How to Configure the IoT Feed

Learn how to use DigitalStakeout’s IoT Feed to detect exposed devices and services by keyword across public-facing IP infrastructure.

How to Configure the IoT Feed

The IoT Feed in DigitalStakeout XTI allows you to monitor and detect publicly exposed services and devices operating on direct IP addresses. It's especially useful for identifying vulnerabilities in internet-facing infrastructure, misconfigured devices, or shadow IT.


Use Cases

  • 🛡️ Attack Surface Monitoring — Detect exposed services or unmonitored IPs
  • 🧪 Vulnerability Research — Monitor for open ports or IoT protocols by keyword
  • 🚨 Threat Detection — Discover devices being exploited or beaconing to threat actors
  • 🧭 Risk Intelligence — Track exposure trends across industries, vendors, or locations

Setting Up an IoT Feed

1. Basic Setup

FieldDescription
StatusEnable or disable the feed
Expires OnOptional expiration date for auto-deactivation
Monitor NameDescriptive name for reference
Use CaseChoose the scenario (e.g., Vulnerability Assessment, DRP)
TagsAdd relevant tags for organization
Send Data ToChoose output destination (project folder or external system)
Translate on AddAuto-translate captured content if applicable

2. Keyword Configuration

SettingPurpose
Primary KeywordsCore search terms tied to exposed devices or services
Must ContainRequired additional context for event inclusion
Must Not ContainBlocklist terms to reduce noise

Examples:

  • Primary: open camera, mqtt, public printer
  • Must Contain: port 554, firmware
  • Must Not Contain: nasa.gov (to exclude trusted or irrelevant sources)

Monitoring Workflow

Once configured, your IoT Feed will continuously scan exposed IP-facing services for matches.

Each event will include:

  • Device/service reference
  • Source IP and port (if available)
  • Matched keywords and metadata
  • Timestamp and contextual analysis

All results are accessible and filterable in the XTI console.


Best Practices

  • 🎯 Be specific — Target keywords by protocol, port, vendor, or function
  • 🧠 Refine regularly — Update keyword filters as IoT threats evolve
  • 🔄 Use tags — Group monitors by vendor, location, or asset type
  • 🔗 Cross-reference feeds — Use in conjunction with Domain Feed or CVE Feed
  • 📥 Ingest external alerts — Forward IP indicators to Email Collector for correlation