Scanning the Internet for Vulnerabilities

Ronald F. Guilmette rfg at tristatelogic.com
Tue Jun 21 08:24:28 UTC 2022


In message <4e6319ba-d332-f25e-d128-1b8abc724039 at si6networks.com>, 
Fernando Gont <fgont at si6networks.com> wrote:

>> Depending on who is doing it, and why, my personal feeling is that even
>> here in 2022 this should still be viewed as being exceptionally anti-social,
>> and worthy of calling out publicly, but I must allow for the possibility
>> that my personal views on this may be antiquated and out of step with current
>> prevailing norms and attitudes.
>
>Aside from what I've noted above, and without really taking a stance on 
>whether what you not might or might not make sense, I'd probably argue 
>that, the folks that one should probably e most concerned about would 
>probably run the scans from VMs they probably paid with cryptocurrency. 
>  The attacks would probably be non-trivial to attribute...

Yes, to all of the above.

But there are always exceptions. :-)


Regards,
rfg


More information about the NANOG mailing list