A bunch of people are scanning for NTP.

* Shadowserver (multiple addresses). These are the good guys

* Shodan (multiple address). These are also good guys

* 73.186.15.156: Random comcast address: Does a READSTAT (sometimes) and then a READVAR (maybe to get version info)

* 46.36.38.113: Somebody in CZ land: Does a MON_GETLIST (presumably looking for DDOS amplifiers)

* scanresearch1.syssec.ruhr-uni-bochum.de: Does MON_GETLIST and a READVAR

* 104.218.48.7: Some hosted box somewhere?: Does a MON_GETLIST (presumably looking for DDOS amplifiers)

* Bunch of machines in colocrossing.com: Does a MON_GETLIST

* Bunch of machines in Amazon AWS: Does a MON_GETLIST

* Qualys (multiple addresses): this are good guys: Does a client time request and a READVAR


This short list implies that either there isn't much exploitation going on at the moment, or else it is highly targeted.

The odd one out in the list is the Comcast address above. It is only scanning for NTP (and no other ports)

Philip


_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to