Identifying device vulnerabilities with Shodan