cookie value

Available Operators

The following operators can be used in the Custom Query Language searches:

  • =: Equal to
  • !=: Not equal to
  • LIKE: Contains
  • !LIKE: Does not contain

Combining Operators

You can combine multiple operators in a single search using the AND keyword.

Example: title LIKE PayPal AND domain != paypal

Examples

Here are a few examples to illustrate how to use the Custom Query Language:

  • Search for domains containing "google": domain LIKE google
  • Search for titles containing "PayPal" but not domains containing "paypal": title LIKE PayPal AND domain !LIKE paypal
  • Search for websites flagged as malicious: malicious = 1
  • Search for websites with a specific favicon hash: favicon LIKE d40750994fe739d8

By following this guide, you will be able to effectively use the search function on urldna.io to find specific information about URLs or domains using either a direct search or the Custom Query Language.


Photo by FLY:D on Unsplash

Comments

Popular posts from this blog

Unleash the Power of Brand Monitoring

We're thrilled to unveil our latest feature that puts you in control – brand monitoring! This groundbreaking function is designed to empower our registered users to keep a vigilant eye on their brand effortlessly. The best part? It's absolutely free for all our registered members. Start your monitoring today on https://urldna.io How It Works: Monitoring your brand is now a breeze with just a few simple steps. All you need are a few essential elements: Rule Name: Give your monitoring rule a catchy and memorable name. For instance, let's create a rule for the urlDNA brand – "urlDNA Monitoring Magic." Brand Assets: Provide us with the visual identity of your brand. Upload screenshots, logos, favicons – everything that defines your brand's unique essence. Watch as our advanced algorithm scours our extensive database to pinpoint occurrences related to your brand. Tags: Supercharge your monitoring by adding relevant keywords. For our urlDNA example, include "ur

Unmasking phishing pages: the power of favicon hunting

Phishing attacks continue to be a pervasive threat in the realm of information security, targeting individuals and organizations alike. As specialized professionals in the field, it is essential to stay updated on the latest phishing trends and techniques. This article presents an overview of the most abused favicons in the   urldna   database. understanding favicons as phishing indicators: Favicons, the small icons associated with websites, play a crucial role in phishing detection. Attackers often replicate legitimate favicons to create deceptive phishing pages, aiming to trick users into believing they are interacting with trusted websites. By familiarizing ourselves with commonly abused favicons, we can enhance our ability to identify and combat phishing attempts effectively. urldna most abused favicons: charting phishing trends: Based on an analysis of recent phishing campaigns, the following chart showcases the  top 10  abused favicons in our databases: Favicon Abused Brand Phash