SHARE
Facebook X Pinterest WhatsApp

5 Tips to Protect Networks Against Shodan Searches

A recent round of media buzz has swarmed around the search engine called Shodan. If you’ve seen any stories like this or this, you’ve read that Shodan may be “the scariest search engine on the Internet.” The penetration testing search engine, it is said, reveals critical infrastructure like network servers, routers and even printers, empowering […]

Nov 12, 2015
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A recent round of media buzz has swarmed around the search engine called Shodan. If you’ve seen any stories like this or this, you’ve read that Shodan may be “the scariest search engine on the Internet.” The penetration testing search engine, it is said, reveals critical infrastructure like network servers, routers and even printers, empowering hackers to attack victims ranging from small businesses to public utilities.

Before panic ensues, let’s zoom out. Shodan is actually not new. The site was launched in 2009. According to its own slogan, Shodan is different from Google because it is designed to “find computers” rather than content. It sounds like black magic, but at its core the voodoo behind Shodan is really quite simple.

When you connect to a server listening on a given port, the server usually responds with what is called a “banner.” The banner is a block of text with details about the service. The banner identifies the version of software running.

What Shodan’s crawler does is query IP addresses around the world, looking for and saving banner responses at several common ports. The Shodan search engine lets users query keywords in these banners, filtered by metadata like port and IP address or domain name.

Any “scary” vulnerabilities revealed by Shodan come down to the information in the banners. Keep in mind that banners are just that: information, which may not always be accurate.

For example, some banners like the example above reveal a default password. But this doesn’t mean that is actually the password configured for that site; it is just the software default. A security-aware administrator would (should) have changed the password when configuring the server.

The types of devices most at risk from a tool like Shodan are those which unnecessarily face the public Internet and possess default configuration profiles. Shodan is not the only way for hackers to discover these devices, but it does lower the barrier to making such discovery easier.

Some of the same discoveries that can be revealed by Shodan have long been available through Google as well. Even though Google indexes content rather than server banners, hackers have long known that particular query strings can reveal mis-configured servers, printers, and webcams. These query templates are known as “Google dorks” and they long predate Shodan.

The point is, neither Google dorks nor Shodan are putting organizations are risk. Organizations put themselves at risk by leaving devices exposed. Sound security practices can minimize or eliminate your risks from penetration testing tools like Shodan.

ShodanTitle 5 Tips to Protect Networks Against Shodan Searches While Shodan isn’t exactly “the scariest search engine on the Internet,” it does present some security risks. Here is how to minimize them.

Shodan1 Restrict public-facing servers and devices

Many of the devices revealed through Shodan shouldn’t be facing the Internet in the first place. Do your network printers, webcams or file servers need access to the public Internet? Or just your internal LAN?

In some cases, restricting devices to your LAN is just a matter of their network configuration. Or, you may have a network firewall that can be configured to block incoming access to these devices.

Shodan2 Use a VPN or IP filters when you need external access If employees or contractors need to access internal resources — like printers, webcams or file shares — from outside your network, restrict them by using IP filters in your firewall. Better yet, require use of a VPN. This will prevent crawlers like Shodan from finding your devices in the first place.

Shodan3 Always change password defaults Whether or not your server’s banner advertises this information specifically, most devices have off-the-shelf default passwords. Attackers can find this information online, particularly if they’ve identified the make and model of your device, such as through the banner data. By simply setting a non-default password, the vast majority of machines that turn up on Shodan would still be safe.

Shodan4 Suppress or minimize verbose banners

Some server software will let you customize the banner it displays to incoming connections. It is remarkable how much information many banners give away by default. Attackers can use the information in a banner such as server version and installed modules to dig up known security holes and attempt to exploit them.

Remember that Shodan only indexes banners. Even if your device is public facing, Shodan users only know as much as your servers’ banners tell them.

Shodan5 Run Shodan against yourself

You can use Shodan’s IP filter to query your own organization’s network. For example, these Shodan search queries will pull up any server banners it has indexed for your public IP address or subnet:

net:your.ip.add.ress
net:your.ip.add.0/24

Remember that Shodan is not querying your network on demand. It is only querying its crawler database, so it may not have visited your network. This is not a substitute for a realtime penetration testing tool.

 

Recommended for you...

Surfshark vs NordVPN (2025): Which VPN Wins? Full Breakdown
Matt Gonzales
Aug 14, 2025
The 5 Best VPNs for Small Businesses on a Budget
Matt Gonzales
Jul 16, 2025
Penetration Testing Phases: Steps, Tools & Methodology
Ray Fernandez
Jun 10, 2025
Microsoft Defender vs Bitdefender: Compare Antivirus Software
Jenna Phipps
May 27, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.