Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»175,000 Exposed Ollama Hosts Could Enable LLM Abuse
    Cybersecurity

    175,000 Exposed Ollama Hosts Could Enable LLM Abuse

    adminBy adminJanuary 31, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    AI jailbreak
    Share
    Facebook Twitter LinkedIn Pinterest Email

    SentinelOne and Censys identified AI infrastructure spanning 175,000 exposed Ollama hosts, operating without the typical guardrails and monitoring that providers implement.

    Over 293 days of research, the security firms made 7.23 million observations distributed across 130 countries and 4,032 autonomous system numbers (ASNs), with 23,000 hosts accounting for most of the activity.

    Roughly half of the identified hosts could execute code, access APIs, and interact with external systems, SentinelOne says.

    The cybersecurity firm explains that a small set of transient hosts accounted for most of the observed activity. Specifically, 13% of the hosts appeared in more than 100 observations (generating nearly 76% of the activity).

    “Conversely, hosts observed exactly once constitute 36% of unique hosts but contribute less than 1% of total observations,” SentinelOne notes.

    The hosts that persistently appeared in observations, SentinelOne says, “provide ongoing utility to their operators and, by extension, represent the most attractive and accessible targets for adversaries.”

    Advertisement. Scroll to continue reading.

    Looking at infrastructure distribution, the cybersecurity firm notes that 56% of hosts were found on fixed-access telecom networks, including consumer ISPs.

    In terms of geographical distribution, China accounted for the majority of hosts, at approximately 30%, followed by the US, at just over 20%. Virginia accounted for 18% of the hosts in the US.

    While the observed behavior pointed toward multi-model deployments, Llama AI models were the most prevalent, followed by Qwen2, Gemma2, Qwen3, and Nomic-Bert, SentinelOne says.

    The cybersecurity firm also discovered that at least 201 hosts were running prompt templates that explicitly remove safety guardrails.

    The exposed hosts, SentinelOne says, could be accessed without authorization, monitoring, or billing controls, and could be abused maliciously at zero marginal cost for the attackers.

    “The victim pays the electricity bill and infrastructure costs while the attacker receives the generated output. For operations requiring volume, such as spam generation, phishing content creation, or disinformation campaigns, this represents a substantial operational advantage,” SentinelOne notes.

    At the same time, these unprotected models could be abused through prompt injections, as the lack of authentication and safety mechanisms results in the AI complying with the attackers’ requests when it comes to information retrieval.

    Hosts on residential and telecom networks could be abused to launder malicious traffic, while those with vision capabilities could be exploited for indirect prompt injection via images, at scale.

    “The exposed Ollama ecosystem represents what we assess to be the early formation of a public compute substrate: a layer of AI infrastructure that is widely distributed, unevenly managed, and only partially attributable, yet persistent enough in specific tiers and locations to constitute a measurable phenomenon,” SentinelOne notes.

    A fresh report from Pillar Security has shown how a threat actor has hijacked and monetized over 30 LLMs as part of Operation Bizarre Bazaar.

    Related: LLMs in Attacker Crosshairs, Warns Threat Intel Firm

    Related: WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation

    Related: Cyber Insights 2026: Quantum Computing and the Potential Synergy With Advanced AI

    Related: Cyber Insights 2026: Threat Hunting in an Age of Automation and AI

    Abuse Enable Exposed Hosts LLM Ollama
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat 2 million LLM sessions reveal about AI discovery
    Next Article I’m sad that my Raspberry Pi can’t do this
    admin
    • Website

    Related Posts

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    Recently leaked Windows zero-days now exploited in attacks

    April 19, 2026

    Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    This $10 accessory has completely transformed my Pixel 10

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    If X Isn’t Working, It’s Not Just You

    April 19, 2026

    Recently leaked Windows zero-days now exploited in attacks

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,398)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (849)
    • Tech Tools & Mobile / Apps (1,672)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    This $10 accessory has completely transformed my Pixel 10

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026

    If X Isn’t Working, It’s Not Just You

    April 19, 2026
    Most Popular
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    • If X Isn’t Working, It’s Not Just You
    • Recently leaked Windows zero-days now exploited in attacks
    • 5 classic series that are guaranteed to turn you into an anime fan
    • I didn’t expect these earbuds to win me over with such a rare feature
    • The Roku App (Official) 13.7.0.8240800 APK Download by Roku, Inc. & its affiliates
    • Android 17 Beta 4 arrives with post-quantum cryptography and new memory limits
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.