If you have reached this page, it is likely because you have observed scans originating from one of this project’s scanners on your network. Please be aware, this activity is in no way being conducted with malicious intent or targeting your organization.
The objective of Project 25499 is to leverage internet wide scanning to responsibly identify to scope of vulnerabilities as well as provide researchers with resources needed to combat malice.
This project is scanning only publicly facing systems. In no ways does this project attempt to bypass technical safeguards or perimeter controls in an attempt to access non-publicly facing systems. Following the model used in previous Internet Scanning projects, our project attempts to adhere to the best practices described in the following two publications: Rapid7: Legal Considerations for Widespread Scanning
and ZMAP: Scanning Best Practices
All scanning activity from this project is conducted at this time from the following hosts:
Following is a list of formerly used hosts:
Scanning is done using a combination of custom tools and ZMap
We fully respect network operators requests to be excluded from scanning. If you wish to opt-out from being scanned, please email us at: opt-out [@] project25499.com
Write-ups / Presentations
- [Port 9001] Is your supervisor web-interface open?
- BSides Rochester 2015: Big Game Hunting: Internet Scan Data and You
If you have any questions, please send them to Questions [@] project25499.com