Lately, I noticed that "Google Bots" has been using our site and scanning thousand of hosts per day. You know what that means? Well, now you can google for vulnerable sites and it will show the results from our scanning tool. Just choose a vulnerable application (or version you are looking for) and restrict to site:http://sucuri.net.
For example:
<a href="http://www.google.com/search?hl=en&as_q=&as_epq=Server+nginx+&as_oq=&as_eq=&num=10&lr=&as_filetype=&ft=i&as_sitesearch=sucuri.net&as_qdr=all&as_rights=&as_occt=any&cr=&as_nlo=&as_nhi=&safe=images">Search Looking for all Nginx web servers</a>
<a href="http://www.google.com/search?hl=en&lr=&q=%22Server+nginx+%22+site%3Asucuri.net+%220.4%22&aq=f&oq=&aqi=">Search Looking for all Nginx web servers running version 0.4</a>
<a href="http://www.google.com/#hl=en&q=%22X-Powered-By%3A+PHP%22+site%3Asucuri.net&aq=f&aqi=&oq=&fp=cbc2f75bf9d43a8f">Search for all sites powered by PHP</a>
<a href="http://www.google.com/#hl=en&q=site%3Asucuri.net+%22Wordpress+internal+path%22&aq=f&aqi=&oq=&fp=cbc2f75bf9d43a8f">Search for sites leaking the Wordpress internal path</a>
<a href="http://www.google.com/#hl=en&q=site%3Asucuri.net+%22pointing+to+an+internal+IP+Address%22&aq=f&aqi=&oq=&fp=cbc2f75bf9d43a8f">Sites with their public DNS pointing to private IP addresses</a>
Note that Google just started scanning us that way (a few days ago), so the number of reported sites is likely to increase a lot in the next weeks...