<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[SSH - Shodan Blog]]></title><description><![CDATA[The latest news and developments for Shodan.]]></description><link>https://blog.shodan.io/</link><generator>Ghost 0.7</generator><lastBuildDate>Fri, 10 Apr 2026 09:32:34 GMT</lastBuildDate><atom:link href="https://blog.shodan.io/tag/ssh/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Hiding in Plain Sight]]></title><description><![CDATA[<p>A common reaction I get when talking about devices exposed on the Internet is something like the following:</p>

<p><img src="https://blog.shodan.io/content/images/2015/03/I-found-115-000-Minecraft-servers-on-the-Internet-in-March--here-s-a-breakdown-of-them---Minecraft.png" alt=""></p>

<p>Specifically, the idea that running the service (in this case Minecraft) on a non-standard port is a good way to stay hidden. In security circles this is also known as the concept</p>]]></description><link>https://blog.shodan.io/hiding-in-plain-sight/</link><guid isPermaLink="false">2abb6390-8107-43e6-a3a9-8bdaf111523b</guid><category><![CDATA[research]]></category><category><![CDATA[SSH]]></category><category><![CDATA[minecraft]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Sun, 29 Mar 2015 06:42:43 GMT</pubDate><media:content url="http://blog.shodan.io/content/images/2015/03/work_in_australia_road.jpg" medium="image"/><content:encoded><![CDATA[<img src="http://blog.shodan.io/content/images/2015/03/work_in_australia_road.jpg" alt="Hiding in Plain Sight"><p>A common reaction I get when talking about devices exposed on the Internet is something like the following:</p>

<p><img src="https://blog.shodan.io/content/images/2015/03/I-found-115-000-Minecraft-servers-on-the-Internet-in-March--here-s-a-breakdown-of-them---Minecraft.png" alt="Hiding in Plain Sight"></p>

<p>Specifically, the idea that running the service (in this case Minecraft) on a non-standard port is a good way to stay hidden. In security circles this is also known as the concept of <strong>security by obscurity</strong>, and it's considered a largely ineffective, deprecated idea. What's worse is that it might give you the owner of the server/ device a false sense of security. For example, lets take a look at people <a href="https://www.shodan.io/report/uMZDnWfT">running OpenSSH on a non-standard port</a> (i.e. "product:openssh -port:22"):</p>

<p><img src="https://blog.shodan.io/content/images/2015/03/Non-Standard-SSH-Ports--March-2015---Shodan.png" alt="Hiding in Plain Sight"></p>

<p>The top 10 non-standard ports for <a href="http://www.openssh.com/">OpenSSH</a> are:</p>

<ol>
<li>2222  </li>
<li>5000  </li>
<li>23  </li>
<li>9999  </li>
<li>26  </li>
<li>666  </li>
<li>2323  </li>
<li>5555  </li>
<li>4444  </li>
<li>10001</li>
</ol>

<p>These numbers don't look that random to me... Right away you should realize that your random choice of non-standard port might not be so unique. Port 2222 is popular the same way that HTTP on port 8080 is popular, and it's also the default port for the <a href="https://github.com/desaster/kippo">Kippo honeypot</a> though I doubt that many people are running honeypots. The next most popular port is 5000, which didn't follow the same pattern as the other ports to me (repeating/ symmetric numbers). And it was around the same time that I realized that Australia was the 2nd most popular country to run OpenSSH on a non-standard port. I decided to take a closer look at Australia, and it turns out that there are nearly the <a href="https://www.shodan.io/search?query=product%3Aopenssh+after%3A01%2F03%2F2015+country%3A%22AU%22">same amount of servers running OpenSSH on port 5000 as they are on the default port 22</a>. About 68,000 devices are running on the default port, and 54,000 on port 5000. Since they're running on a non-standard port Shodan wasn't grabbing the SSH fingerprint or showing more detailed information in the banner, so I checked a few devices manually and they all had the same fingerprint:</p>

<pre><code>5b:a2:5a:9a:91:28:60:9c:92:2b:9e:bb:7f:7c:2e:06
</code></pre>

<p>And I inadvertently stumbled across the same issue as a while ago: <a href="https://blog.shodan.io/duplicate-ssh-keys-everywhere/">Duplicate SSH Keys Everywhere</a>. This time it appears that the Australian ISP <a href="https://en.wikipedia.org/wiki/BigPond">BigPond</a> installs/ configures networking gear that not only runs OpenSSH on port 5000 (most likely for remote management) but also has the same SSH keys installed on all of them. The devices also happen to run an old version of OpenSSH that was released on September 4th 2007. There's no guarantee that running OpenSSH on the default port would've made them more security conscious, but their installation of ~54,000 devices is 25% of the total number of OpenSSH servers on the Internet running version 4.7 (sidenote: the most popular version of OpenSSH is 5.3).</p>

<p>The Minecraft user does mention simple things you can do to improve the security of your device: add a whitelist and change the default credentials. They're easy to do and make a big difference to prevent your device from becoming an easy target!</p>]]></content:encoded></item><item><title><![CDATA[Duplicate SSH Keys Everywhere]]></title><description><![CDATA[<p>Back in December when I <a href="https://shodanio.wordpress.com/2014/12/03/ssh-revamp/">revamped the SSH banner</a> and started collecting the fingerprint I noticed an odd behavior. It turns out that a few SSH keys are used a lot more than once. For example, the following SSH fingerprint can be found on more than 250,000 devices!</p>

<pre><code>dc:</code></pre>]]></description><link>https://blog.shodan.io/duplicate-ssh-keys-everywhere/</link><guid isPermaLink="false">fd2c0c2e-cc15-4af7-8d8a-92b4a07bc790</guid><category><![CDATA[Facets]]></category><category><![CDATA[research]]></category><category><![CDATA[SSH]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Tue, 17 Feb 2015 20:15:22 GMT</pubDate><content:encoded><![CDATA[<p>Back in December when I <a href="https://shodanio.wordpress.com/2014/12/03/ssh-revamp/">revamped the SSH banner</a> and started collecting the fingerprint I noticed an odd behavior. It turns out that a few SSH keys are used a lot more than once. For example, the following SSH fingerprint can be found on more than 250,000 devices!</p>

<pre><code>dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0
</code></pre>

<p>And there are many more fingerprints that are also duplicated, which you can check out yourself using the following Python code:</p>

<pre><code>import shodan

api = shodan.Shodan(YOUR_API_KEY)

# Get the top 1,000 duplicated SSH fingerprints
results = api.count('port:22', facets=[('ssh.fingerprint', 1000)])

for facet in results['facets']['ssh.fingerprint']:
    print '%s --&gt; %s' % (facet['value'], facet['count'])
</code></pre>

<p>Going back to the fingerprint mentioned above, when you <a href="https://www.shodan.io/search?query=dc%3A14%3Ade%3A8e%3Ad7%3Ac1%3A15%3A43%3A23%3A82%3A25%3A81%3Ad2%3A59%3Ae8%3Ac0">plug that into Shodan</a> the picture becomes somewhat clearer:</p>

<p><img src="https://blog.shodan.io/content/images/2015/02/ssh-fingerprint.png" alt=""></p>

<p>It looks like all devices with the fingerprint are Dropbear SSH instances that have been deployed by <strong>Telefonica de Espana</strong>. It appears that some of their networking equipment comes setup with SSH by default, and the manufacturer decided to re-use the same operating system image across all devices.</p>

<p>The next duplicated fingerprint on the list comes in at around 200,000 devices, followed by another one used by 150,000 devices. By analyzing the facets it's easy to get a picture of systemic issues that plague both hardware manufacturers as well as ISPs/ hosting providers. I've uploaded a list of unique fingerprints and their counts to the following Gist location:</p>

<p><a href="https://gist.github.com/achillean/07f7f1e6b0e6e113a33c">https://gist.github.com/achillean/07f7f1e6b0e6e113a33c</a></p>

<p>Feel free to download the CSV and start analyzing the duplicated fingerprints because there are a lot of them. I wouldn't be surprised if you'd uncover interesting security issues by analyzing why these things are misconfigured.</p>]]></content:encoded></item></channel></rss>