TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

IPv4 Census - Port scanning /0 using insecure embedded devices

29 pointsby jenrzzzabout 12 years ago

4 comments

jychangabout 12 years ago
This is pretty amazing if true. A census - not a sample! - of the entire IPv4 address space tells us a lot about the internet.
16sabout 12 years ago
Where is the source code to his bot? I don't see it. Maybe I over-looked it. Without seeing source code, I find this story hard to believe.<p>Also, who is the person behind it? The PGP key published is to an anon Gmail account internetcensus2012@mail.com.<p>If the story is true, the legal liability of doing this may be the reason the author is hiding his/her identity.
评论 #5395304 未加载
评论 #5394618 未加载
shuraneabout 12 years ago
It's pretty rad. That's an effectively big botnet. I wonder if it's possible to have a breakdown of residential vs enterprise for the boxes he's connected to. Maybe a sample of the local subnet? Or doing port scanning on the internal network too, and judging based on network size?
viraptorabout 12 years ago
What I really wanted to see is whether anyone has found the readme file and contacted the author. Unfortunately the author doesn't mention this.<p>I'd expect that a couple of hosts he got into were honeypots.