Skip to main content
Zondex
login
Browse Stats Pricing Blog Dorks How-To Docs
Product Updates

Zondex API v2 Unveiled: Powering Next-Gen Cybersecurity Investigations and Attack Surface Management

person Zondex Research Team calendar_today Mar 13, 2026 schedule 14 min read
Zondex API v2 Unveiled: Powering Next-Gen Cybersecurity Investigations and Attack Surface Management

The Evolving Landscape of Digital Exposure and the Need for Advanced Tools

In an era where digital footprints are constantly expanding, and cyber threats grow increasingly sophisticated, understanding and managing an organization's internet-facing assets has never been more critical. Traditional perimeter defenses are no longer sufficient; a proactive approach to exposure monitoring and attack surface management is paramount. Cybersecurity professionals, penetration testers, and IT administrators constantly seek powerful tools to identify, assess, and mitigate risks across their vast and dynamic digital infrastructure.

This is precisely where Zondex shines. As a leading internet search engine, akin to Shodan or Censys, Zondex continuously scans and indexes over 80 million hosts, along with their services and known vulnerabilities, providing unparalleled visibility into the global internet. Our mission is to empower you with the data needed to make informed security decisions.

Today, we're thrilled to announce a significant leap forward in this mission: the launch of Zondex API v2. This isn't just an update; it's a fundamental reimagining of how you can interact with Zondex's vast datasets, designed to offer unprecedented speed, flexibility, and depth for all your cybersecurity needs.

Why an API Upgrade? The Driving Force Behind Zondex API v2

The digital world never stands still, and neither do we. Our decision to develop Zondex API v2 was driven by a commitment to meet the evolving demands of our users and the dynamic nature of internet security. While Zondex API v1 provided valuable access to our data, the explosion of new services, protocols, and attack vectors necessitated a more robust, scalable, and feature-rich interface.

Zondex API v2 is engineered from the ground up to address key areas:

  • Enhanced Query Capabilities: To support more complex, nuanced, and precise searches across our exponentially growing dataset.
  • Richer Data Models: To provide more granular and structured information about hosts, services, and vulnerabilities, enabling deeper analysis.
  • Superior Performance and Scalability: To deliver faster response times and handle larger data volumes, crucial for real-time threat intelligence and large-scale attack surface management.
  • Improved User Experience: To offer a more intuitive and consistent API design, simplifying integration and development.
  • Future-Proofing: To create a flexible foundation that can easily incorporate new data types, scanning methodologies, and security insights as Zondex continues to expand its capabilities.

For organizations serious about exposure monitoring, vulnerability assessment, and proactive threat intelligence, Zondex API v2 represents a game-changer.

Key Innovations in Zondex API v2: A Deep Dive

Zondex API v2 introduces a host of powerful features that significantly elevate its utility for cybersecurity professionals. Let's explore the core innovations.

1. Enhanced Query Language and Capabilities

The most immediately noticeable improvement is the overhauled query language. Zondex API v2 empowers users with a more expressive and precise syntax, allowing for highly specific searches that were previously challenging or impossible.

  • Nested Queries and Logical Operators: Combine conditions with AND, OR, NOT more effectively, and group them using parentheses for complex logic.
  • Field-Specific Searching: Target specific data fields with greater accuracy. For example, instead of a broad keyword search, you can specify http.title, ssl.issuer, or vuln.id.
  • Range and Wildcard Searches: Search for numerical ranges (e.g., port:8000-8080) or use wildcards for pattern matching (e.g., product:nginx*).
  • New Search Modifiers: Explore new modifiers like is:new to find recently indexed hosts or has:vulnerabilities to filter for assets with known issues.

Practical Examples:

To find unauthenticated Redis instances in the United States, you might now use:

country:US product:redis port:6379 "authentication required" OR "no password set"

To identify Apache servers running an outdated version (2.4.49 being a common vulnerable version) on standard web ports:

product:apache version:2.4.49 (port:80 OR port:443 OR port:8080)

Searching for web servers exposing .git repositories, a common misconfiguration for developers:

http.body:"Index of /.git" http.status:200

Identify hosts in AWS that are running a specific vulnerable version of OpenSSH:

org:"Amazon.com" product:openssh version:8.2_p1

2. Richer Data Models and Granularity

Zondex API v2 provides access to a wealth of new and expanded data points for each host and service, allowing for deeper insights into potential exposures. Our internet scanning efforts gather a comprehensive profile for every indexed asset.

  • Comprehensive Host Information: Beyond IP and geo-location, get detailed ASN information, organization names, and first/last seen timestamps.
  • Detailed Port and Service Data: Each open port now comes with extensive details including protocol, service banners, detected product and version, and even inferred operating system information. Our scans indicate that roughly 25% of publicly exposed services actively respond with clear banner information, significantly aiding in product identification.
  • SSL/TLS Certificate Analysis: Access the full certificate chain, issuer, subject, validity dates, common names, and even detected weak ciphers. This is crucial for exposure monitoring related to expired certificates or misconfigurations.
  • HTTP/HTTPS Specific Data: For web services, gain access to HTTP response headers, body snippets, detected technologies (e.g., WordPress, Nginx), status codes, and more.
  • Integrated Vulnerability Data: Each host or service can now be directly correlated with known CVEs and other vulnerability identifiers, based on detected software versions. This is a massive leap for vulnerability assessment. Our data suggests that on average, a newly exposed web server will have at least two publicly known CVEs associated with its running software components within the first week of exposure.

Example of Data Fields (conceptual response snippet):

{
  "ip": "192.0.2.1",
  "asn": "ASXXXX",
  "organization": "Example Corp",
  "country": "US",
  "ports": [
    {
      "port": 443,
      "protocol": "tcp",
      "service": "https",
      "product": "nginx",
      "version": "1.22.0",
      "os": "linux",
      "http": {
        "status": 200,
        "title": "Welcome to Zondex!",
        "headers": {"Server": "nginx/1.22.0", ...}
      },
      "ssl": {
        "issuer": "C=US, O=Let's Encrypt",
        "subject": "CN=example.com",
        "valid_until": "2024-12-31T23:59:59Z",
        "ciphers": ["TLS_AES_256_GCM_SHA384", ...]
      },
      "vulnerabilities": [
        {
          "id": "CVE-2022-XXXXX",
          "description": "Nginx vulnerability...",
          "severity": "HIGH"
        }
      ]
    }
  ],
  "last_updated": "2023-10-27T10:00:00Z"
}

3. Improved Performance and Scalability

Behind the scenes, Zondex API v2 benefits from a re-architected infrastructure optimized for speed and resilience. This means:

  • Faster Query Execution: Experience quicker response times even for complex, large-scope queries.
  • Higher Throughput: Process more requests per second, enabling more aggressive automation.
  • Larger Data Exports: Our API is now better equipped to handle requests for extensive datasets, crucial for threat intelligence platforms consuming Zondex data.

Based on internet-wide scanning, we process petabytes of data weekly. API v2's performance enhancements are designed to make accessing this data frictionless.

4. Robust Security and Authentication

Security is at the core of everything we do. Zondex API v2 enhances authentication and authorization mechanisms to ensure secure and controlled access to our valuable data.

  • Standardized Authentication: Leveraging modern API key management, ensuring secure and traceable access.
  • Granular Permissions (Coming Soon): Future iterations will allow for more granular control over what data specific API keys can access, enhancing enterprise security postures.

5. New Endpoints and Features

Zondex API v2 introduces dedicated endpoints to streamline access to specific data types and functionalities:

  • /v2/hosts/search: The primary endpoint for searching Zondex's host and service data.
  • /v2/hosts/{ip}/details: Get all available data for a specific IP address.
  • /v2/vulnerabilities/search: Search for specific CVEs or vulnerabilities and see affected hosts.
  • /v2/stats: Retrieve aggregate statistics based on your queries (e.g., top countries, most common products).

This structured approach makes it easier to programmatically integrate Zondex data into your existing vulnerability assessment, attack surface management, and threat intelligence workflows.

Migrating to Zondex API v2: A Step-by-Step Guide for Seamless Transition

Transitioning to a new API version can seem daunting, but we've designed Zondex API v2 with ease of migration in mind. Here's a guide to help you get started.

1. Understand the Core Changes

  • Base URL: The API base URL has changed. Update https://api.zondex.io/v1/ to https://api.zondex.io/v2/.
  • Endpoint Paths: Specific endpoint paths have been revised to be more intuitive and RESTful. For instance, a search might move from /v1/search to /v2/hosts/search.
  • Request/Response Format: While still primarily JSON, the structure of the response objects for hosts, services, and vulnerabilities is more detailed and organized. Familiarize yourself with the new data models.
  • Query Parameters: The query language is more powerful, meaning your old query strings will likely need to be adapted to the new syntax to leverage its full potential. For example, a simple q=redis might become query=product:redis.
  • Authentication: Ensure you are using your new Zondex API v2 key, obtained from your dashboard.

2. Practical Migration Steps

  1. Update Your API Key: Generate a new Zondex API v2 key from your Zondex account dashboard. This key will be used for all API v2 requests.
  2. Adjust Base URL: Modify your code to point to the new /v2/ endpoint.
  3. Refactor Queries: This is the most crucial step. Review your existing Zondex queries and rewrite them using the enhanced API v2 query language. Start with simple queries and gradually introduce complexity. We recommend testing each rewritten query incrementally.
    • Example (Conceptual v1 vs v2 Query):
      • Old (v1 concept): q=product:nginx version:1.18.0 country:US
      • New (v2): query=product:nginx version:1.18.0 country:US
    • Example (More Complex v1 vs v2 Query):
      • Old (v1 concept): q=apache,port:80,title:admin,NOT,status:404
      • New (v2): query=product:apache port:80 http.title:admin NOT http.status:404
  4. Update Parsing Logic: The enriched response structures mean you'll need to adapt how your applications parse and process the returned JSON data. Look for new nested objects (e.g., host.ports[].ssl, host.ports[].vulnerabilities) and field names.
  5. Thorough Testing: Implement comprehensive testing for your integrated Zondex API v2 solution. Verify that queries return expected results, data is parsed correctly, and performance meets your requirements.

3. Code Example: Querying Zondex API v2 with Python

Here’s a simple Python example demonstrating how to make a search request using Zondex API v2, fetching data for hosts running Nginx with a specific title.

import requests
import json

# Replace with your actual Zondex API v2 key
API_KEY = "YOUR_ZONDEX_API_V2_KEY"
BASE_URL = "https://api.zondex.io/v2"

def search_zondex(query, page=1, limit=10):
    headers = {
        "X-API-KEY": API_KEY,
        "Content-Type": "application/json"
    }
    params = {
        "query": query,
        "page": page,
        "limit": limit
    }

    try:
        response = requests.get(f"{BASE_URL}/hosts/search", headers=headers, params=params)
        response.raise_for_status() # Raise an HTTPError for bad responses (4xx or 5xx)
        return response.json()
    except requests.exceptions.HTTPError as http_err:
        print(f"HTTP error occurred: {http_err} - {response.text}")
    except Exception as err:
        print(f"An error occurred: {err}")
    return None

# Example usage:
search_query = 'product:nginx http.title:"Welcome to Zondex"'
results = search_zondex(search_query)

if results:
    print(f"Found {results.get('total', 0)} hosts matching '{search_query}':")
    for host in results.get('matches', []):
        ip = host.get('ip')
        country = host.get('country')
        org = host.get('organization')
        print(f"  IP: {ip}, Org: {org}, Country: {country}")
        for port_data in host.get('ports', []):
            if port_data.get('product') == 'nginx':
                print(f"    Port: {port_data.get('port')}, Service: {port_data.get('service')}, Version: {port_data.get('version')}")
                if port_data.get('vulnerabilities'):
                    print("      Known Vulnerabilities:")
                    for vuln in port_data['vulnerabilities']:
                        print(f"        - {vuln['id']} (Severity: {vuln['severity']})")
else:
    print("No results or an error occurred.")

# Example using curl
# curl -X GET "https://api.zondex.io/v2/hosts/search?query=org:\"Amazon.com\"%20port:443%20ssl.issuer:\"Amazon%20RSA%202048%20M01\"" \
#      -H "X-API-KEY: YOUR_ZONDEX_API_V2_KEY"

This example showcases the new endpoint structure, query parameter (query), and how to access richer data such as vulnerabilities associated with a specific service. Remember to consult the official Zondex API v2 documentation for the most up-to-date and comprehensive details on all endpoints, parameters, and response structures.

Unlocking New Possibilities with Zondex API v2

The enhanced capabilities of Zondex API v2 open up a world of advanced cybersecurity applications, empowering professionals to perform their tasks with unprecedented efficiency and depth.

Automated Attack Surface Management (ASM)

With Zondex API v2, organizations can build robust, automated systems for continuous attack surface management. Identify newly exposed assets, changes in service configurations, or unauthorized open ports within your organization's IP ranges or ASN.

  • Monitor for New Assets: Continuously query org:"YourCompany" is:new to detect rogue assets or shadow IT appearing on the internet.
  • Track Configuration Drift: Set up alerts for changes in service banners, HTTP headers, or SSL certificate details for your critical infrastructure. For example, monitor org:"YourCompany" product:nginx and compare daily results to detect unauthorized version changes.
  • Identify Risky Exposures: Search for specific services that shouldn't be public, like org:"YourCompany" port:3389 (RDP) or org:"YourCompany" product:elasticsearch is:open to find potentially exposed databases.

Our scans indicate that misconfigurations leading to exposed services account for over 30% of critical findings in enterprise attack surfaces.

Proactive Vulnerability Assessment

The integrated vulnerability data in Zondex API v2 transforms your vulnerability assessment processes, allowing for proactive identification and remediation of exposures.

  • Identify Global Vulnerability Trends: Monitor vuln:CVE-2023-XXXX to see the prevalence of a new critical vulnerability across the internet and anticipate its impact.
  • Assess Internal Exposure: Combine organization filters with vulnerability searches: org:"YourCompany" vuln:CVE-2021-44228 (Log4Shell) to quickly pinpoint all affected assets in your infrastructure based on publicly observable data.
  • Prioritize Patching: Leverage severity ratings and product information to prioritize patching efforts for the most critical exposures facing your organization.

Zondex's comprehensive vulnerability indexing helps you understand not just what vulnerabilities exist, but where they are exposed on the internet, informing your threat intelligence.

Advanced Threat Intelligence (TI)

Threat intelligence teams can leverage Zondex API v2 to track adversary infrastructure, monitor trending attack vectors, and gather insights into global threats.

  • Track Malicious Infrastructure: Identify common patterns used by threat actors, such as specific hosting providers, open ports, or certificate details. For example, org:"DigitalOcean" product:nginx port:8080 combined with other indicators could reveal potential C2 infrastructure.
  • Monitor Exploit Campaign Indicators: Search for unique HTTP headers, body content, or service banners that are known indicators of compromise (IoCs) from ongoing exploit campaigns. For example, if a new ransomware campaign targets specific web application versions, you can quickly find global exposure.
  • Geospatial Analysis: Combine geo-location filters with service and vulnerability data to understand regional threat landscapes. For example, country:RU product:winbox to identify MikroTik exposures in Russia.

Data suggests that targeted threat actors often reuse infrastructure characteristics, making Zondex an invaluable tool for identifying and monitoring these patterns.

Exposure Monitoring and Compliance

For IT administrators and compliance officers, Zondex API v2 provides the tools needed to ensure continuous compliance with security policies and reduce the risk of accidental exposure.

  • Policy Enforcement: Verify that only approved services are exposed on the internet, and that critical systems are not inadvertently made public. Search for org:"MyFinancialCorp" port:27017 to find exposed MongoDB instances.
  • Third-Party Risk Assessment: Monitor the external exposure of your vendors and partners to understand your supply chain risk. org:"VendorX" has:vulnerabilities.
  • Reporting and Auditing: Generate detailed reports on your internet-facing assets and their security posture for compliance audits.

By leveraging Zondex's continuous internet scanning, organizations can maintain a strong security posture and effectively manage their external digital risks.

Key Takeaways

Zondex API v2 is a significant advancement designed to empower cybersecurity professionals with unparalleled visibility and control over their digital exposure. Its core benefits include:

  • Precision and Power: A new, advanced query language allows for incredibly specific and complex searches, refining your internet scanning capabilities.
  • Rich Data: Access to more granular host, service, and integrated vulnerability data provides deeper insights for vulnerability assessment and threat intelligence.
  • Performance: Optimized architecture ensures faster query execution and scalability for demanding attack surface management tasks.
  • Automation Ready: Designed for seamless integration into existing security workflows, enabling automated exposure monitoring and proactive risk mitigation.

Migrating to Zondex API v2 is an investment in a more secure and efficient future for your cybersecurity operations. Embrace the power of next-generation internet intelligence.

How Zondex Can Help

Zondex is your go-to platform for understanding and securing your internet-facing assets. With Zondex API v2, you can:

  • Proactively identify critical vulnerabilities within your organization's internet-exposed infrastructure by querying org:"YourOrg" has:vulnerabilities.
  • Monitor for unauthorized open ports or services using targeted queries like org:"YourOrg" port:22 is:open.
  • Enhance your threat intelligence by tracking patterns in malicious infrastructure or newly emerging attack vectors across the internet.
  • Automate attack surface management to continuously map and secure your digital footprint.

Explore the full capabilities of Zondex API v2 today and transform your approach to cybersecurity. Visit zondex.io for documentation and to get started.

support_agent
Zondex Support
Usually replies within minutes
Hi there!
Send us a message and we'll reply as soon as possible.