Skip to content

Instantly share code, notes, and snippets.

@raffysommy
Last active September 7, 2020 09:57
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save raffysommy/cd5f77dd2adb0dcbed55f5030ba5518b to your computer and use it in GitHub Desktop.
Save raffysommy/cd5f77dd2adb0dcbed55f5030ba5518b to your computer and use it in GitHub Desktop.
Manycast2 - Notice to operators
If you see this message you intercept a packet that belongs to Manycast2.
If you are a network operator and you believe your servers may be experiencing problems due to our measurements, please consult the information below on what you can expect to see from us, and as a last resort how you can contact us to block our traffic.
We thank you in advance for working with us to resolve any issues and apologize in advance if we have inadvertently caused problems through our measurement.
Manycast2 is a project that aims to scan the IPV4 network address space to detect anycast instances.
We make use of ICMP echo request packets (ping) targeting USC/ICI hitlist IP addresses https://ant.isi.edu/datasets/ip_hitlists/.
We generate a very small amount of traffic (1 packet per each prefix, each 20 minutes) that should not affect your systems.
However, if this cause you inconveniences don't hesitate to contact us at:
r.sommese [at] utwente dot nl
Thanks,
Raffaele Sommese
University of Twente
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment