Blog ยท Engineering & Security
๐Ÿ”ง Engineering & Security

Shodan.io Explained: Searching the Internet of Things

๐Ÿ“Š View 1-page infographic (share-ready PDF)

Shodan is a search engine โ€” not for web pages, but for the devices and services that run on the internet. Web cameras, routers, industrial controllers, databases, web servers, mail servers, VPN endpoints, smart appliances, ports left open by accident: Shodan finds them, fingerprints them, and lets you query the entire dataset.

For defenders, it's an essential tool for understanding your own attack surface. For researchers, it's a window into how the global internet is actually configured. For attackers, it's a reconnaissance accelerator โ€” which is exactly why defenders need to know what it shows.

What Shodan is

Shodan continuously scans the public IPv4 address space (and now significant chunks of IPv6) on a wide range of TCP and UDP ports. When it finds something responding, it captures the service banner โ€” the metadata the service announces in its initial response โ€” and indexes it. The result is a searchable database of approximately every internet-facing service in existence.

Things Shodan can tell you about an IP address:

How it works under the hood

The high-level pipeline:

  1. Distributed scanners sweep the internet, connecting briefly to each IP on a rotating set of ports.
  2. Banner grabbing โ€” the scanner records the first few KB the service sends back. For HTTP that's headers; for SSH it's the version string; for industrial protocols it's whatever the protocol identifies itself with.
  3. Parsing and enrichment โ€” the banner is parsed, software/version extracted, GeoIP applied, CVE database consulted.
  4. Indexing โ€” the structured result lands in a searchable database with timestamps so you can see how a host changed over time.
  5. Continuous rescanning โ€” large portions of the internet are re-fingerprinted on a rolling basis.

Query basics

Shodan supports free-text search and structured filters. Free text matches against banner content; filters are typed (key:value).

Examples of free-text searches:

Free text is rarely what you want for serious work. Filters are where Shodan becomes powerful.

Useful filters

A non-exhaustive list of filters that come up constantly:

Filters combine with AND by default. Use minus (-) for NOT and parentheses sparingly.

Practical example searches

These are search patterns used in legitimate defensive and research contexts. Run them against your own organization's IP ranges only.

Discover your organization's internet-facing services

net:YOUR.CIDR.HERE/24 โ€” replace with a CIDR block you own. The result is an external view of your attack surface, exactly as an attacker would see it.

Find expired or weak TLS certificates

net:YOUR.CIDR/24 ssl.cert.expired:true โ€” surfaces certs that have lapsed. A surprisingly common problem at scale.

Find services accidentally exposed

Database ports (port:5432 for Postgres, port:27017 for MongoDB, port:6379 for Redis) on the public internet are a red flag. Run against your own network.

Audit specific software versions

If a critical CVE drops for nginx 1.20.0, product:nginx version:"1.20.0" net:YOUR.CIDR finds your exposure quickly.

Industrial / IoT discovery

port:502 matches Modbus services. port:44818 matches EtherNet/IP. These shouldn't be on the public internet โ€” find them, take them off.

Defender use cases (the right way to use Shodan)

Alternatives and complements

Shodan isn't the only player in this space. Each has slightly different scan cadence and indexing focus:

Most serious researchers run at least two in parallel and reconcile differences.

Ethics and access

Shodan is legal to use; using its findings to gain unauthorized access to systems is not. The line is bright and worth restating:

Shodan offers a free tier with significant limits and paid tiers for professional use. Educational and academic discounts are available.

For OSINT context broader than Shodan, see our OSINT introduction, Google Dorks, and the broader OSINT toolkit.

Sources & References
  1. Shodan โ€” Shodan official site
  2. Shodan โ€” Shodan help center
  3. Censys โ€” Censys search
  4. MITRE CVE โ€” CVE database