TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

IPv4 Census - Port scanning /0 using insecure embedded devices

29 点作者 jenrzzz大约 12 年前

4 条评论

jychang大约 12 年前
This is pretty amazing if true. A census - not a sample! - of the entire IPv4 address space tells us a lot about the internet.
16s大约 12 年前
Where is the source code to his bot? I don't see it. Maybe I over-looked it. Without seeing source code, I find this story hard to believe.<p>Also, who is the person behind it? The PGP key published is to an anon Gmail account internetcensus2012@mail.com.<p>If the story is true, the legal liability of doing this may be the reason the author is hiding his/her identity.
评论 #5395304 未加载
评论 #5394618 未加载
shurane大约 12 年前
It's pretty rad. That's an effectively big botnet. I wonder if it's possible to have a breakdown of residential vs enterprise for the boxes he's connected to. Maybe a sample of the local subnet? Or doing port scanning on the internal network too, and judging based on network size?
viraptor大约 12 年前
What I really wanted to see is whether anyone has found the readme file and contacted the author. Unfortunately the author doesn't mention this.<p>I'd expect that a couple of hosts he got into were honeypots.