CyberLeveling Logo
What the EU's Internet Looks Like From the Outside

What the EU's Internet Looks Like From the Outside: A Shodan Exposure Research Paper Across 14 Protocols

Research Period: March 1, 2026 to March 7, 2026

Abstract

This paper presents a visibility analysis of publicly reachable network services across all 27 European Union member states, conducted between March 1 and March 7, 2026. Using Shodan indexed data, we examined 14 protocols spanning legacy remote access, relational and NoSQL databases, analytics infrastructure, remote desktop protocols, and industrial control systems.

Total observable exposure across all 14 protocols exceeds 2.85 million publicly reachable services within the EU alone. This research does not constitute a vulnerability assessment. No systems were exploited or accessed beyond what they present publicly. The purpose is to quantify and contextualise the EU's externally visible attack surface.

Important Limitations and Scope Boundaries

Shodan Does Not See Everything

Shodan is comprehensive but has meaningful blind spots. Not every internet-connected device is indexed. The figures in this paper are conservative floor estimates. The actual number of publicly reachable services is likely higher than what Shodan indexes.

Port Does Not Guarantee Protocol

Not every service responding on a given port is the expected protocol. Where fingerprinting confidence is high we note confirmed instance counts. Where it is low we caveat accordingly.

Exposed Does Not Mean Vulnerable

A service being publicly reachable does not automatically mean it is exploitable or misconfigured. Many organisations legitimately expose services with appropriate controls in place. Exposure is a precondition for attack, not an attack itself. What exposure does is increase the number of entities that can attempt to interact with your service. Best practices matter precisely because the gap between exposed and properly hardened versus exposed and misconfigured is the entire difference between a non-event and a critical incident.

Methodology

Research period: March 1, 2026 to March 7, 2026

Scope: All 27 European Union member states

AT, BE, BG, HR, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IE, IT, LV, LT, LU, MT, NL, PL, PT, RO, SK, SI, ES, SE

Data source: Shodan indexed visibility data. All results reflect observable exposure only.

The Full Picture at a Glance

ProtocolPortTotal EU ExposedPrimary Risk
FTP211,302,357Data leakage, anonymous access
RDP3389416,856Brute force, ransomware delivery
MySQL3306233,262Direct database access, legacy exploits
SMB445210,306Wormable exploits, NTLM relay
PostgreSQL5432185,649Credential attacks, CVE targeting
Telnet23121,174Cleartext credentials, botnet targeting
MSSQL143371,655OS command execution, brute force
VNC590069,622Full desktop takeover
Redis637961,718RCE via misconfiguration
MongoDB2701760,534Full database access, ransomware wipe
Modbus50245,129Physical process manipulation
Elasticsearch920042,314Data exposure, unauthenticated API access
Kibana560124,902Log browsing, Elastic stack pivot
Docker API237517,661Full host compromise, no exploit needed

Country Exposure Overview

The table below shows each EU member state's exposure across all 14 protocols. Figures represent Shodan-indexed services on the associated port at the time of collection.

CountryFTP (21)Telnet (23)SMB (445)RDP (3389)Postgr. (5432)MySQL (3306)Redis (6379)Mongo (27017)Elastic (9200)Kibana (5601)VNC (5900)MSSQL (1433)Modbus (502)Docker (2375)
DE436,65217,94167,370162,30287,529196,32725,87520,30713,4877,41517,28718,4689,7574,639
FR197,34915,48433,94252,13423,51199,3768,6336,4057,8354,2938,38710,4025,0392,871
NL126,4867,92818,82358,62124,81267,38710,54215,4537,9424,3576,86811,5454,5913,209
PL94,7128,1027,50311,58544,93358,3461,5101,4341,5611,0982,9662,5201,751916
IT89,11924,56114,85919,8524,74517,7851,1211,1111,6729416,6234,9324,016725
ES70,52010,40310,15722,4824,44727,8341,6481,4131,9701,4215,0365,3023,8281,227
CZ34,5964,0474,83310,1572,4728,1361,2551,2641,1468052,3901,8641,241724
RO28,6504,5303,5224,9562,30213,4197053875193652,3471,8591,200281
FI28,4863,16012,17717,45411,72915,8484,2182,2781,5538433,2111,926524327
HU20,8544,0405,2114,8011,0166,2783202263032171,304601412175
SE20,2293,7465,6388,5254,5588,8331,7481,6481,4671,2502,5051,9314,1181,110
BE16,0126911,2873,8164,9565,0095474,6043632251,0986851,354168
AT15,5791,5241,8493,6311,0523,2974952613542061,105522443161
BG14,5302,7342,0024,2121,2634,8163501221931561,5502,282302113
DK12,9351,0071,3152,3227683,4793071711591186933692,47096
PT11,8082,0986,2043,4297184,5092411734731858061,305322163
IE8,7871,2521,6507,2723,4423,0011,3282,5635794661,7101,907386316
EE8,6493468051,2534302,48612146674736712630739
LT6,9066922,7264,0145163,24820981102603473611,57736
GR6,7051,8591,3782,8975451,8272011691761271,337951351108
CY6,45628444750813829311563947416824511378
SK5,8269401,1191,9096521,7587859715541424924132
LV4,1706161,3461,5255012,274136701166736519535343
HR3,2126306801,8623927267355754628073114735
SI3,1235202971,0225707465038752829928314133
LU1,278862025691409254910321876512418
MT406146149183339021192019834312118
Total1,274,035119,367207,491413,293228,170558,05361,89660,43042,40424,90269,62271,65545,12917,661

*Data collected via Shodan across all 27 EU member states. Research period: March 1, 2026 to March 7, 2026. All queries represent visibility snapshots only and do not constitute exploitation attempts or vulnerability assessments. Not every service on a given port is confirmed to be the associated protocol. Fingerprinting is based on banner data and Shodan indexing methodology. Figures represent conservative floor estimates. Actual exposure may be higher than indexed values.*


Protocol Analysis

1. FTP: The Protocol That Refuses to Retire

Port 21 | Total EU Exposure: 1,302,357

FTP is one of the oldest protocols still running on the internet. Designed before encryption was a consideration, it transmits credentials and data in cleartext. It remains the most widely exposed service in this entire dataset.

Germany alone accounts for roughly one-third of all EU FTP exposure. Out of 1.3 million exposed services, 10,505 allow anonymous login, meaning no credentials are required to connect and browse.

CountryAnonymous FTPRatio
Germany2,183~0.49%
France1,797~0.89%
Poland1,578~1.64%
Italy1,559~1.73%
Netherlands814~0.62%

2. Telnet: A Prehistoric Protocol Still Answering Calls

Port 23 | Total EU Exposure: 121,174

Telnet transmits everything including credentials in cleartext. It has very few legitimate public-facing use cases in 2026. Italy leads EU Telnet exposure at 24,738, ahead of Germany at 18,241 — a notable reversal from every other protocol in this dataset.

ProductInstances
BusyBox telnetd8,229
Cisco router telnetd5,469
Orinoco WAP telnetd1,194
Windows XP telnetd425

3. SMB: The WannaCry Protocol, Still Exposed

Port 445 | Total EU Exposure: 210,306

SMB was designed for file and printer sharing inside trusted networks. Germany accounts for roughly one-third of all EU SMB exposure at 68,279 instances.

Operating SystemInstances
Windows 6.1 (Windows 7 / Server 2008 R2)13,219
Windows Server 2016 Standard9,747
Unix7,644
Windows Server 2012 R2 Standard7,341
Windows Server 2016 Datacenter4,475
Windows Server 2008 R2 SP11,087

4. RDP: Remote Desktop, Remotely Dangerous

Port 3389 | Total EU Exposure: 416,856

RDP has legitimate modern use cases. The problem is how much of it faces the internet directly without layered protection. Germany accounts for nearly 40% of all EU RDP exposure at 163,826 instances.

ServiceInstances
Remote Desktop Protocol387,565
nginx761
OpenSSH365
Hikvision IP Camera94
OpenVPN39
VNC31
MariaDB28
MySQL13
Operating SystemInstances
Windows Server 2022116,126
Windows 10 build 1776372,698
Windows 11 build 2610051,526
Windows 10 build 1904138,785
Windows 10 build 1439337,113
Windows Server 2012 R212,511
Windows 8.1 build 960011,339
Windows 7 / Server 2008 R21,943+

5. PostgreSQL: Database Servers, Publicly Reachable

Port 5432 | Total EU Exposure: 185,649

PostgreSQL powers fintech platforms, SaaS products, government systems, and cloud-native architectures. It is not designed to be internet-facing. Germany leads at 74,128 instances. **Poland ranks second at 31,822**, a significant anomaly compared to its position in most other protocol datasets.

6. MySQL: A Quarter of a Million Database Servers

Port 3306 | Total EU Exposure: 233,262

MySQL is one of the most widely deployed databases in the world. Germany appears in the global top 4 at 84,761 instances.

VersionInstances
5.7.44-log132,946
5.7.23-2367,049
8.0.3655,776
5.6.50-log24,947
5.1.7312,030

7. Redis: Misconfiguration as a Path to Full Compromise

Port 6379 | Total EU Exposure: 61,718

Redis is a high-performance in-memory key-value store designed to run inside trusted networks. Of 61,718 total services, 41,258 are confirmed Redis instances.

8. MongoDB: Databases That Wiped Themselves and Left Notes

Port 27017 | Total EU Exposure: 60,534

MongoDB powers SaaS platforms, mobile backends, and analytics systems. Of 60,534 services, 47,945 are confirmed MongoDB instances.

9. Elasticsearch: The Data That Was Always Open

Port 9200 | Total EU Exposure: 42,314

Elasticsearch is used in logging platforms, SIEM systems, and observability stacks. Only 3,683 are confirmed Elastic instances.

ProductInstances
nginx8,613
Elastic3,683
Prometheus Node Exporter557
Elastichoney (honeypot)534

10. Kibana: The Window Into the Elastic Stack

Port 5601 | Total EU Exposure: 24,902

Kibana provides visualisation and management for Elasticsearch data. Only 9 fingerprint as confirmed Kibana.

11. VNC: Full Desktop Control, Internet-Facing

Port 5900 | Total EU Exposure: 69,622

VNC provides full graphical remote desktop access across platforms. Italy ranks 4th at 6,623 instances.

ProductInstances
VNC (generic)20,302
Apple Remote Desktop VNC8,582
RealVNC Enterprise6,573
SPICE218

12. Microsoft SQL Server: Enterprise Databases, Publicly Visible

Port 1433 | Total EU Exposure: 71,655

MSSQL powers ERP systems, healthcare platforms, and financial applications. Germany leads at 24,128.

ProductInstances
nginx6,125
MS-SQL Server 2019 RTM5,294
MS-SQL Server 2022 RTM4,824
MS-SQL Server 20144,532
MS-SQL Server 2008 R22,199

13. Modbus: Industrial Controllers on the Public Internet

Port 502 | Total EU Exposure: 45,129

Modbus controls physical processes. It has no authentication, encryption, or integrity protection.

ProductInstances
BMX P34 2020386
TM221CE40R165
TM221CE40T153
Modicon M3404

14. Docker API: One Port, Full Host

Port 2375 | Total EU Exposure: 17,661

Port 2375 is the default port for the Docker Remote API over plain HTTP. Only 80 are confirmed Docker instances.

Cross-Protocol Patterns

Germany leads raw exposure across nearly every protocol in this report. The Netherlands and France consistently rank second and third. This reflects infrastructure concentration more than security posture.

Several services in this report can be fully compromised without any exploit. They require only network access and a default or absent configuration. Redis allows RCE via CONFIG and SAVE on unauthenticated instances. Docker API allows full host compromise via privileged container creation. MongoDB pre-3.x allowed full database access without credentials. Elasticsearch pre-6.8 allowed unauthenticated index access. Modbus has no authentication by design.

Recommendations for Defenders

Know What You Expose

Run your own Shodan queries against your registered IP ranges and ASNs before an attacker does. If Shodan can see a service, every automated scanner targeting the internet can see it too. What you find may be surprising. Shadow IT, forgotten test environments, infrastructure inherited through acquisitions, and cloud misconfiguration are common sources of unexpected exposure.

Prioritise by Consequence, Not by Volume

FTP has the highest raw numbers in this dataset but is not necessarily the most urgent remediation target for every organisation. An unauthenticated Redis instance or an exposed Docker API is a more immediate and higher-severity issue despite lower volume across the dataset as a whole. Prioritise based on what an attacker can do with access, not simply on how many services are exposed globally.

Segment Networks Aggressively

Databases, industrial controllers, analytics infrastructure, and internal services should never be reachable from the public internet. Private subnets, VLANs, and firewall allowlisting are not optional security controls. They are baseline architecture decisions that should be made before any service is deployed.

Treat Legacy Systems as Multiplied Risk

Windows XP on Telnet. MySQL 4.x. SQL Server 2008. Modbus PLCs with no authentication path forward. These systems cannot be patched into an acceptable security state. The only viable controls are isolation from internet access, active network monitoring, and planned replacement. Exposure combined with an unsupported software version creates compounded risk that cannot be addressed through configuration hardening alone.

Stop Relying on Obscurity

Non-standard ports do not provide meaningful protection in 2026. Shodan and similar tools scan all 65,535 TCP ports. Moving a service to a non-standard port reduces its appearance in protocol-specific searches but does not prevent discovery by tools that scan broadly. Reduced visibility in one tool does not mean reduced exposure. It means reduced awareness on your own part.

Monitor Continuously

Internet exposure is not a static state. New services are deployed. Firewall rules change. Container environments spin up and expose ports. Cloud configurations drift away from intended baselines. Continuous scanning of your own perimeter from the outside, using the same tools and techniques that attackers use, is the only reliable way to maintain an accurate picture of what you actually expose to the internet.

Conclusions

Across 14 protocols and all 27 EU member states, we identified approximately 2.85 million publicly reachable services carrying meaningful security context.

The exposure documented in this paper is not hidden. It is visible to anyone with a Shodan account and a list of IP ranges to query. That visibility is symmetric. It is available to security teams and attackers alike.

Exposed does not mean compromised. Best practices matter. A publicly reachable PostgreSQL instance with properly configured authentication, TLS enforcement, and tight access rules is a fundamentally different risk profile than one with trust authentication and no network controls. The exposure figures quantify the surface area. What lives behind each port determines the actual risk.

The question is not whether your infrastructure appears in data like this. The question is whether you know it does, and whether you have done enough to ensure that reachability alone is not sufficient for compromise.