What We Found Across U.S. Critical Infrastructure
Verified by passive discovery. No active probing. No exploitation. The dataset refreshes daily.
Exposed ICS Devices
Industrial control systems reachable from the public internet across the United States.
Direct Internet Reach
Controlling pumps, valves, sensors, and remote sites with no firewall or VPN between the device and any attacker.
Responding Right Now
Live, in production, responding to identity queries from anywhere on the internet.
Unauthenticated Commands
Running native control protocols that accept commands without authentication. Setpoint changes can be sent by anyone who can reach them.
Protocols We See in the Wild
EtherNet/IP, BACnet, Modbus, Fox / Niagara, Siemens S7, DNP3, OMRON FINS, and more. If your facility runs a PLC, an HMI, or a building management system, one of these protocols is involved.