See a host’s exposed ports and known CVEs from passive data — then get ready-to-run scan commands for your own machine.
Port Intelligence gives you a host’s attack surface without sending a single packet to the target. It queries Shodan’s InternetDB — a free database of Shodan’s existing internet-wide scans — and returns the open ports, detected CVEs, hostnames and tags it already knows about that IP.
Because the lookup is passive (one API call, like Certificate Transparency), it is safe to run from anywhere and never originates scan traffic. When you need a live scan, the tool builds the exact nmap, naabu, rustscan or masscan command for you to run from a machine you are authorized to test from.
No. It reads Shodan’s existing scan data via a single API call — nothing is sent to the target. For an active scan, use the generated commands from a host you are authorized to scan from.
Shodan may not have indexed the IP, or the domain resolves to a CDN/WAF edge (e.g. Cloudflare) rather than the origin. The tool flags CDN cases; use the scan commands against the real origin when you have it.
No — only public addresses are accepted; private and reserved ranges are rejected.