Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1035

Shodan

What is Shodan?

ShodanA search engine that continuously scans the internet and indexes service banners so users can query exposed devices, ports, software versions, and certificates.


Shodan operates a global network of scanners that connect to common ports across the IPv4 space, collect banners and TLS metadata, and store the results in a searchable index. Analysts use Shodan to map their external attack surface, find forgotten assets, hunt for vulnerable software versions, and pivot from a target IP to other hosts that share a banner or certificate fingerprint. The platform exposes a web UI, REST API, and CLI, and provides filters such as port, product, country, organization, and hash. Defensive use cases include external attack-surface management, M and A diligence, third-party risk assessment, and validating that systems are not unintentionally internet-facing.

Examples

  1. 01

    Searching for org:'Acme Inc' to find every internet-facing host that mentions the company in banners.

  2. 02

    Pivoting from a self-signed certificate hash to every other host on the internet presenting it.

Frequently asked questions

What is Shodan?

A search engine that continuously scans the internet and indexes service banners so users can query exposed devices, ports, software versions, and certificates. It belongs to the Defense & Operations category of cybersecurity.

What does Shodan mean?

A search engine that continuously scans the internet and indexes service banners so users can query exposed devices, ports, software versions, and certificates.

How does Shodan work?

Shodan operates a global network of scanners that connect to common ports across the IPv4 space, collect banners and TLS metadata, and store the results in a searchable index. Analysts use Shodan to map their external attack surface, find forgotten assets, hunt for vulnerable software versions, and pivot from a target IP to other hosts that share a banner or certificate fingerprint. The platform exposes a web UI, REST API, and CLI, and provides filters such as port, product, country, organization, and hash. Defensive use cases include external attack-surface management, M and A diligence, third-party risk assessment, and validating that systems are not unintentionally internet-facing.

How do you defend against Shodan?

Defences for Shodan typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Shodan?

Common alternative names include: Shodan.io.

Related terms