• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Shodan – the search engine for Internet-connected devices

Shodan – the search engine for Internet-connected devices

2016-11-15 by Jason

Shodan, taking its name from the AI in the System Shock video game series, is a search engine for devices reachable on the Internet. The index is built by crawlers scanning the web 24/7 looking for devices that are reachable on standard ports.

This is a valuable resource to understand the security of your organization. You might have some devices intentionally exposed to the Internet, like a web or email servers, but the rest should be behind a firewall. Shodan gives you an outside perspective to make sure your perimeter is secure. In case somebody has connected a device that you do not know about or obsolete rules are exposing new servers, you will want to be aware and take appropriate action.

Shodan is simple to use. Just visit Shodan.io and enter your query like Google. For more capabilities, you can create a free account. This will allow you access to the first 5 pages of results and the ability to use filters to search by registered organizations, devices, software servers, or subnets. I looked at the whole range of my organization’s network and was able to audit the results to find interesting cases like webcams, VNC, OpenSSH, and even remote desktop. Prompt action can seal the door before it is taken advantage of and a procedure review can try to prevent rogue devices or old records from causing the problem again.

shodan

The IoT botnet is just one example of where this information could be useful. Security camera DVRs, routers, and other Internet of Things devices with default passwords were reigned under control and made part of a botnet to make significant websites inaccessible. If you scanned your network and saw an unknown device or port that was open to the web and it shouldn’t be (perhaps you have to connect to VPN first), you could remove these devices from being pawns of the botnet masters. For an even interface than Shodan, you can visit Bullguard’s IoT scanner to search your IP address for an entry on Shodan – no account required. You can then kick off a “deep scan” to do an active check to look for any known vulnerabilities at your IP address.

You can assume you are operating securely or you can search and be more sure.

Filed Under: Security and Privacy Tagged With: iot, search, security

Trending

  • ICANN diagrams the “logical layer” of digital governance
    In Infographics
  • Clearing select Google Chrome history with a query
    In Software, Tech Solutions
  • Extracting Images from Microsoft Word Documents
    In Software, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in