Shodan (website)
Based on Wikipedia: Shodan (website)
In 2013, security researchers typed a simple query into Shodan and discovered something terrifying: traffic light control systems across America were freely accessible from the internet. When they connected to one of these systems, a stark red warning appeared on screen—"DEATH MAY OCCUR !!!"—glaringly displayed in capital letters across the control interface. It was a moment of uncanny absurdity that perfectly illustrated just how careless organizations had become about connecting their infrastructure to the outside world.
This is Shodan: a search engine that indexes not webpages or documents, but the raw, exposed fabric of the internet itself—thousands of servers, routers, webcams, and specialized systems quietly broadcasting their existence from every corner of the globe.
What Is a Search Engine for Servers?
Unlike Google or Bing, which crawl websites looking for text content and links, Shodan indexes something far more fundamental: the metadata that servers automatically send back to any client that asks. This is sometimes called "service banners"—the signature information that software spits out before you even begin interacting with it. When you connect to a server, it might tell you what software runs on it, which protocols it supports, and occasionally even display an unintended welcome message.
Shodan's creator, John Matherly, conceived the idea in 2003—a teenager with a peculiar fascination for mapping the hidden infrastructure of the internet. He spent years refining his vision before launching the tool publicly in 2009. The name pays homage to SHODAN, a notorious artificial intelligence antagonist from the System Shock video game series—a choice that perfectly captures both the eerie technological power and the somewhat dystopian implications of such comprehensive surveillance.
The website scans for connections on specific ports: HTTP and HTTPS (ports 80, 8080, 443, 8443) for web servers; FTP (21), SSH (22), Telnet (23), SNMP (161). It indexes IMAP (143 and encrypted 993), SMTP (25), SIP (5060), and RTSP (554)—the latter being particularly significant because it often reveals unprotected video cameras streaming their feeds across the internet.
The Cartography of Exposure
Shodan has surfaced discoveries that range from mundane to genuinely alarming. In one notable case, researchers found control systems for water treatment facilities accessible without authentication—meaning anyone could potentially manipulate the chemical processes controlling a city's drinking water. Power grid management interfaces have similarly been discovered exposed. An entire cyclotron—an expensive piece of scientific equipment used in particle physics experiments—was found connected to the public internet, its controls accessible from anywhere.
The traffic lights discovery made waves because it demonstrated that critical municipal infrastructure was sitting unguarded on the open internet—a stark reminder that our physical safety often depends on IT administrators nobody has ever met.
In 2013, Forbes reported that Shodan had located security flaws in TRENDnet consumer cameras—devices marketed to homeowners as secure surveillance solutions. The next day, their follow-up piece revealed an even broader landscape: Caterpillar trucks with onboard monitoring systems anyone could access; heating and security controls for banks; surveillance networks at universities and major corporations; fetal heart monitors in hospitals—vital medical equipment broadcasting patient data across the internet without encryption or authentication.
By December 2015, security researchers had used Shodan to identify thousands of publicly accessible MongoDB databases. One particularly notable find was a database hosted by Kromtech, the developer of MacKeeper—a macOS security tool. The discovery exposed that sensitive customer data was sitting unprotected on the public internet.
In November 2021, PC Magazine documented how AT&T had employed Shodan to locate Internet of Things devices infected with malware—essentially using Matherly's creation as a detection tool for rogue systems hiding inside legitimate networks.
By September 2025, Cisco security researchers had used the platform to discover over 1,100 publicly exposed Ollama LLM servers—powerful computing systems running artificial intelligence models that were wide open to anyone with a connection.
Who Uses It?
Shodan offers ten results to casual visitors and fifty to those who register for free. Users seeking unlimited access must explain their purpose and pay a fee—a model that reflects the platform's origins as a researcher-focused tool rather than a commercial product.
The primary user base consists of cybersecurity professionals, academic researchers, and law enforcement agencies investigating dark corners of internet infrastructure. These groups employ Shodan to identify vulnerable systems before malicious actors do, essentially turning a powerful reconnaissance instrument into a defensive one.
This dual-use reality is unavoidable: while security teams use it to patch holes, cybercriminals also search the same indexes for vulnerable targets. The tool's capabilities are equivalent to what botnets could accomplish—except Shodan operates without the secrecy that actual criminal infrastructure enjoys.
The Invisible Map
Shodan ultimately operates as a constantly refreshed map of everything connected to the internet—from mundane web servers to highly specialized industrial control mechanisms. It reveals a landscape largely hidden from everyday users: forgotten databases, abandoned surveillance cameras, unprotected routers, and mysterious systems scattered across every possible industry.
The tool demonstrates how much infrastructure remains unguarded despite years of security warnings, while simultaneously offering those concerned about privacy a way to locate vulnerabilities before malicious actors exploit them.
For readers seeking deeper understanding after exploring local-first software, Shodan provides a striking counterpoint: proof that countless systems beyond any individual or company's control remain exposed across the internet. It serves as a reminder that security and obscurity rarely align naturally—connecting anything to the internet requires deliberate protection.