Table: shodan_port - Query Shodan Ports using SQL
Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or anything else that the client can find out before interacting with the server.
Table Usage Guide
The shodan_port
table provides insights into open ports detected by Shodan, the internet's search engine for IoT devices. As a cybersecurity analyst, explore port-specific details through this table, including the services running on these ports, the devices they are connected to, and their geographical locations. Utilize it to uncover information about potential vulnerabilities, such as unsecured ports, outdated server software, and the presence of IoT devices on the network.
Examples
List the ports
Explore which ports are being used in your network. This can help in identifying potential vulnerabilities or unusual activity for security purposes.
select *from shodan_portorder by port;
select *from shodan_portorder by port;
Schema for shodan_port
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form, e.g. connection_name. | |
port | bigint | Port number. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- shodan
You can pass the configuration to the command with the --config
argument:
steampipe_export_shodan --config '<your_config>' shodan_port