ip90.ip-213-32-32.eu
Open in
urlscan Pro
213.32.32.90
Public Scan
URL:
http://ip90.ip-213-32-32.eu/
Submission Tags: falconsandbox
Submission: On November 17 via api from US — Scanned from FR
Submission Tags: falconsandbox
Submission: On November 17 via api from US — Scanned from FR
Form analysis
0 forms found in the DOMText Content
ONYPHE faq FREQUENTLY ASKED QUESTIONS. * WHY ARE YOU SCANNING ME? We are conducting Internet-scale network scanning to provide information for cyber defense purposes. We scan the full IPv4 address space and part of IPv6 address space just like Shodan, Censys, LeakIX or ShadowServer are doing. We are in no way targeting you specifically, you are just part of what is connected on the Internet. * WHAT IS YOUR INTENT? We are in the Attack Surface Discovery (ASD) & Attack Surface Management (ASM) markets. Our intent is to allow our customers to have the most complete view possible on their Internet facing assets. Our purpose is to identify initial access vectors before bad guys so our customers can fix their vulnerabilities before it is too late. * HOW ETHICAL ARE YOU AT SUCH ACTIVITIES? We know Internet scanning activities may not be very-well perceived. That's why we want to bring together all actors to create a set of rules, or commandments, to do such in the most ethical way possible. Find out more in our write-up Our 10 Commandments for Ethical Internet Scanning. You may also be interested by a keynote given by our CEO at CTI Summit 2022. * WHAT IS THE LIST OF YOUR SCANNERS IP ADDRESSES? Here is the complete list of our scanners network ranges: * 37.187.215.240/28, 178.32.170.16/28, 79.137.65.46/32, 213.32.25.76/32, 213.32.39.32/28, 51.254.49.96/28, 188.165.87.96/28, 51.255.62.0/28, 51.254.0.0/28, 5.135.58.192/28, 178.32.72.208/28, 137.74.239.144/28, 79.137.7.64/28, 5.135.238.144/28, 54.38.100.144/28, 149.202.132.192/28, 5.196.113.0/28, 213.32.32.80/28, 51.255.109.160/28, 144.217.24.16/28, 45.43.33.218/32, 139.99.9.160/32, 15.235.189.144/28, 147.135.23.96/28, 135.148.10.160/28, 135.148.25.112/28, 135.148.213.240/28, 135.148.57.176/28, 51.81.110.48/28, 51.81.215.64/28, 15.204.37.16/28, 147.135.85.128/28, 135.148.63.208/28, 51.81.144.32/28, 51.81.181.160/28, 149.202.99.192/28, 94.23.117.80/28, 5.196.200.240/28, 5.135.173.112/28, 146.59.184.0/28, 147.135.236.160/28, 2001:41d0:403:1f43::1000/124, 91.134.185.80/28, 151.80.91.208/28, 144.217.24.0/28, 192.99.175.176/28, 51.161.50.176/28, 167.114.24.176/28, 134.209.101.182/32, 23.239.29.109/32, 45.43.33.210/32 Alternatively, you can download the list in text format: * IP Ranges * HOW CAN I OPT-OUT? You can do so in different ways. You could send us an email at abuse[at]onyphe{dot}io giving us your list of network blocks to be excluded from scanning. You could also block all our probes at your network perimeter, here is the list of our scanning network ranges: * 37.187.215.240/28, 178.32.170.16/28, 79.137.65.46/32, 213.32.25.76/32, 213.32.39.32/28, 51.254.49.96/28, 188.165.87.96/28, 51.255.62.0/28, 51.254.0.0/28, 5.135.58.192/28, 178.32.72.208/28, 137.74.239.144/28, 79.137.7.64/28, 5.135.238.144/28, 54.38.100.144/28, 149.202.132.192/28, 5.196.113.0/28, 213.32.32.80/28, 51.255.109.160/28, 144.217.24.16/28, 45.43.33.218/32, 139.99.9.160/32, 15.235.189.144/28, 147.135.23.96/28, 135.148.10.160/28, 135.148.25.112/28, 135.148.213.240/28, 135.148.57.176/28, 51.81.110.48/28, 51.81.215.64/28, 15.204.37.16/28, 147.135.85.128/28, 135.148.63.208/28, 51.81.144.32/28, 51.81.181.160/28, 149.202.99.192/28, 94.23.117.80/28, 5.196.200.240/28, 5.135.173.112/28, 146.59.184.0/28, 147.135.236.160/28, 2001:41d0:403:1f43::1000/124, 91.134.185.80/28, 151.80.91.208/28, 144.217.24.0/28, 192.99.175.176/28, 51.161.50.176/28, 167.114.24.176/28, 134.209.101.182/32, 23.239.29.109/32, 45.43.33.210/32 * WHAT KIND OF PROBING ARE YOU ACTUALLY DOING? We first send RFC-compliant SYN packets to 200+ ports on the full IPv4 address space and part of IPv6 address space. Then, we send application-level requests against found open ports with RFC-compliant protocol requests to perform service identification. From raw responses, we enrich the data to identify software & hardware versions, when possible, along with device classification. Finally, for some critical vulnerabilities, the one exploited at scale by cyber-criminals to deploy ransomware, we try to identify them in a non-intrusive way only. * WHAT DO YOU MEAN BY NON-INTRUSIVE? We only perform vulnerability identification in a non-intrusive way. That means we only send RFC-compliant application requests. Furthermore, we don't take the risk to crash a service, thus we only identify vulnerabilities by means which are completely innocuous for targetted services. For instance, we never try to identify vulnerabilities caused by buffer overflows. Another rule is that we don't want to leave traces on targetted services. That means if identifying a vulnerability needs to create a user account or a file, we won't be able to identify it and we will simply not do it. So how do we identify vulnerabilities in a non-intrusive way? We usually start by using a public PoC and by removing its malicious payload or by finding a way to elicit a response from targetted service that can be used to state if the vulnerability exists or not. For instance, read the following write-up Zimbra CVE-2022-27925 detection to understand from a specific example. Finally, we never perform login brute-force attempts, that would be too intrusive and we refuse ourselves to do that. * ARE THE RESULTS OF VULNERABILITY IDENTIFICATION PUBLIC? Of course not. We only provide access to such kind of data to well-known, well-identified companies. Usually, such information is accessible to companies having their internal CERT working on ASD & ASM to prevent possible intrusions on their networks. We received many thanks from our customers because we identify really critical vulnerabilities before bad guys can exploit them. We monitor every accesses to our data to make sure results stay in good hands, helping cyber defense instead of giving data to commit cyber offense. * I THINK THAT CAN BE USEFUL TO ME. HOW DO I BOOK A DEMO? Sure, just drop us an email at contact[at]onyphe{dot}io ONYPHE ONYPHE is a Cyber Defense Search Engine dedicated to Attack Surface Discovery & Attack Surface Management. We scan the entire Internet and Dark Web for exposed assets and crawl the links just like a Web search engine. Our data is searchable with a Web form or directly from our numerous APIs. * * © Copyright 2024 . ONYPHE