You may have found our site due to our research scans. We are a research team from Technische Universität München, Germany. If we have disturbed your network activities, please accept our apologies. Here is an explanation what we are doing.
Mail address for complaints
Please use email@example.com or our contact form. Use our contact form to request blacklisting - please add the affected IP range, we are happy to blacklist at once.
We are announcing SSH scans on port 22, IPv4-wide.
Note to server operators: you might have found this article because we have scanned your SSH server - welcome to our site, and apologies in advance if we have disturbed your network activities! If you want to be blacklisted, please reply to the abuse address in the WHOIS or write straight to our LIR abuse address. You can also write to the mail address on this site.
Our team at the Network Architectures and Services Dept. (I8) of TU München, Germany, has started an IPv4-wide SSL/TLS scan on port 443 (HTTPS). The purpose is purely scientific. This is a large-scale scan, which we expect to last about 5-6 days. The scanning machine is 126.96.36.199. It is not infected, nor is an attack intended.
A few days ago, I took the time to extend agl's tool a little bit to work on older root stores, too. The new tool allows me to do some root store archaeology. My goal was to plot the development of the root store since its beginnings, until the latest revision.
Our team at the Network Architectures and Services Dept. (I8) of TU München, Germany, has started an IPv4-wide SSL/TLS scan on port 443 (HTTPS). This is the first time we carry out Internet-wide scans on this port. The purpose is purely scientific. However, this is a large-scale scan, which we expect to last about 3 days. The long-term goal are continuous scans.
The scanning machine is 188.8.131.52. It is not infected, nor is an attack intended.
We have released the first implementation of Crossbear v1.5 for OONI - nicknamed OONIBear. Check it out on github. There are a few known issues, and we will continue to develop the software. The scheduled full release is September 2013. OONIBear is supported by a grant of the Information Security Coalition.
We have started a new IPv4-wide SSH scan 12 hours ago. This is the same kind of scan that we have conducted in September, November and December. Once again, the purpose is purely scientific. The scanning machine is 184.108.40.206.
It is not infected, nor is an attack intended (we do not attempt to login, in fact we send the most harmless username ever). However, this is a large-scale scan, which we expect to last about a week.
If you feel we should not scan you, we are happy to add you to our blacklist. Please drop us a mail: pki AT net.in.tum.de.