Cross icon
Test your LLM for oversharing!  Test for real-world oversharing risks with role-specific prompts that mimic  real workplace questions. FREE - Start Now
protect icon

A new era requires a new set of solutions
Knostic delivers it

Skip to main content
Skip to main content

Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fingerprinted and mapped production MCP servers. All servers we discovered were insecure and revealed their capabilities to anyone asking.

In this series of posts, we are sharing our findings, along with a guide detailing how we fingerprinted MCP servers.

We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually verified a sample of 119. All 119 servers granted access to internal tool listings without authentication.

While only servers exposed to the internet were tested, and many others may be running on private networks, the number we identified is relatively low, suggesting that adoption still has a long way to go.

None of the servers were secure, and many were unstable when we connected to them and exhibited various bugs. This further indicates the relatively low maturity of the technology and its current stage of adoption. 

From this, we can conclude that while the technology is being actively explored and adopted, it remains in the early stages of the adoption curve.

The systems’ low stability and lack of security are significant concerns. It suggests that, as with previous technologies, security may only be actively introduced after widespread exploitation has already occurred. 

How We Did It

MCP was not originally released with security in mind. Using Shodan and a suite of custom Python tools, we fingerprinted and mapped production servers that responded to unauthenticated, protocol-compliant handshake requests. These servers openly revealed their capabilities to anyone who knew how to ask the right questions.

We began by researching the distinctive traits of MCP servers to support accurate fingerprinting. We then trained Shodan to recognize these traits using a script that contains more than 100 Shodan filters.

The filters capture multiple dimensions of an MCP server's identity, including:

  • Protocol Markers:

We searched for protocol-defined values such as "jsonrpc": "2.0" and "method": "initialize", which directly indicate a compliant server.

  • Transport Signals:

We identified the use of Server-Sent Events by filtering for the text/event-stream content type. When combined with filters referencing MCP content, this approach helped isolate relevant results.

  • Endpoint Paths:

We searched for common URLs such as /mcp, /messages, and /api/mcp, which are often left in default configurations or linked from a homepage.

  • Technology Fingerprints: 

Headers such as Server: uvicorn indicate the use of Python frameworks like FastAPI. When seen with MCP terms, these headers strengthened the attribution.

This was not a one-time task but an iterative cycle of discovery. We began with broad queries, analyzed the results, identified new patterns in server banners, and continuously refined our search criteria. By layering filters across content, transport, endpoints, and headers, we improved accuracy and developed a detailed map of exposed MCP servers.

To explore our methodology in more detail, see these technical walk-throughs: How to Find an MCP Server with Shodan, and Automating MCP Server Discovery with Claude Sonnet 4. Exposing the Unseen 1

Exposing the Unseen 2

Using the official MCP Inspector tool to connect to an exposed, unauthenticated MCP server

How We Verified Them

Once a server was identified as likely running MCP, the next step was to determine whether it was functional. We did this by issuing a safe, read-only tools/list request. This is the MCP equivalent of asking, "What can you do?" without actually invoking any tool.

We maintained a strict ethical boundary throughout the research process. At no point did we use tools/call or any command that could trigger actions, incur API usage costs, or alter data. Our goal was purely observational, and we respected responsible disclosure practices by validating exposure without causing impact. 

If a server responded to tools/list with available tool descriptions, we concluded it was not only active but also fully configured and capable of receiving commands. For a detailed overview of the verification steps, see our technical walkthrough: How to Find an MCP Server with Shodan

What It Means 

Our findings reveal a significant number of internet-exposed MCP servers operating in production environments, many lacking authentication or adequate safeguards. These servers respond to handshake requests and expose internal tools without validating the requester’s identity. Effectively, they publicly broadcast their capabilities.

This issue extends beyond a mere configuration oversight. The MCP specification, especially in its earlier versions, does not require authentication by default. As a result, insecure deployments are common. 

Why It Matters

Without intervention, organizations may continue deploying MCP services that expose sensitive functionality to unauthenticated users.

Data Leakage Detection and Response for Enterprise AI Search

Learn how to assess and remediate LLM data exposure via Copilot, Glean and other AI Chatbots with Knostic.

Get Access

Mask group-Oct-30-2025-05-23-49-8537-PM

The Data Governance Gap in Enterprise AI

See why traditional controls fall short for LLMs, and learn how to build policies that keep AI compliant and secure.

Download the Whitepaper

data-governance

Rethinking Cyber Defense for the Age of AI

Learn how Sounil Yu’s Cyber Defense Matrix helps teams map new AI risks, controls, and readiness strategies for modern enterprises.

Get the Book

Cyber Defence Matrix - cover

Extend Microsoft Purview for AI Readiness

See how Knostic strengthens Purview by detecting overshared data, enforcing need-to-know access, and locking down AI-driven exposure.

Download the Brief

copilot-img

Build Trust and Security into Enterprise AI

Explore how Knostic aligns with Gartner’s AI TRiSM framework to manage trust, risk, and security across AI deployments.

Read the Brief

Image-1

Real Prompts. Real Risks. Real Lessons.

A creative look at real-world prompt interactions that reveal how sensitive data can slip through AI conversations.

Get the Novella

novella-book-icon

Stop AI Data Leaks Before They Spread

Learn how Knostic detects and remediates oversharing across copilots and search tools, protecting sensitive data in real time.

Download the Brief

Solution Brief

Accelerate Copilot Rollouts with Confidence

Equip your clients to adopt Copilot faster with Knostic's AI security layer, boosting trust, compliance, and ROI.

Get the One-Pager

cover 1

Reveal Oversharing Before It Becomes a Breach

See how Knostic detects sensitive data exposure across copilots and search, before compliance and privacy risks emerge.

View the One-Pager

cover 1

Unlock AI Productivity Without Losing Control

Learn how Knostic helps teams harness AI assistants while keeping sensitive and regulated data protected.

Download the Brief

safely-unlock-book-img

Balancing Innovation and Risk in AI Adoption

A research-driven overview of LLM use cases and the security, privacy, and governance gaps enterprises must address.

Read the Study

mockup

Secure Your AI Coding Environment

Discover how Kirin prevents unsafe extensions, misconfigured IDE servers, and risky agent behavior from disrupting your business.

Get the One-Pager

cover 1
bg-shape-download

See How to Secure and Enable AI in Your Enterprise

Knostic provides AI-native security and governance across copilots, agents, and enterprise data. Discover risks, enforce guardrails, and enable innovation without compromise.

195 1-min
background for career

What’s next?

Want to solve oversharing in your enterprise AI search? Let's talk.

Knostic offers the most comprehensively holistic and impartial solution for enterprise AI search.

protect icon

Knostic leads the unbiased need-to-know based access controls space, enabling enterprises to safely adopt AI.