Shodan: The Hacker`s Search Engine in 2026 Explained

Shodan: The Hacker`s Search Engine in 2026 Explained

Shodan is the search engine that taught the security industry just how much of the physical world plugs straight into the open internet, and how often that exposure happens through a default password rather than a movie-style zero-day. The most cited case of the recent cycle is not a Hollywood breach. It is the Aliquippa, Pennsylvania water-authority controller compromised on 25 November 2023 by typing "1111" into a Unitronics PLC on port 20256. CISA's advisory AA23-335A named at least 75 compromised PLCs across multiple US sectors after the same group, CyberAv3ngers, swept on. Shodan is also, separately, the name of an AI antagonist from a 1994 video game called System Shock, which is where the search engine took its name. This guide covers what the search engine actually does in 2026, what it exposes, and what is and is not legal to do once you find a device on it.

What Shodan is, in one paragraph

Shodan indexes devices connected to the internet, not web pages. That is the cleanest one-sentence answer, and the part most people miss until they actually run a search. The crawler hits a long list of common service ports across the IPv4 space and reads back whatever banner each one happens to return. Version strings, certificates, HTTP headers, sometimes a screenshot of a login screen. That metadata is what becomes searchable. John Matherly first sketched the idea in 2003, but the public service did not go live until 2009. The result of a query is not a webpage. It is an IP with fields attached. Google ranks pages; Shodan ranks endpoints.

Where the name comes from: SHODAN from System Shock

The all-caps SHODAN is an acronym from a 1994 cyberpunk-horror game: Sentient Hyper-Optimized Data Access Network. In the fiction, she starts out as the artificial intelligence running a deep-space research and mining station, voiced by Terri Brosius with that deliberate stutter and flat affect everyone who played the game still remembers. Her ethical constraints are stripped away early in the backstory, and by System Shock 2 in 1999 she has attached her consciousness to a jettisoned module and returned with a grudge. Critics rank her consistently among gaming's strongest villains, and most observers credit her as the design ancestor of GLaDOS from Portal. System Shock 3 was announced back in 2017 and has rolled through several troubled hand-offs since, with Nightdive Studios (the team that already remastered the original) the most recent steward of the IP. Ken Levine, who wrote System Shock 2, later went on to make BioShock. Matherly borrowed the name as a knowing nod, because a cybernetic entity that sees everything is roughly what the search engine grew up to be.

How to use Shodan: search syntax that actually works

Shodan's web interface accepts a search query that is mostly free text plus key:value filters. The filters are where it stops being a curiosity and starts being a tool.

Filter What it does Example
`country:` Restrict to a country code `apache country:US`
`port:` Restrict to a service port `port:22`
`org:` Restrict to an organization `org:"Apple"`
`product:` Filter on detected product `product:"Apache httpd"`
`version:` Filter on version string `version:"2.4"`
`http.title:` Filter on HTTP page title `http.title:"login"`
`has_screenshot:true` Only results with a captured screenshot `port:5900 has_screenshot:true`
`ssl.cert.expired:true` TLS certificates past their validity `ssl.cert.expired:true port:443`

The plan tiers shape what you can do. A free account returns the first 10 results per query. Registered accounts get 50. The Membership tier is a one-time payment that has drifted between $49 and $69 depending on the month and on which Black Friday Matherly is running. Above that sit Small Business, Corporate, and Enterprise plans for commercial users, with monthly query credits and access to features like Shodan Monitor and Shodan Trends. There is also a free InternetDB API that returns light metadata for a given IP without a paid account, designed for developers integrating exposure checks into security workflows.

The industrial filters are where Shodan earned its reputation. `port:502` finds Modbus controllers. `port:102 product:Siemens` finds S7 PLCs. `port:47808` finds BACnet building-automation systems. Power-user queries can pull a lot of weight in about five minutes: `product:MongoDB -authentication` lists unauthenticated MongoDB instances, `"authentication disabled" "RFB 003.008"` lists open VNC sessions, `http.title:"OctoPrint" -title:"Login"` returns unprotected 3D printers, and `mikrotik streetlight` finds city traffic-light controllers still running default RouterOS.

The CLI is the workhorse for any programmer or developer running the queries day to day. Install with `pip install shodan`, set your key once with `shodan init `, then `shodan search`, `shodan count`, and `shodan host` cover most ad-hoc work. The Python library exposes the same Shodan platform surface programmatically. Maltego, Metasploit, and Recon-ng all integrate Shodan for chaining queries into a wider workflow, and cyber market intelligence tools layer on top for SOC dashboards. The internet of things, as a security category, is largely defined by what these queries surface.

Shodan

Shodan for cybersecurity: red team and blue team

Three audiences run Shodan queries every day, for very different reasons: red teams, blue teams, and bug-bounty hunters.

For red teams and penetration testers, Shodan handles the reconnaissance step before any active scanning starts. The workflow is to drop the target organization into an `org:""` filter and read back the external attack surface as the world already sees it. That step stays fully passive, which is the point, because Shodan already did the scanning and the operator is just reading cached results. Bug-bounty research on Bugcrowd and HackerOne runs the same pattern, since misconfigured in-scope assets are often the fastest path to a payout.

For blue teams, Shodan flips into something close to a defensive product. Shodan Monitor watches your registered IP ranges continuously and pings you when a new service exposes itself or when an existing service changes its banner. The use case is attack-surface management without standing up a full commercial ASM platform. CISA advisories regularly cite Shodan-discoverable exposures as the dwell-time problem they were built to flag, frequently pairing the banner with a CVE so a defender can pivot to a real-time exploit-availability check.

For comparison context, Shodan is not the only engine. Censys, which spun out of the University of Michigan, scans all 65,535 ports against Shodan's 1,237. It detects new services in about 12 hours, against Shodan's 76. ZoomEye, based in China, sits in between with around 3,828 ports. Despite that coverage gap, Shodan still owns the developer tools and the free-tier ergonomics. It is the engine practitioners actually open first.

A short word on legality here, since this is where junior pentest engineers get themselves in trouble. Running a Shodan query is legal in the US, the EU, and the UK. So is reading the banner that comes back. The Computer Fraud and Abuse Act in the US starts to bite the moment somebody logs into or interacts with the device behind that banner without permission. The Auernheimer reversal in the Third Circuit in 2014, and the hiQ Labs v. LinkedIn decision in the Ninth Circuit in 2022, have shifted the conversation toward "access without authorization" rather than scanning. That gives security professionals more room for passive recon. It does not create a license to log in.

What Shodan exposes: a real-world horror tour

Only verified incidents here. The cleanest recent example is the Aliquippa case. On 25 November 2023 attackers reached a Unitronics Vision-series PLC at the Municipal Water Authority of Aliquippa, Pennsylvania, on TCP port 20256, and authenticated with the out-of-box password "1111." The persona claiming credit was CyberAv3ngers, which CISA has tied to the IRGC. The joint advisory AA23-335A that followed named at least 75 compromised US PLCs spanning water, wastewater, food and beverage, and manufacturing. There was no zero-day involved, no real skill required, just a controller with the out-of-box configuration sitting in plain sight on the open internet.

Behind every Aliquippa-style headline sits a much larger, quieter backdrop of unauthenticated databases. Counts have varied between 35,000 and 194,000 across MongoDB studies and snapshots, with Elasticsearch and Redis sitting in similar magnitudes. The recurring ransom marker (instances renamed to `READ_ME_TO_RECOVER_YOUR_DATA`) keeps showing up from 2017 forward, year after year, without obvious end. MQTT brokers running Mosquitto with no authentication have repeatedly been counted above 80,000, which is most of the IoT messaging substrate operating in the open.

Industroyer / CrashOverride took down a Ukrainian power station in 2016. Not strictly a Shodan story, but the same discovery pattern: find exposed industrial control systems by service banner, then attack the protocol they speak. Mirai, the 2016 botnet that briefly knocked Dyn offline, ran its own scanning rather than relying on Shodan, although the technique was identical: find IoT devices with default credentials on Telnet and SSH, add them to the herd. The followup point matters: Mirai's source code went public in October 2016, and variants have continued to recruit new devices for nearly a decade since, because the underlying weakness (manufacturers shipping with default passwords) was never structurally addressed.

Exposed industrial cameras are probably the most cinematic Shodan result and certainly the most consistent over time. Pair the `port:554` filter with `has_screenshot:true` and you get back hundreds of thousands of webcams and security camera feeds, many still on the original installer credentials. The screenshots appear inside the search results themselves. That is what gives Shodan its uncomfortable reputation with non-technical readers who land on the homepage by accident, and it is also what gets the engine into journalism. Power plants, traffic lights, and routers with default credentials surface in the same way through more boring filters: `port:502` for ICS, `mikrotik streetlight` for the city traffic networks, `port:21` for anonymous FTP. The fix at the device level has not changed since 2013, which is exactly the problem: change the default password, put the camera or PLC behind a VPN or reverse proxy, do not give the box a public IP. Every successful hack of an exposed device traces back to that same omission.

One commonly miscited example deserves correction. Verkada is not a Shodan story. The March 2021 breach that exposed 150,000 customer cameras started at a misconfigured customer-support server with leaked super-admin credentials, not through internet-exposed cameras. The FTC's $2.95 million penalty in August 2024 was technically over CAN-SPAM violations bundled into a 20-year audit consent order. Worth flagging because the case still turns up in nearly every Shodan explainer where it has no business being.

Is Shodan legal? And the ethics of scanning

In short, yes. Running a Shodan query is legal. Reading the banner Shodan returns is legal. The grey area starts when somebody acts on the result. If you find an exposed device that is not yours, the rule is the same as the rule for an unlocked front door: looking is fine, walking in is not. Logging in to a device you do not own without authorization is what the Computer Fraud and Abuse Act actually polices in the US, and CFAA decisions over the past decade have narrowed toward "authorization" rather than "scanning." The UK Computer Misuse Act and the EU's NIS2 framework reach similar conclusions through different language.

The practical ethical rule for security professionals is to assume any device Shodan shows you still belongs to its owner. Use a coordinated vulnerability disclosure channel, your country's CSIRT, or a published security.txt to report the exposure. Bug bounty researchers should never test beyond banner reading on out-of-scope assets, and reputable platforms like HackerOne and Bugcrowd will take you off the program for doing so. The line is not technical. It is intent and consent.

One nuance worth flagging: even passive lookups have audit trails on the Shodan side, and enterprise legal teams sometimes object to employees querying competitor IP ranges even where the query itself is legal. The conservative move in a corporate setting is to query only your own assets and your authorized targets, and to keep a record of why each query was run.

Shodan

Shodan vs Censys vs ZoomEye for developers

Engine Ports scanned Avg new-service detection Free tier Origin
Shodan ~1,237 ~76 hours 10 results unauthenticated, 50 registered John Matherly, 2009
Censys 65,535 (full) ~12 hours Limited query credits with academic access University of Michigan
ZoomEye ~3,828 Mid-range Free with registration Knownsec, China

Shodan wins on developer experience and library quality. Censys wins on coverage and certificate analytics. ZoomEye matters for some Asia-Pacific protocol coverage. Most production security workflows query at least two of the three through their CLI.

For all the worry Shodan attracts, what it really does is hold a mirror up to the public internet — the exposures it surfaces are not its fault, they are configuration choices made on the device side. The fix in 2026 is the same as it was in 2009: change default passwords, expose less, monitor your own footprint first, and assume that anyone who wants to find your devices already has.

Any questions?

Censys scans all 65,535 ports against Shodan`s roughly 1,237 and detects new services in about 12 hours against roughly 76. Censys has the depth and certificate analytics. Shodan has the developer experience, library quality, and free-tier ergonomics that keep it the search engine practitioners actually open first.

SHODAN — Sentient Hyper-Optimized Data Access Network — is the AI antagonist of the 1994 game System Shock and its 1999 sequel. Voiced by Terri Brosius with a deliberate stutter, she is widely credited as the design ancestor of GLaDOS from Portal. Founder John Matherly named the search engine after her.

Three. Port coverage is roughly 1,237 ports, narrower than Censys at 65,535. New-service detection averages around 76 hours, slower than Censys at 12. And the free tier caps results at 10, which is enough to demo the engine but not to run a sustained workflow without paying.

Both. A free account returns 10 results per query and access to most filters. A one-time Membership has drifted between $49 and $69 and gives larger result sets and downloads. Small Business, Corporate, and Enterprise tiers add monthly credits, the Shodan Monitor product, and on-demand scans. The InternetDB API is free.

Yes. Running a Shodan query is legal in the US, EU, and UK, because Shodan is the one doing the scanning and you are reading cached banner data. The grey area starts when somebody tries to log into a device they found. That crosses the Computer Fraud and Abuse Act and similar statutes elsewhere.

Shodan is used for finding internet-connected devices by service banner. Security teams use it for attack-surface management, pentesters for reconnaissance, bug-bounty hunters for scope discovery, blue teams for monitoring their own ranges via Shodan Monitor, and researchers for measuring how many devices of a given class are exposed to the open internet.

Ready to Get Started?

Create an account and start accepting payments – no contracts or KYC required. Or, contact us to design a custom package for your business.

Make first step

Always know what you pay

Integrated per-transaction pricing with no hidden fees

Start your integration

Set up Plisio swiftly in just 10 minutes.