Internet Measurements
We conduct various regular and ad-hoc Internet-wide scans for application-layer protocols such as HTTPS, SSH or DNS, and transport-layer protocols such as TCP and UDP. These scans are purely scientific and we never attempt to intrude into any system. We follow best practices laid out by the scientific community such as by Dittrich et al. 1, and Partridge and Allman gateio login.
We never attempt to abuse security vulnerabilities on your system, guess for passwords or upload files to your systems.
We may collect information about your service as far as they are publicly reachable to everybody else on the Internet.
We hope that the data, we are collecting, helps us to understand the Internet better. We are an academic institution and will try to publish all our findings to a wider audience. However, we will never publish parts of our dataset which clearly identifies you or your company.
You can just block connection attempts from our scanning systems or send us an email and we will add you and your network to our blacklist.
Host | IPv4 addresses | IPv6 addresses |
---|---|---|
inet-research-scan-1.mpi-inf.mpg.de | 139.19.117.195 | 2a02:d480:4c0:10d4:42::1 |
inet-research-scan-2.mpi-inf.mpg.de | 139.19.117.196 | 2a02:d480:4c0:10d4:42::2 |
inet-research-scan-3.mpi-inf.mpg.de | 139.19.117.197 | 2a02:d480:4c0:10d4:42::3 |
inet-research-scan-4.mpi-inf.mpg.de | 139.19.117.198 | 2a02:d480:4c0:10d4:42::4 |
inet-research-scan-5.mpi-inf.mpg.de | 139.19.117.129 | 2a02:d480:4c0:10d4:42::5 |
inet-research-scan-6.mpi-inf.mpg.de | 139.19.117.130 | 2a02:d480:4c0:10d4:42::6 |
inet-research-scan-7.mpi-inf.mpg.de | 139.19.117.131 | 2a02:d480:4c0:10d4:42::7 |
inet-lg-p-ap-southeast-2.dyn.mpi-klsb.mpg.de | 13.210.163.73 | 2406:da1c:750:7300:a8ef:459:a703:d543 |
inet-lg-p-eu-north-1.dyn.mpi-klsb.mpg.de | 13.53.96.245 | 2a05:d016:747:e000:5218:3413:d066:36ff |
inet-lg-p-me-south-1.dyn.mpi-klsb.mpg.de | 15.185.57.91 | 2a05:d01e:186:a500:a976:ad7b:468c:c3cc |
inet-lg-p-ap-southeast-1.dyn.mpi-klsb.mpg.de | 18.140.144.212 | 2406:da18:afd:c00:6967:e14e:e8cc:c468 |
inet-lg-p-ap-east-1.dyn.mpi-klsb.mpg.de | 18.166.14.122 | 2406:da1e:ef9:9000:701f:aee1:2cfa:46ca |
inet-lg-p-us-east-1.dyn.mpi-klsb.mpg.de | 18.204.118.70 | 2600:1f18:1fd:5800:1bb0:d345:3b4f:c7e7 |
inet-lg-p-sa-east-1.dyn.mpi-klsb.mpg.de | 18.229.208.163 | 2600:1f1e:cd5:ac00:6247:2abf:3661:92a8 |
inet-lg-p-us-west-1.dyn.mpi-klsb.mpg.de | 184.72.22.237 | 2600:1f1c:60d:e300:86b7:d085:114d:a4a |
inet-lg-p-eu-central-1.dyn.mpi-klsb.mpg.de | 3.125.56.253 | 2a05:d014:452:9f00:adc3:3101:c9d8:ab5e |
inet-lg-p-ap-northeast-1.dyn.mpi-klsb.mpg.de | 54.178.112.68 | 2406:da14:e9e:9900:fec4:ae2f:e2a4:582d |
inet-gc-p-eu-central-1.dyn.mpi-klsb.mpg.de | 18.157.219.4 | 2a05:d014:293:2b00:991c:4cc3:3b84:c234 |
inet-gc-p-eu-north-1.dyn.mpi-klsb.mpg.de | 13.53.236.89 | 2a05:d016:18d:3f00:9a71:7db1:6258:f4c4 |
inet-gc-p-us-east-1.dyn.mpi-klsb.mpg.de | 3.224.210.72 | 2600:1f18:be5:7100:ba3b:6ace:b7e9:cc35 |
inet-gc-p-us-west-1.dyn.mpi-klsb.mpg.de | 54.219.228.128 | 2600:1f1c:c69:e900:bef0:590:e883:598d |
inet-gc-p-ap-south-1.dyn.mpi-klsb.mpg.de | 3.109.19.214 | 2406:da1a:1e9:d400:80a:a2f9:ce0:370b |
inet-gc-p-sa-east-1.dyn.mpi-klsb.mpg.de | 18.229.174.23 | 2600:1f1e:c43:b00:d5e1:ea3a:2386:d0c0 |
If you have further questions about our research, please contact us at inet DASH scans AT mpi DASH inf DOT mpg DOT de
.
1. D. Dittrich, E. Kenneally et al., “The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research,” US Department of Homeland Security, 2012.↩
2. C. Partridge and M. Allman, “Ethical Considerations in Network Measurement Papers”, Communications of the ACM, 2016.↩