|Snort Intrusion Detection System Logo (Photo credit: Wikipedia)|
I decided to check out their page and I found a letter laying out Critical Research's plans. Here is an excerpt:
This system is coordinating an internet-wide survey of open TCP ports, service banners, SNMP system descriptions, MDNS responders, UPNP endpoints, and NetBIOS name queries. The results of this survey will be used to uncover systematic vulnerabilities in the equipment provided by ISPs to their customers. My goal is to collect this information, determine which ISPs are exposing their customers to internet-based attacks, and contact those ISPs with my findings. If you would like to have your network excluded from this scan, please send an email to firstname.lastname@example.org. Please include a list of netblocks or at the least the domain name or ASN that you would like excluded. If you are concerned about what an attacker can discover about your network using these types of probes, there are great free tools such as Metasploit and Nmap that can be used to gather this information on your own.
Here is a list of IP addresses used by Critical.io for the scans if you want to actively block them on your Firewall:
- 18.104.22.168 (critical.io)
- 22.214.171.124 (urchin.critical.io)
- 126.96.36.199 (crawler.critical.io)
- 188.8.131.52 (ping01.critical.io)
- 184.108.40.206 (ping02.critical.io)
- 220.127.116.11 (ping03.critical.io)
I usually don't mind ethical hackers conducting research, but I prefer they do it in a lab environment, and don't affect my production web services. What do you think about this? Are you going to block these guys, or shoot them an email to request that they add you to their exception list? Am I wrong for not wanting them to scan my network? Let me know what you think in the comments.