Adversaries search scan databases to harvest actionable intelligence from internet-wide scanning results , exposed ports, services, software versions, and vulnerabilities across millions of devices accessible to anyone with a browser.
Scan databases like Shodan, Censys, FOFA, ZoomEye, and Criminal IP continuously probe the entire IPv4 address space, cataloging every internet-facing device and service. What began as a research project in 2009 (Shodan) has evolved into a powerful double-edged sword: these platforms reveal device banners, software versions, open ports, geographic locations, and known vulnerabilities for hundreds of millions of devices worldwide. With an estimated 79 zettabytes of IoT data projected for 2025, the attack surface visible through these databases grows exponentially every year. Nation-state actors, advanced persistent threats, and opportunistic criminals all leverage scan databases as their first stop in reconnaissance , transforming passive internet exposure into actionable attack plans within minutes.
Scan databases continuously enumerate every reachable IP address on the internet, recording service banners, software versions, certificate details, and device metadata. Censys detects new services in a median of just 5.7 hours, meaning a newly exposed device can be discovered by attackers almost as fast as it goes online. The CISA Red Team (Advisory AA24-326A) demonstrated how readily available scan databases provide initial reconnaissance for sophisticated attack chains, highlighting the gap between organizational security awareness and public exposure.
The Chinese state-sponsored group Volt Typhoon (G1017) extensively used FOFA, Shodan, and Censys to identify exposed devices across U.S. critical infrastructure sectors. Rather than conducting their own scanning , which could generate detectable network noise , these actors simply queried public scan databases to identify vulnerable RDP services, IoT devices, and VPN gateways. This "passive reconnaissance" approach allows threat actors to build comprehensive target profiles without ever touching the victim's network, making detection extremely difficult for defenders.
With 79 zettabytes of IoT data projected for 2025, the number of internet-connected devices , from security cameras and industrial sensors to smart building systems and medical devices , has created an unprecedented attack surface. Many IoT and ICS devices ship with default credentials, unpatched firmware, and no encryption. Scan databases make it trivially easy to find and enumerate these devices. A single Shodan query for default password country:US can reveal thousands of vulnerable devices in seconds, enabling mass exploitation campaigns that compromise entire device classes simultaneously.
According to the National Institute of Standards and Technology (NIST) and CISA, organizations must regularly audit their internet-facing exposure using the same tools adversaries use. CSO Online reports that the average time to identify an exposed asset has dropped from weeks to hours, making continuous monitoring essential. Censys and Shodan both offer organization-specific exposure reports that can help security teams close gaps before adversaries find them.
Scan Databases (T1596.005) is a sub-technique under MITRE ATT&CK's Search Open Technical Databases (T1596) where adversaries query internet-wide scan databases to harvest information about a target organization's exposed devices, services, and vulnerabilities. These databases , including Shodan, Censys, FOFA, ZoomEye, and Criminal IP , continuously scan the entire IPv4 address space and compile rich metadata about every responding device: open ports, running services and software versions, SSL/TLS certificate details, device types and manufacturers, geographic locations, service banners and HTTP headers, and known vulnerability associations (CVEs). Adversaries leverage this pre-collected intelligence to identify high-value targets, prioritize attack vectors, and plan exploitation without generating any direct network traffic to the victim.
Imagine you want to learn everything about a company's physical buildings without ever visiting them. You use a service like Google Street View that has already driven past every address and photographed what's visible from the street. You can see what security cameras are installed, whether doors have old locks, which windows are left open, and what kind of equipment is visible through the glass. You can even filter by neighborhood, building type, or security features. Scan databases are exactly this , but for internet-facing devices. They've already "driven past" every IP address and recorded what services are running, what software versions are installed, and what vulnerabilities exist. An attacker simply queries the database to see your organization's digital "storefront" without ever touching your network.
Text responses that servers send when a connection is established, revealing software name, version, and sometimes configuration details. Like reading a name tag on every server you meet.
Systematic probing of all ~4.3 billion IPv4 addresses to catalog responding services. Like knocking on every door in the world to see who answers and what they say.
Gathering intelligence without directly interacting with the target. Querying scan databases is passive because the data was already collected , the target sees no suspicious activity.
Advanced search operators (e.g., site:target.com inurl:admin) used to find sensitive information indexed by search engines. A parallel technique to scan databases for discovering exposed resources.
The automatic association of discovered software versions with known Common Vulnerabilities and Exposures (CVEs). Scan databases like Shodan and Censys automatically flag devices with known exploitable flaws.
Industrial Control Systems and Operational Technology devices (PLCs, SCADA, RTUs) inadvertently connected to the internet. Scan databases have revealed thousands of critical infrastructure devices with no authentication.
Based on documented patterns from CISA advisory AA24-326A and the activities of threat groups including Volt Typhoon (G1017), this scenario illustrates how scan database reconnaissance enables devastating real-world compromises of industrial control systems.
Andre Mendez had been the systems administrator at Gulf Coast Energy Partners for eleven years, managing a sprawling network of SCADA systems, remote terminal units (RTUs), and programmable logic controllers (PLCs) across 14 natural gas compression stations spanning Louisiana and Texas. He considered the network reasonably secure , after all, the corporate firewall blocked unauthorized inbound connections, and the ICS network was supposed to be isolated from the internet.
What Andre didn't know was that a maintenance contractor had installed a 4G LTE gateway on the Baton Rouge compressor station two years earlier to enable remote troubleshooting, directly bridging the ICS network to the public internet. The gateway had been configured with factory-default credentials and exposed Modbus TCP on port 502 , a protocol that provides zero authentication or encryption by design.
A threat actor affiliated with Volt Typhoon (G1017) began their reconnaissance by querying Censys with the filter org:"Gulf Coast Energy" port:502. The results revealed not just the Baton Rouge gateway, but also three additional ICS devices across the network that had been exposed through misconfigured VPN tunnels and a forgotten SNMP management interface. The attacker also queried Shodan for ssl.cert.subject.CN:*.gulfcoastenergy.com, discovering an expired TLS certificate on the company's customer portal running an outdated Apache version with known critical vulnerabilities.
Within 48 hours of their first database query, the threat group had mapped Andre's entire external attack surface , 23 exposed devices, 127 open RDP ports across regional offices, 89 devices with default credentials, and 234 devices flagged with critical CVEs , without generating a single packet directed at Gulf Coast Energy's network. The Censys data showed the Baton Rouge Modbus gateway had been visible in the database for over 18 months, meaning this exposure had been discoverable to anyone who knew to look for nearly two years.
The nightmare began when Andre received an urgent alert from CISA's JCDC program , a routine vulnerability scan had flagged Gulf Coast Energy's assets appearing in multiple public scan databases with critical exposures. The CISA notification included specific Shodan and Censys queries showing exactly what adversaries could see.
Andre immediately took action. Over the following six weeks, his team implemented a comprehensive remediation program:
Week 1: Disconnected and removed the unauthorized 4G LTE gateway from the Baton Rouge ICS network. Implemented network segmentation to isolate all OT/ICS networks from the corporate IT network with strict firewall rules allowing only required protocol traffic.
Week 2-3: Changed all default credentials across the 89 affected devices. Deployed multi-factor authentication on all RDP endpoints. Disabled RDP access from the public internet entirely, requiring VPN access with MFA for all remote administration.
Week 4: Updated the Apache server on the customer portal and renewed the expired TLS certificate. Applied security patches for the 234 critical CVEs identified through scan database cross-referencing.
Week 5-6: Established a continuous exposure monitoring program , setting up automated weekly queries against Shodan, Censys, and FOFA for the organization's IP ranges and domain certificates, ensuring any new exposure would be detected within hours, not months. Andre also implemented network detection rules to alert on any traffic patterns consistent with scan database reconnaissance targeting their assets.
Result: Gulf Coast Energy's scan database footprint was reduced from 847 exposed devices to fewer than 12 intentionally exposed services, all fully patched and properly configured with modern authentication.
Follow these seven steps to systematically reduce your organization's exposure in scan databases and prevent adversaries from using internet-wide scanning intelligence against you. This guide integrates with protections from related techniques including Active Scanning (T1595), Vulnerability Scanning (T1595.002), IP Address Discovery (T1590.005), and Network Security Appliances (T1590.006).
Before attackers find your weaknesses, find them yourself. Query Shodan, Censys, and FOFA using your organization's name, IP ranges, domain names, and SSL certificate subjects. Document every exposed device, service, and vulnerability that these databases reveal about your organization.
net:YOUR_IP_RANGES, org:"Your Company Name"services.tls.certificate.parsed.names: yourdomain.comdomain="yourdomain.com"Remove or disable any service that doesn't absolutely need to be accessible from the public internet. Every open port visible in a scan database is a potential entry point. Pay special attention to management protocols (SSH, RDP, Telnet), IoT device interfaces, and ICS/SCADA protocols that should never be internet-facing.
Default credentials are the single most exploited weakness discovered through scan databases. Attackers can find devices with default passwords using simple queries. Change all default usernames and passwords on every device , especially IoT devices, ICS components, network equipment, and management interfaces.
Scan databases automatically map discovered software versions to known CVEs. Prioritize patching based on what adversaries can see: services with critical or high-severity vulnerabilities that are exposed to the internet. Focus on web servers, VPN gateways, remote access services, and IoT device firmware.
Isolate OT/ICS networks from IT networks using strict segmentation with allow-list firewalls. Deploy network monitoring to detect scan database reconnaissance patterns and any anomalous connections to your exposed assets. This is critical for detecting follow-on Active Scanning after initial passive reconnaissance.
Service banners reveal software versions to scan databases, enabling automatic CVE mapping. Configure servers, devices, and applications to minimize the information disclosed in banners, headers, and error pages. While this doesn't prevent exploitation, it increases the effort required for attackers to identify specific vulnerabilities.
Implement an ongoing program to monitor your organization's exposure across all major scan databases. New devices, services, and vulnerabilities appear continuously , what's clean today may be exposed tomorrow. Automated monitoring ensures rapid detection and response to new exposures, ideally within hours of appearance.
Many organizations believe their ICS/OT networks are air-gapped when in reality unauthorized 4G gateways, remote access tools, or vendor maintenance connections bridge the gap. Scan databases routinely discover devices that administrators believe are isolated. Always verify isolation by checking scan databases.
Organizations often focus on inbound attack detection while ignoring what's already publicly visible. If you've never searched Shodan or Censys for your own organization, you're operating blind. Adversaries check daily , you should too. This is the single most impactful mistake.
IoT devices, security cameras, industrial controllers, and network equipment frequently ship with factory-default passwords that are well-known and cataloged. Shodan queries for specific device types with default credentials return thousands of results instantly.
RDP (3389), SSH (22), Telnet (23), SNMP (161), and web management interfaces on routers, switches, and firewalls should never be directly accessible from the internet. These are the highest-value targets for scan database reconnaissance.
Expired, misconfigured, or leaked SSL/TLS certificates reveal domain names, subdomains, and organizational details in public certificate transparency logs. Attackers use these to discover shadow IT assets, staging environments, and internal service names.
Proactively search Shodan, Censys, FOFA, and ZoomEye for your organization's IP ranges, domains, and certificates on a regular schedule. Document findings, track trends over time, and remediate exposures before adversaries exploit them. Automate these queries using APIs.
Every internet-facing service should have multiple layers of protection: network firewalls, WAF for web services, MFA for remote access, encrypted protocols, and regular patching. No single control should be the sole defense for an exposed service.
You cannot protect what you don't know exists. Cross-reference your asset inventory against scan database results to identify orphaned, forgotten, or shadow IT assets. Many breaches begin with devices the security team didn't know were connected to the internet.
Set up automated alerts for any changes in your organization's scan database footprint , new services appearing, software versions changing (potentially indicating compromise), or new CVE associations. Shodan Monitor and Censys ASM provide these capabilities natively.
Assume that any device visible in a scan database can and will be targeted. Implement zero-trust principles: verify every connection, authenticate every user, encrypt all traffic, and minimize implicit trust based on network location. This is especially critical for network security appliances that are themselves exposed.
org:target port:3389 country:US to build a complete inventory of exposed RDP services without generating any network traffic detectable by the target.Understanding how attackers abuse scan database intelligence helps defenders identify precursor activities and potential compromise indicators. The following patterns represent common exploitation pathways where scan database reconnaissance serves as the critical enabler.
Adversaries search for internet-facing industrial protocols (Modbus TCP port 502, DNP3 port 20000, S7comm port 102, BACnet port 47808). These protocols were designed for trusted networks and provide zero authentication or encryption. Exposure in scan databases enables immediate unauthorized command injection to physical processes.
Critical SeverityScan databases reveal devices responding with default credentials. Adversaries use Shodan queries like product:"Hikvision" default password to find thousands of vulnerable cameras and DVRs. These become initial footholds for lateral movement and botnet recruitment. Volt Typhoon specifically targeted devices with weak authentication for persistent access.
Open RDP (port 3389) exposed to the internet is the most common initial access vector discovered through scan databases. Attackers find RDP services with known vulnerabilities (BlueKeep CVE-2019-0708, CVE-2024-21307) or weak credentials, then exploit them for ransomware deployment or espionage. CISA AA24-326A documented this exact pattern.
Critical SeverityScan databases automatically map software versions to CVEs. Adversaries use this to find devices with known exploited vulnerabilities (CISA KEV catalog). When a new critical CVE is published, attackers can find all vulnerable devices within hours using Censys or Shodan filters, exploiting them before organizations can patch , creating a race against time.
High SeverityCertificate transparency logs and scan database TLS metadata reveal internal domain names, subdomains, organizational structure, hosting providers, and technology stack. Adversaries use this to discover shadow IT assets, staging environments, and internal service names that inform subsequent domain property reconnaissance and IP address discovery.
High SeverityDetailed software version information from service banners enables precise exploit selection. An attacker discovering "Apache/2.4.49" knows immediately that CVE-2021-41773 (path traversal) and CVE-2021-42013 are exploitable. This version-to-exploit mapping, automated by scan databases, removes the guesswork from vulnerability scanning and enables one-shot exploitation attempts.
High SeverityUse these queries in your SIEM, IDS, or log analysis tools to detect scan database reconnaissance activity targeting your organization:
| Hunting Query | Purpose |
|---|---|
| source_ip IN (shodan_scanner_ranges) AND destination_port IN (3389,22,80,443) | Detect scan database crawlers probing your exposed services |
| http_user_agent CONTAINS "Shodan" OR "Censys" OR "ZoomEye" | Identify active scan database enumeration attempts |
| connection_to_port_502 OR connection_to_port_102 OR connection_to_port_20000 | Detect any connections to ICS/SCADA protocol ports |
| ssl_cert_issuer CONTAINS "Let's Encrypt" AND destination_port = 502 | Detect suspicious TLS on ICS protocol ports (indicates unauthorized gateway) |
Your organization's devices are visible in scan databases at this very moment. The question isn't whether adversaries can find your exposed assets , they already have. The question is whether you'll find them first. Take 15 minutes today to search for your organization on Shodan and Censys. What you discover may surprise you.
Have questions about scan database reconnaissance, your organization's exposure, or defensive strategies? Want to share your experience discovering unexpected assets in Shodan or Censys? We encourage cybersecurity professionals, students, and concerned organizations to ask questions, share insights, and discuss mitigation strategies in the comments below.
Discussion Prompts: What was the most surprising device you found exposed in a scan database? How quickly does your organization remediate new exposures? Have you implemented automated scan database monitoring? What challenges did you face? Share your thoughts and help the community learn from real-world experiences defending against scan database reconnaissance.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.