The internet is huge. If one, 100 or 10 thousand hosts want to proactively
block scanners, it will not harm statistics.


On Mon, Jan 4, 2016 at 11:53 PM, Perry E. Metzger <pe...@piermont.com>
wrote:

> On Mon, 4 Jan 2016 20:56:41 -0500 Alex <mysqlstud...@gmail.com> wrote:
> > That IP doesn't exist. I can't think of any reason a legitimate
> > attempt would be made to communicate with that address,
>
> Lots of research and legitimate security projects use zmap to probe
> the whole net. There are loads of legitimate reasons for scanning the
> net, such as assessing what fraction of machines are running which
> operating systems or software, or to learn about populations of
> certain kinds of certificates. There are very important outputs from
> such research that help everyone -- for example, decisions on
> whether browsers can obsolete SHA-1 based certificates depend
> critically on doing surveys of how many such certs are out in the
> field, and decisions on whether support for old software can be
> deprecated depends crucially on population surveys.
>
> It is best to distinguish between malicious scans and
> legitimate ones. A malicious scanner inevitably follows up with
> attempts to brute force things and one wants to ban *then*. Mere
> scanning is often quite legitimate activity. Generally I try to ban
> only activity that is actually clearly malicious, like brute forcing
> ssh passwords or trying to send spam.
>
> Perry
> --
> Perry E. Metzger                pe...@piermont.com
>
>
> ------------------------------------------------------------------------------
> _______________________________________________
> Fail2ban-users mailing list
> Fail2ban-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/fail2ban-users
>
------------------------------------------------------------------------------
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to