Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>(I wouldn't rule out that you may be hinting to Shodan that these particular IPs are valid though!)

For those of us on IPv4, eh. Only 4 billion addresses, and with a lot of that itself tied up in various large /8s to a few specific organizations many of which can be assumed to be beyond casual level, it's just no longer a real haul to scan everything all the time at a basic level. Plus for those of us browsing from our main address we're leaving a trail all over the web anyway through a host of poorly secured servers. So I while I don't disagree it's worth thinking about information leaks and honey pots and the like whenever dealing with infosec in any way, in this specific case I also don't think this reveals anything of significant value.




Supporting your point: With zmap (https://zmap.io/) you can scan IPv4 in 45 mins using a 1 Gb pipe, or in 5 mins on a 10 Gb pipe.


Wait, why does a port scan need to transfer > 30 GiB of data?

Or do you mean all of IPv4?


All of the internet yes


Not IPv6


i'd say that hosts which cannot reach ipv4 addresses are not part of 'the internet' (thou they are part of 'a network')


Full UDP range?


On a beefy enough host, you could probably run massscan[1] while out at lunch and probably touch every ipv4 host on the internet.

https://github.com/robertdavidgraham/masscan




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: