Close Menu
    Latest Post

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 2026

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    • GHD Speed Hair Dryer Review: Powerful Performance and User-Friendly Design
    • An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years
    • The Next Next Job, a framework for making big career decisions
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
    Security

    Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

    Samuel AlejandroBy Samuel AlejandroJanuary 31, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src vmh8ba featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Image 1

    A recent investigation by SentinelOne SentinelLABS and Censys uncovered a significant “unmanaged, publicly accessible layer of AI compute infrastructure” created by open-source AI deployments. This infrastructure includes 175,000 unique Ollama hosts spread across 130 countries.

    These systems, found in both cloud and residential networks globally, function without the standard security and monitoring protocols typically provided by platform vendors. Over 30% of these exposed systems are located in China, with other significant footprints in the U.S., Germany, France, South Korea, India, Russia, Singapore, Brazil, and the U.K.

    Researchers Gabriel Bernadett-Shapiro and Silas Cutler noted that almost half of the identified hosts possess tool-calling capabilities. This feature allows them to execute code, access APIs, and interact with external systems, highlighting the growing integration of Large Language Models (LLMs) into broader system operations.

    Ollama is an open-source framework designed for users to easily download, run, and manage LLMs locally on Windows, macOS, and Linux. By default, the service binds to the localhost address 127.0.0[.]1:11434. However, a simple configuration change, such as binding it to 0.0.0[.]0 or a public interface, can expose it to the public internet.

    Similar to the recently popular Moltbot (previously Clawdbot), Ollama’s local hosting and operation outside typical enterprise security perimeters introduce new security risks. This situation demands novel strategies for differentiating between managed and unmanaged AI computing resources, according to the researchers.

    Over 48% of the identified hosts expose tool-calling capabilities through their API endpoints. When queried, these endpoints provide metadata detailing the functions they support. Tool calling, also known as function calling, allows LLMs to interact with external systems, APIs, and databases, thereby enhancing their abilities or fetching real-time information.

    Image 2

    The researchers highlighted that “tool-calling capabilities fundamentally change the threat model.” While a text-generation endpoint might produce harmful content, a tool-enabled endpoint can perform privileged operations. They concluded that the combination of inadequate authentication and network exposure represents the “highest-severity risk in the ecosystem.”

    The analysis also found hosts supporting modalities beyond text, such as reasoning and vision. Notably, 201 of these hosts were running uncensored prompt templates, effectively bypassing safety guardrails.

    The public exposure of these systems makes them vulnerable to LLMjacking. In such attacks, malicious actors exploit a victim’s LLM infrastructure for their own benefit, leaving the victim to bear the costs. Potential abuses include generating spam, running disinformation campaigns, cryptocurrency mining, or reselling access to other criminal organizations.

    This risk is not merely hypothetical. A recent report from Pillar Security indicates that threat actors are actively exploiting exposed LLM service endpoints to profit from AI infrastructure access. This activity is part of an LLMjacking campaign named Operation Bizarre Bazaar.

    The investigation uncovered a criminal service operating with three main components: systematically scanning the internet for unauthenticated Ollama instances, vLLM servers, and OpenAI-compatible APIs; validating these endpoints based on response quality; and then selling access at reduced prices via silver[.]inc, a platform functioning as a Unified LLM API Gateway.

    Researchers Eilon Cohen and Ariel Fogel stated that this “end-to-end operation – from reconnaissance to commercial resale – represents the first documented LLMjacking marketplace with complete attribution.” The threat actor identified behind this operation is known as Hecker (also referred to as Sakuya and LiveGamer101).

    The decentralized nature of the exposed Ollama ecosystem, spanning both cloud and residential environments, introduces significant governance challenges. It also opens new possibilities for prompt injections and the proxying of malicious traffic through compromised victim infrastructure.

    The companies emphasized that “the residential nature of much of the infrastructure complicates traditional governance and requires new approaches that distinguish between managed cloud deployments and distributed edge infrastructure.” They advised defenders to recognize that LLMs are increasingly being deployed at the edge to convert instructions into actions. Therefore, these systems must be secured with the same authentication, monitoring, and network controls applied to any other externally accessible infrastructure.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBangladesh Sees Surge in Air Fryer Sales Amid Persistent Gas Crisis
    Next Article Obsbot Tiny 3: A Gimbal Webcam That Struggles to Justify Its $350 Price
    Samuel Alejandro

    Related Posts

    Security

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026
    Security

    An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

    February 21, 2026
    Tech

    Google Introduces Lyria 3: A Free AI Music Generator for Gemini

    February 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202513 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 202511 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 20260 Views

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 20260 Views

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 20260 Views
    Recent Posts
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.