Quick test for tor-exit running ntop cd /tmp wget -q -O /tmp/Tor_ip_list_ALL.csv http://torstatus.blutmagie.de/ip_list_all.php/Tor_ip_list_ALL.csv
nmap -iL Tor_ip_list_ALL.csv -p3000 -sS -sV -PI -T Insane -oM ntop.out root@server /tmp # grep -i ntop ntop.out Host: 46.4.228.233 (static.233.228.4.46.clients.your-server.de) Ports: 3000/open/tcp//ntop-http//Ntop web interface 3.3/ Host: 46.105.26.14 (vps18077.ovh.net) Ports: 3000/open/tcp//ntop-http//Ntop web interface 4.0.3/ Host: 194.14.172.60 (194-14-172-60.cust.pirateisp.net) Ports: 3000/open/tcp//ntop-http//Ntop web interface 3.3/ Host: 194.14.172.62 (194-14-172-62.cust.pirateisp.net) Ports: 3000/open/tcp//ntop-http//Ntop web interface 3.3/ Host: 213.239.213.4 (linsol2.tuxsolutions.de) Ports: 3000/open/tcp//ntop-http//Ntop web interface 3.2/ Maybe they are running sniffers or just traffic statistics? -naif _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
