This report identifies devices that have an open IPP (Internet Printing Protocol) service enabled on port 631/TCP. This means anyone can connect to these devices (printers) anonymously. An attacker can abuse such devices for information disclosure including potential access to and manipulation of print jobs. Remote code execution vulnerabilities have also been uncovered in the past on various printer models and could potentially be exploited as well.
For more details behind the scan methodology and a daily update of global IPP scan statistics please visit our dedicated Open IPP scan page.
We first announced the scan in a blog post titled Open IPP Report – Exposed Printer Devices on the Internet.
For more information on our scanning efforts, check out our Internet scanning summary page.
This report was enabled as part of the European Union INEA CEF VARIoT project.