The Server Message Block version 1 (SMBv1), Is a network file-sharing protocol that was created in 1983 at IBM and made its way into Windows in 1992. Microsoft later expanded the protocol and renamed its implementation CIFS, short for the Common Internet File System. It's no surprize that 25 years later it's being abused most notably by ransomware attacks.

This is where security researcher Elad Erez comes in who wrote and released a free tool in June of 2017 that anyone could use to scan a subnet and identify vulnerable devices with the click of a simple .exe program, No installation required.
June | 2017 | Omerez

His tool collects anonymous info that uses Google Analytics to collect anonymized usage data. Collected information includes the number of scanned computers and the number of vulnerable computers found per scan. Erez says the tool doesn't collect hostname information, IP addresses, or any other personal data.

He has updated his site with his findings:
Eternal Blues stats explained | Omerez
In just a month or so, scans taken by Eternal Blues users around the world from 163 countries, over 21 million scanned IPs, 875K hosts still use SMBv1. More than 17K networks had at least one EternalBlue vulnerable host. 134K identified as vulnerable to EternalBlue.

High level stats If we take the top 6 countries, where Eternal Blues was vastly adopted we observe that Russia, Spain, United States and France scanned over 2M IPs each. Ukraine and Germany have scanned over 1M IPs solely.
TenForums users who would like see if any device on their network is vulnerable can download the tool directly from this link.
http://omerez.com/repository/EternalBlues.exe