Cybersecurity Videos
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityVideos1.2M Exposed: WHY Port 23 Is a Nightmare
CybersecurityHardware

1.2M Exposed: WHY Port 23 Is a Nightmare

•February 20, 2026
0
David Bombal
David Bombal•Feb 20, 2026

Why It Matters

Open Telnet ports expose millions of devices to automated attacks, jeopardizing corporate networks and IoT ecosystems; closing them is a low‑cost, high‑impact security measure.

Key Takeaways

  • •Over 1.2 million internet devices expose Telnet port 23.
  • •Legacy Telnet services remain active across 30+ countries worldwide.
  • •Unsecured IP cameras and routers are prime Telnet exploitation targets.
  • •Showdan scans reveal 344,000 Chinese devices listening on Telnet.
  • •Disable unnecessary services and firewall ports to prevent remote hijacking.

Summary

The video highlights that more than 1.2 million internet‑connected devices still run Telnet on port 23, a legacy protocol widely considered insecure. Using the Showdan scanning platform, the creator demonstrates how easily these exposed services can be discovered, underscoring a gap between perceived network hygiene and reality.

The scan reveals roughly 344,000 Chinese devices, 72,000 in the United States, 117,000 in Brazil, and tens of thousands elsewhere that accept Telnet connections. Even Linux‑based systems are not immune; about 12,000 Linux hosts, including Debian and Ubuntu servers, appear online with Telnet enabled. The data illustrates a persistent global footprint of vulnerable legacy services.

The presenter cites comments like “Who still runs Telnet?” and counters them with “Hold my beer,” emphasizing that the threat is not theoretical. Real‑world examples include an IP camera in Canada, a Cisco‑type router in the Philippines, and a Debian server in Italy, all publicly reachable via port 23. He stresses ethical boundaries, refusing to exploit the devices himself.

For enterprises and IoT operators, the findings signal an urgent need to audit network inventories, disable unnecessary services, and enforce strict firewall rules. Leaving Telnet open invites automated scanners and opportunistic attackers, potentially leading to credential theft, ransomware deployment, or broader supply‑chain compromise.

Original Description

Think Telnet is dead? Think again. We used Shodan to find over 1.2 million devices still exposing Port 23. See why leaving your Linux servers or IP cameras open is a massive cybersecurity risk.
#telnet #linux #shodan
0

Comments

Want to join the conversation?

Loading comments...