Malware Hunter: How to find C2 servers with Shodan

Member
Joined
July 8, 2025
Messages
10
Reaction score
1
Points
3
All the links you need in one place - your start for growth and collaboration.

πŸ“ What is Malware Hunter?

Malware Hunter is a specialized scanner from Shodan that searches for botnet command and control (C2) servers on the Internet. As described in the article Deep Dive: Malware Hunter, it works by pretending to be an infected Windows XP computer that sends a C2 handshake to every IP address on the Internet. If the server responds, it is C2, and Shodan tags it with a "malware" tag. This allows it to find malicious servers even if they are not yet used in attacks

πŸ” How does it work?

Malware Hunter does not just scan ports, it imitates the behavior of an infected device. Here's how it works:

πŸ‘ Imitation of an infected client: The scanner sends requests as if it were an infected computer ready to join the botnet.
πŸ‘Response analysis: If the IP address responds as a C2 server, it gets the "malware" tag in the Shodan database.
πŸ‘Protocols: Supports searching for servers for RATs (Remote Access Trojans), such as Gh0st RAT, DarkComet, njRAT, and others.
πŸ‘Uniqueness: Unlike passive methods (e.g. certificate analysis), Malware Hunter actively searches for C2 on home networks even before they are activated.

Example: in 2017, Malware Hunter found more than 5,700 C2 servers, including 72% in the US, 12% in Hong Kong, and 5.2% in China. Among them were servers for Gh0st RAT (93.5%) and DarkComet (3.7%).

πŸ›  How to use?

Malware Hunter is integrated into Shodan, and access to the results is free for anyone with an account. Here are the steps:

πŸ‘Search Shodan: Go to shodan.io and search for category:malware. This will show IP addresses that have been tagged as C2 servers.
Example: Enter category:malware country:US to search for servers in the US.
πŸ‘Using the API/CLI: For automation, use the command:shodan stats --facets ip:1000 tag:malware | sed -e '1d' -e 's/ .*//' | sort
This will return a list of C2 IP addresses. A corporate account is required for the full list.
πŸ‘Analysis for OSINT: Use the data to map the attackers' infrastructure. For example, check IP via internetdb.shodan.io to analyze open ports.
πŸ‘For SOC analysts: Upload the C2 list to SIEM (e.g. Splunk) for monitoring or blocking.
πŸ‘Contribute to the project: If you know a new C2 protocol or malware, send data (PCAP, code, or articles) to support@shodan.io.

For beginners: C2 is a server that controls infected devices (botnets). RAT is a remote access trojan, like a spy that steals data.

⚠️ Limitations and tips

πŸ‘Free access: The results are available to anyone with a Shodan account, but full data export requires a corporate subscription.
πŸ‘Ethical: Only use the data for legitimate purposes, such as network security or research. Scanning other people's systems without permission is illegal.
πŸ‘False positives: Some antiviruses may flag Malware Hunter traffic as a threat, but it is safe because it does not send malicious data.
πŸ‘Tip: Check your IPs via Shodan to make sure your devices are not mistakenly listed by C2.
πŸ‘Limitation: Malware Hunter focuses on RATs, but may support other types of malware in the future (e.g. cryptominers).

πŸš€ Why is it needed?

Malware Hunter is like a detective who catches the bad guys before they make their first move. It helps:

πŸ‘OSINT analysts: Track the infrastructure of cybercriminals.
πŸ‘Cybersecurity: Block C2 servers before attacks begin.
πŸ‘Researchers: Study new threats such as Gh0st RAT or DarkComet.

Have you checked your networks for vulnerabilities using Shodan? Share your experience in the comments! πŸ”

πŸ“ž Cold calls? We warm them up to the result!

πŸ”Open sources, closed questions - we will find everything in seconds!
Contact on telegram @Grrds1
 
  • Tags
    c2 hunter malware servers
  • Top