How to find Ubiquiti devices on your network

(updated ), by Thao Doan
icon
Rumble, Inc. is now runZero!

Rumble Network Discovery is now runZero!

Earlier this year, Ubiquiti, a popular networking equipment manufacturer for businesses and consumers, disclosed a security breach that potentially exposed customer data. However, recent news indicates that the reported breach was intentionally and severely underreported, and the potential impact was much greater than disclosed. You can read the Krebs article for more in-depth reporting of the breach and its potential impact.

Right now, it’s critical to audit and find Ubiquiti devices. After you’ve identified these devices, consider:

  • Changing the passwords and enabling 2FA, if you haven’t already.
  • Ensuring the devices are on the latest firmware.
  • Deleting and rebuilding your device profiles from scratch, if you want to be absolutely certain your systems are not impacted by this breach.

Finding Ubiquiti devices with Rumble

Rumble users can quickly find Ubiquiti devices in their inventory with this handy pre-built query. This query searches for any live asset that has Ubiquiti as the vendor, hardware, or OS, and it also searches for the UBNT protocol.

alive:t AND (vendor:Ubiquiti OR hw:Ubiquiti OR os:Ubiquiti OR protocol:ubnt OR names:unifi OR names:ubiquiti)

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.

Find prebuilt queries in the Queries Library

Try Rumble

Don’t have Rumble and need help finding Ubiquiti devices? Start your Rumble trial today.

Similar Content

September 30, 2022

Finding Microsoft Exchange Servers on your network

GTSC, a Vietnamese security firm, recently discovered two zero-day vulnerabilities that affect Microsoft Exchange Server 2013, 2016, and 2019. These two vulnerabilities are being tracked as CVE-2022-41040 and CVE-2022-41082.

August 4, 2022

Finding DrayTek Vigor routers

The Trellix Threat Labs Vulnerability Research team recently published vulnerability details affecting almost 30 models of DrayTek Vigor routers. This vulnerability resides in the management interface login page and is trivial to exploit via buffer overflow. An …

Read More

July 29, 2022

Hunting for X.509 Certificates

X.509 certificates are used to secure communications over both trusted and untrusted networks. Protocols such as Transport Layer Security (TLS) rely on X.509 certificates to keep their communications secure between endpoints. Each X.509 certificate is composed of a public …

Read More