I. Introduction
Industrial control systems (ICS) are pervasive and control critical infrastructure ranging from power grids and chemical manufacturing plants to the environmental monitoring and fire suppression controls in commercial buildings. These systems communicate over a myriad of domain and manufacturer specific protocols that have grown organically over the past 40 years, including Modbus, BACnet, DNP3, and Siemens S7. Originally designed to operate in a closed environment, these protocols have no built-in security. However, despite this, protocols were layered on Ethernet and TCP/IP, and inevitably devices have been connected to the public Internet to support remote monitoring and management. In this paper, we investigate the devices exposed on the Internet and the malicious actors searching for them.