Requirements
This method is restricted to security researchers and companies with a Shodan Enterprise Data license. To apply for access to this method as a researcher, please email jmath@shodan.io with information about your project. Access is restricted to prevent abuse.Parameters
Parameter | Description |
---|---|
Port | The port that Shodan should crawl the Internet for. |
Protocol | The name of the protocol that should be used to interrogate the port. See the “ListAvailableProtocols” Action or the /shodan/protocols endpoint for a list of supported protocols. |