Shodan — search engine for IoT

Anany sharma
4 min readNov 19, 2021

Shodan is the most popular search engine, it is a search engine like google but google search for websites and webpages but shodan search for the Internet of things (IoT) In simple words Shodan is a database of billions of publicly available IP addresses, and it’s used by security experts to analyze network security. If you’re terrified to discover that your internet-connected devices could be exposed to absolutely anyone, here are some tips to keep your network as secure as possible.

Shodan was created by computer scientist John Matherly as a hobby. Matherly wanted to track any type of device connected to the internet. This is how Shodan became real in 2009.

Well, almost everything! And this is the scary part of Shodan. That is one of the reasons why vice.com calls it the most dangerous search engine in the world. Shodan is able to find from a smartphone to a refrigerator, a security camera system, and even a nuclear plant.

Shodan is a specialist in scanning the internet of things. However, when Shodan performs a deeper search, it gives back results with information such as what type of device is connected to the internet, where is located, and who uses it. For comparison’s sake, Google is the world’s best search engine when it comes to indexing websites properly.

But Shodan is not that bad at all. shodan websites promote the use of the search engine among medium and large companies. For instance, Shodan can help you do empirical market intelligence because it provides the information about those electronic products connected to the internet that people use the most. Shodan is also useful to monitor the computers of your network with internet access.

Working of shodan …..

Basically, Shodan tracks public access devices, preferably in SCADA systems (Supervisory Control and Data Acquisition). SCADA systems are used to control and supervise industrial processes remotely in real-time.

Shodan uses automated search tools that allow massive queries. One of these tools is Shodan Diggity. This tool is powered by a database known as Shodan Hacking Database that works as a kind of dictionary to locate different devices connected to the internet: printers, webcams, routers, transit systems, and, of course, industrial control systems.

An IP address is your device’s digital signature — it’s what allows Google to tailor searches to your location, and it’s what allows all internet-connected devices to communicate with each other.

Internet-connected devices have specific “ports” that are designed to transmit certain kinds of data. Once you’ve established a device’s IP address, you can establish connections to each of its ports. There are ports for email, ports for browser activity, ports for printers and routers — 65,535 ports in all.

When a port is set to “open”, it’s available for access — this is what allows your printer to establish a connection with your computer, for example. The computer “knocks” at the open port, and the printer sends a packet of information called a “banner” that contains the information your computer needs to interact with the printer.

Shodan works by “knocking” at every imaginable port of every possible IP address, all day, every day. Some of these ports return nothing, but many of them respond with banners that contain important metadata about the devices Shodan is requesting a connection with.

Banners can provide all sorts of identifying information, but here are some of the more common fields you will see in a banner:

  • Device name: What your device calls itself online. For example, Samsung Galaxy S21.
  • IP address: A unique code assigned to each device, which allows the device to be identified by servers.
  • Port: Which protocol your device uses to connect to the web.
  • Organization: Which business owns your “IP space”. For example, your internet service provider, or the business you work for.
  • Location: Your country, city, county, or a variety of other geographic identifiers.

Is shodan is dangerous …..?

Shodan can be good or bad, everything depends on the hands that control it. Unfortunately, Shodan is still attractive to cybercriminals and hostile nations interested in activating a large-scale war similar to a cyber Blitzkrieg. Registered users in the Shodan platform can obtain up to 50 results per search. To become a registered user you must pay a fee and explain the reasons why you want to use Shodan.

So beware of cybercriminals and follow or share our page WIZARDING CODES for the latest updates Thank you for your visit — Anany sharma.

--

--

Anany sharma

Security used to be an inconvenience sometimes, but now it’s a necessity all the time. — Martina Navratilova.