Acknowledging HTTPS connections from 188.95.234.6

You may have found our site due to our research scans. We are a research team from Technische Universität München, Germany. If we have disturbed your network activities, please accept our apologies. Here is an explanation what we are doing.

Did you register a port scan and/or TLS connection on ports 443?

You may have found our site due to our research scans. We are a research team from Technische Universität München, Germany. If we have disturbed your network activities, please accept our apologies. Here is an explanation what we are doing.

Mail address for complaints

Please use lir-abuse@net.in.tum.de or our contact form. Use our contact form to request blacklisting - please add the affected IP range, we are happy to blacklist at once. We'd rather blacklist your network; but if you want to do the same with ours, please use 188.95.234.6/32 or, if your software does not allow /32, 188.95.234.0/24. We appreciate if you let us know - thanks!

Did you register a port scan on UDP/53, TCP/53 or TCP/23?

You may have found our site due to our research scans. We are a research team from Technische Universität München, Germany. If we have disturbed your network activities, please accept our apologies. Here is an explanation what we are doing.
Mail address for complaints
Please use lir-abuse@net.in.tum.de or our contact form. Use our contact form to request blacklisting - please add the affected IP range, we are happy to blacklist at once.

Tags: 

Did you register a port scan?

You may have found our site due to our research scans. If we have disturbed your network activities, please accept our apologies. Here is an explanation what we are doing.

Mail address for complaints

Please use lir-abuse@net.in.tum.de or our contact form. Use our contact form to request blacklisting - please add the affected IP range, we are happy to blacklist at once.

Tags: 

Announcing SSH scans on port 22, IPv4-wide

We are announcing SSH scans on port 22, IPv4-wide.
Note to server operators: you might have found this article because we have scanned your SSH server - welcome to our site, and apologies in advance if we have disturbed your network activities! If you want to be blacklisted, please reply to the abuse address in the WHOIS or write straight to our LIR abuse address. You can also write to the mail address on this site.

SSL/TLS scans on port 443, combined with port 80, IPv4-wide

Our team at the Network Architectures and Services Dept. (I8) of TU München, Germany, has started an IPv4-wide SSL/TLS scan on port 443 (HTTPS). The purpose is purely scientific. This is a large-scale scan, which we expect to last about 5-6 days. The scanning machine is 188.95.234.6. It is not infected, nor is an attack intended.

Tags: 

The root store continues to grow

A few days ago, I took the time to extend agl's tool a little bit to work on older root stores, too. The new tool allows me to do some root store archaeology. My goal was to plot the development of the root store since its beginnings, until the latest revision.

SSL/TLS scans on port 443, IPv4-wide

Our team at the Network Architectures and Services Dept. (I8) of TU München, Germany, has started an IPv4-wide SSL/TLS scan on port 443 (HTTPS). This is the first time we carry out Internet-wide scans on this port. The purpose is purely scientific. However, this is a large-scale scan, which we expect to last about 3 days. The long-term goal are continuous scans.

The scanning machine is 188.95.234.6. It is not infected, nor is an attack intended.

Ongoing SSH scans until April 29th, 2013

You might have found this article because we have scanned your SSH server - welcome to our site, and apologies in advance if we have disturbed your network activities! If you want to be blacklisted, please reply to the abuse address in the WHOIS or write straight to our LIR abuse address. Please note that we are not affiliated with LRZ Munich, who operates the Munich Research Network.

Tags: 

Announcing OONIBear and Crossbear 2.0

We have released the first implementation of Crossbear v1.5 for OONI - nicknamed OONIBear. Check it out on github. There are a few known issues, and we will continue to develop the software. The scheduled full release is September 2013. OONIBear is supported by a grant of the Information Security Coalition.

Pages

Subscribe to pki.net.in.tum.de|crossbear.org RSS