Tutorial
4 min read
How to Find Exposed Remote Desktop (RDP) Servers
Discover Windows machines with RDP exposed to the internet — a major attack vector.
1
Search for RDP services
RDP runs on port 3389 by default and is one of the most targeted services.
2
Check for BlueKeep vulnerability
CVE-2019-0708 (BlueKeep) allows unauthenticated RCE on older Windows systems.
lightbulb
BlueKeep affects Windows 7, Server 2008, and Server 2008 R2.
3
Filter by country
Find RDP servers in a specific country.
4
Search by organization
Assess RDP exposure for a specific org.
shield Remediation & Hardening
- check_circle Use a VPN or SSH tunnel instead of exposing RDP directly
- check_circle Enable Network Level Authentication (NLA)
- check_circle Use strong passwords and account lockout policies
- check_circle Keep Windows updated — patch BlueKeep and related CVEs
- check_circle Consider using Azure AD / Entra ID conditional access
- check_circle Monitor RDP logs for brute-force attempts
Try It Now
Search for RDP across 85M+ indexed hosts — free, no registration required.
search Search RDPlink Related Resources
More How-To Guides
school
How to Find Exposed Redis Servers
school
How to Find Exposed MongoDB Databases
school
How to Find Exposed Elasticsearch Clusters
school
How to Find Exposed Jenkins Servers
school
How to Find Exposed Docker APIs
school
How to Find Exposed MySQL Databases
school
How to Find Exposed Kubernetes Clusters