-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide a default exclude list of 'bad' ip ranges #638
Comments
Probably not. What are you trying to avoid? It appears most of the ranges in the URL you linked are government ranges. |
Yeah that's the point. It says in readme that masscan can scan the whole internet but that you shouldn't. Trying to void getting on some blacklist for scanning some military network or something ;) |
Note- In the nmap documentation it says that they do this (filter out 'bad' ranges) when the iR (random hosts) flag is set. |
See the https://nmap.org/book/host-discovery-specify-targets.html.
That's it. |
what IPs does nmap skip? 0.0.0.0/8 is IANA Reserved notably missing is 100.64.0.0/10 reserved for shared address space RFC6598 see also https://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xhtml |
ARIN Reserved IPv4 Address CIDR Blocks:
tee -a myscan.conf <<EOF
excludefile = exclude.txt
EOF
masscan ... -c myscan.conf
|
There's a suggested exclude.conf in the repo itself: https://github.com/robertdavidgraham/masscan/blob/master/data/exclude.conf |
Not really a bug or issue but,
In the readme it says:
I'm wondering is there any known comprehensive list of 'bad' ip ranges?
I've found a few like this
Just wondering if there is any kind of official/comprehensive list?
The text was updated successfully, but these errors were encountered: