Yeah we're too hardcore for the internet or something.— packet.tel (@PACKET_TEL) March 14, 2019
Currently banned from Novogara.
For nmap. @spamhaus is setting a very, very bad precedence by, as of yesterday, listing port scanning in their blacklists. pic.twitter.com/MVz8XANtFG
Hmmm. @spamhaus, there’s a difference between trying to smash every window on a block, and driving down the street and seeing houses falling apart. General global scans are critical for knowing what to panic about, versus what’s on 3000 hosts worldwide.— Dan Kaminsky (@dakami) March 16, 2019
Bad guys have this data.
Gentlemen, appreciate if you'd pack the rant in (no pun intended), if you want to look like real researchers it's simple; (i) Have a bona fide social purpose and objective for net-wide port scans ("coz we can" or "coz it's legal" are not). (ii) Stop looking like script kiddies.— Luc Rossini (@LucRossini) April 4, 2019
Sir, appreciate if you'd think about what you write first. If you want to look like a serious business actually working on spam protection, it's simple; (i) Don't blocklist IPs for doing portscans while not sending spam. (ii) Stop acting like someone stole your cookies.— Dennis Schubert (@denschub) April 4, 2019
@denschub I was responding to Packet_tel only; don't read me as referring to yourself or any real security research folks. There's no port scanning issue in the security community; Spamhaus works all the time with security researchers who scan the net 24/7.— Luc Rossini (@LucRossini) April 4, 2019
We are the maintainer of the ACL you are demanding to bypass unverified to anonymously port scan our customers' private networks. The rights you believe you have to anonymously port scan Spamhaus blocklist customers, end at the outer boundaries of our customers' private networks.— Luc Rossini (@LucRossini) April 5, 2019
Sadly it's not just Spamhaus. There's other places @Hetzner_Online and other startups that are sending dishonest abuse tickets and getting lots of researchers banned, simply for port scanning. It's time it stopped. Especially when you can frame ANYONE'S IP with SYN scans.— packet.tel (@PACKET_TEL) March 16, 2019