Figure 4

Figure 4: Results of Shodan/Metasploit search.