Shodan
Overview
The Shodan integration connects the Praetorian Guard Platform (PGP) with Shodan's internet intelligence platform to import internet-facing assets, open ports, service banners, and vulnerability data. Shodan continuously scans the entire IPv4 address space, and this integration brings that external perspective into PGP to enhance your attack surface visibility.
Understanding what your organization exposes to the internet is fundamental to effective security. Shodan identifies services, protocols, and software running on internet-facing IP addresses and domains, including systems that may not be known to your internal asset inventory. By integrating Shodan with PGP, security teams can discover shadow IT, forgotten infrastructure, misconfigured services, and known vulnerabilities on their public-facing assets.
This integration uses the Shodan API in a read-only capacity. PGP queries Shodan for host and vulnerability data and does not modify any data in your Shodan account or initiate any active scanning.
What the Integration Does
The Shodan integration queries the Shodan API to retrieve information about internet-facing hosts associated with your attack surface. For each seed domain or IP range configured in PGP, the integration searches Shodan's database to discover associated hosts, their open ports, running services, and known vulnerabilities (CVEs).
The integration imports host records that include detailed banner information for each discovered service. Banners contain protocol-specific metadata such as HTTP headers, SSL certificate details, SSH version strings, and other service fingerprints. This data allows PGP to identify specific software versions and configurations that may be vulnerable.
All operations are strictly read-only. PGP does not modify any data in your Shodan account, and the integration does not perform active scanning. All data comes from Shodan's existing passive scan database.
Prerequisites
Before setting up the Shodan integration, ensure you have:
A Shodan account with API access (a paid membership plan is recommended for sufficient query credits)
A Shodan API key from your account settings
Seed domains or IP ranges already configured in PGP that you want to enrich with Shodan data
Obtaining an API Key
Sign in to [Shodan](https://account.shodan.io/).
Navigate to your Account page.
Your API key is displayed on the account overview. Copy it for use in PGP.
Verify your membership plan includes sufficient query credits for the number of assets you plan to monitor. The free tier has limited query credits; a paid plan (e.g., Membership or Small Business) is recommended.
Setup
In PGP, navigate to the Integrations page.
Select Shodan from the list of available integrations.
Enter your Shodan API key in the configuration form.
Save the integration. PGP will validate connectivity to the Shodan API automatically.
Field Reference
What Data Is Synced
Internet-Facing Hosts (Assets)
The integration imports hosts discovered by Shodan as assets into PGP.
Open Ports and Services (Assets)
For each host, the integration imports detailed service information for every open port.
Vulnerabilities (Risks)
Shodan maps known vulnerabilities to discovered services based on software version and configuration.
API Endpoints Used
The integration uses pagination for search queries and respects Shodan API rate limits (typically 1 request per second for most plans). All requests are authenticated using the API key as a query parameter.
Required API Permissions
Troubleshooting
Security and Data Handling
The Shodan integration operates in a strictly read-only mode. It queries Shodan's existing scan database and does not initiate active scans, modify account settings, or alter any data within Shodan.
Credentials are handled securely within PGP. The Shodan API key is encrypted at rest and used exclusively for authenticating API requests during sync operations. The key is not exposed in logs or transmitted to any third party.
PGP imports only host metadata, service banners, and vulnerability references from Shodan. No exploit code, payload data, or offensive tooling is accessed or stored. All imported data originates from Shodan's passive internet scanning and publicly available information.