Exposed Kibana Instances

Find publicly accessible Kibana dashboards that may reveal log data

Intermediate
Use with caution
vulnerability

Google Dork Query:

intitle:"Kibana" inurl:"/app/kibana"
0
Not verified

What It Does

This Google dork helps you find publicly accessible kibana dashboards that may reveal log data. It uses advanced search operators to filter results and find specific types of information that might not appear in regular searches.

Common Use Cases

  • Security Research: Identify potential vulnerabilities and misconfigurations in authorized systems
  • OSINT Investigations: Gather publicly available information for research and analysis
  • Bug Bounty Hunting: Discover exposed endpoints and sensitive data in scope targets
  • SEO & Research: Find indexed pages, backlinks, and competitive intelligence

How to Use Safely

  1. Click the "Copy Query" button above
  2. Navigate to google.com in a new tab
  3. Paste the query into Google's search box
  4. Review results carefully - Only interact with authorized systems
  5. Always obtain authorization before security testing

Responsible Use Required

This dork should only be used on systems you own or have explicit authorization to test. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and obtain proper permission before testing.

TAGS

kibana
elasticsearch
logs