Detecting Exposed LLM Servers: A Shodan Case Study on Ollama
Across
- 6. Setup error that creates vulnerabilities
- 7. Restricting request frequency
- 8. Search engine for internet devices
- 10. Servers or services on the Internet
- 12. AI system that processes and generates language
Down
- 1. Verifying identity to control access
- 2. Using others' resources without rights
- 3. Attack using many password attempts
- 4. Network security gateway
- 5. Country leading exposed server count
- 9. Framework for local LLM hosting
- 11. Access without login or restriction