Created on
07-31-2024
02:07 PM
Edited on
07-20-2025
10:33 PM
By
Anthony_E
Description |
This article describes how to block IoT scans from Shodan.
Shodan uses a variety of filters to find devices, like computers, servers, routers, and firewall. Normally it uses common ports to filter and collect online data. |
Scope | FortiGate. |
Solution |
To block access to Shodan, it is necessary to create a group address object and put the below FQDNs:
Create an address and add all in a group as shown below:
Now, it is possible to create a Deny policy to block traffic accessing the URLs:
If the same configuration should be applied for those services, it is possible to use the same address object in a local-in policy. See this KB article for more info: Technical Tip: Use local-in policy to restrict unauthorized login attempts to administrative access ...
If on a version below v7.2.3, ensure that 'match-vip' is enabled on the policy for it to be effective. See this KB article for more info: Troubleshooting Tip: VIP traffic not matching the firewall policy with an 'all' destination |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.