RedEye Security indexed every publicly exposed Modbus, EtherNet/IP, DNP3, BACnet, S7, and Niagara Fox device on the internet. No exploitation. No authentication required to read the device identity. Filtered to drop honeypots, decoys, and tarpits.
Maps show device location. Charts rank by state, country, vendor, and protocol. All read-only. No scan endpoints, no exploitation paths exposed to the public.
Every exposed PLC, RTU, and HMI in the US, geolocated. Filter by protocol. Click any device to see vendor, product, and last-seen banner.
Same view, the rest of the planet. Top: Canada (1,955), China (956), Netherlands (817), France (578).
Where exposure concentrates: which states, which vendors, which carriers host the most public ICS.
Global breakdown. Useful for cross-border supply-chain risk and tracking nation-state exposure patterns.
We do free, no-commitment 30-minute scoping calls for water utilities, manufacturers, and critical infrastructure operators. If you're exposed, we'll tell you exactly which device, on which protocol, on which IP — before anyone else points it out.
Talk to RedEye