Thank you!

Your scan has been queued and should begin in the next 3-5 minutes. Once the scan has finished we will email the results from If you do not receive an email from us within 10-15 minutes, check your junk or spam folder.

Wrong Email? No Problem!

Simply resubmit your scan request using the correct email.

We do not share, sell, rent, or trade personally identifiable information with third parties.


  • 1. Ecosystem: It’s a mess. You have no idea where your data is going and what third-party vendors are integrated into the service you are using. The devices become interconnected. One device can now compromise all the others.
  • 2. Technology: It’s wild. It’s becoming more difficult by the day to find standardized solutions or best practices being adopted by everyone. Who built the hardware, is the hardware itself secure, and what about firmware updates?
    One compromised SoC/board can lead to millions of exploitable devices – with no straightforward way or defined practice to fix the vulnerability on all of them at once. Small devices are extremely slow when it comes to encryption and decryption. Modern software libraries solve this problem, but it requires more device memory.
  • 3. Ubiquity: It’s everywhere. You already have a handful of devices surrounding you at the office and at home. In 5 years, you’ll be interacting with dozens of them every day. You’ll start to depend on IoT, rather than seeing it as a “nice to have”.
  • 4. Learning Curve: It’s getting easier and easier to produce. Manufacturers can now create an “IoT Product” with little to no security, using the cheapest hardware and flood the market with it. Online tutorials and manuals rarely mention anything about security best practices, making it an easy topic to avoid when you build your own Internet connected thing.
  • 5. Economics: it’s about making money. Small budgets often mean producing a prototype that’s not secure. That might be okay for a prototype designed for beta testers but effective security must be added before the product hits the market. With time to market being the primary goal, security gets passed over.

Frequently Asked Questions

  • What is the Mirai Botnet?

    Mirai is malware that compromises Linux devices, turning them into remotely-controlled "bots" that can be used as part of a distributed denial of service (DDoS) attack.

    Mirai primarily targets Internet of Things (IoT) devices, such as routers, DVRs and IP cameras. The Mirai botnet has been used in some of the largest known DDoS attacks. This includes the recent takedown of Dyn DNS services, which led to the disruption of major websites and services for millions of users around the world.

  • The scanner identified a vulnerable device on my network. What can I do?

    A device is classified as vulnerable when it can be remotely accessed using one of the passwords in Mirai’s dictionary. You should immediately:

    1. Remove the device from your network.

    2. Contact the device manufacturer for instructions on updating the software or changing the default login credentials.

  • Can you scan my network daily for new exploitable IoT devices?

    Absolutely! You can purchase a monthly subscription for Exploitable IoT Detection for only $5/month!