Misconfigured RDP can allow miscreants access to the desktop of a vulnerable host and can also allow for information-gathering on a target host, as the SSL certificate used by RDP often contains the system’s trivial hostname.
For more details behind the scan methodology and a daily update of global RDP scan statistics please visit our dedicated Accessible RDP scan page.
For more information on our scanning efforts, check out our Internet scanning summary page.