CyberLeveling Logo
SMB Exposure Across the EU

SMB Exposure Across the EU: A Service That Should Never Be Public

February 28, 2026

SMB (Server Message Block) is designed for file and printer sharing inside trusted networks. It was never meant to be exposed directly to the public internet.

Yet when we look at Shodan data across the 27 EU member states, we still see significant SMB exposure on port 445. From a security perspective, this is far more serious than FTP or Telnet.

Methodology

EU-27 country filter used:

AT, BE, BG, HR, CY, CZ, DK, EE, FI, FR, DE, GR, HU, IE, IT, LV, LT, LU, MT, NL, PL, PT, RO, SK, SI, ES, SE

Query used:

  • SMB exposure (port 445 responding)

Note: Not every service running on port 445 is necessarily Microsoft SMB, but the vast majority are. This snapshot reflects external visibility, not full protocol validation of each host.


Total SMB Exposure in the EU

Total exposed SMB services: 210,306

CountrySMB Services
Germany (DE)68,279
France (FR)34,243
Netherlands (NL)19,013
Italy (IT)14,954
Finland (FI)12,447
Spain (ES)10,365
Poland (PL)7,639
Portugal (PT)6,164
Sweden (SE)5,744
Hungary (HU)5,372
Czechia (CZ)4,962
Romania (RO)3,582
Lithuania (LT)2,762
Bulgaria (BG)2,043
Austria (AT)1,921
Ireland (IE)1,653
Greece (GR)1,389
Latvia (LV)1,368
Denmark (DK)1,326
Belgium (BE)1,321
Slovakia (SK)1,134
Estonia (EE)813
Croatia (HR)690
Cyprus (CY)453
Slovenia (SI)304
Luxembourg (LU)210
Malta (MT)155

Germany accounts for roughly one-third of all EU SMB exposure, mirroring infrastructure size patterns seen in previous protocol analyses.


What Systems Are Exposed?

The OS fingerprint data reveals a mix of modern and dangerously legacy systems.

Operating SystemInstances
Windows 6.1 (Windows 7 / Server 2008 R2 family)13,219
Windows Server 2016 Standard (14393)9,747
Unix7,644
Windows Server 2012 R2 Standard7,341
Windows Server 2016 Datacenter4,475
Windows Server 2012 R2 Datacenter2,324
Darwin (macOS)1,333
Windows Server 2008 R2 SP11,087
Windows Server 2019 Standard801
Windows Server 2022 Standard548

The prominence of Windows 7 and Server 2008 R2 is a major red flag. If SMBv1 is enabled on these legacy systems, they are trivial targets for wormable exploits like EternalBlue.


Why SMB Exposure Is a Serious Issue

  • Designed for Trust: SMB assumes an internal, trusted network. Exposing it to the WAN is a fundamental violation of security architecture.
  • Authentication Abuse: Publicly reachable SMB ports enable NTLM relay attacks, credential harvesting, and high-speed brute-force attempts.
  • Wormable Exploits: Historically, SMB has been the primary target for some of the most destructive malware in history (WannaCry, NotPetya).
  • Direct Data Access: Successful exploitation or credential theft grants direct access to the file system and potentially the internal network.

Important Context and Limitations

This analysis is based entirely on Shodan data.

Shodan continuously scans internet facing services, but it does not have full visibility. Some hosts may block Shodan scanners. Others may not yet be indexed at the time of analysis.

These numbers represent observed exposure, not a complete census of all internet exposed SMB services. Remember that a service can be on another port and on this research we focused on the specific ports so thats why visibility is not 100% accurate.

It is reasonable to assume the real number is higher.

Additionally:

  • Not every service on port 445 is guaranteed to be SMB
  • OS fingerprinting may not always be exact
  • Some systems may be honeypots or research deployments

Exposure does not automatically mean compromise.

But exposure combined with weak configuration significantly increases the likelihood of compromise.

Final Thoughts

210,306 internet-exposed SMB services across the EU represents a significant and preventable attack surface. SMB is not a public-facing protocol and should remain strictly restricted to internal networks or accessed exclusively via VPN.

Seeing legacy Windows operating systems exposed directly on port 445 indicates a critical failure in perimeter security and patch hygiene that attackers will eventually exploit.