{"id":9222,"date":"2023-12-13T10:05:30","date_gmt":"2023-12-13T18:05:30","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=9222"},"modified":"2023-12-13T10:17:45","modified_gmt":"2023-12-13T18:17:45","slug":"large-scale-ipv6-internet-reconnaissance-part-2-of-2","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/","title":{"rendered":"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2)"},"content":{"rendered":"<h3>Part 1<\/h3>\n<p><a href=\"\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-1-of-2\/\">Part one of this article<\/a> discussed how it was previously believed that IPv6 scanning was nearly impossible.\u00a0 But it is trivial to scan IPv6 addresses that are on the local link, in DNS, easily guessed, or found using other creative methods.\u00a0 IPv6 addresses can also be found in other places and then used for active scanning.<\/p>\n<h3>IPv6 Hitlists and Target Generation Algorithms (TGAs)<\/h3>\n<p>People have been creating lists of Internet-reachable IPv6 addresses for years.\u00a0 This is akin to the early<a href=\"https:\/\/en.wikipedia.org\/wiki\/Hosts_(file)#History\"> ARPANET \/etc\/hosts<\/a> (or yellow pages) for the IPv6 Internet.\u00a0 The<a href=\"https:\/\/ipv6hitlist.github.io\/\"> IPv6 Hitlist<\/a> Service is a large list of known and<a href=\"https:\/\/alcatraz.net.in.tum.de\/ipv6-hitlist-service\/open\/responsive-addresses.txt.xz\"> responsive IPv6 addresses<\/a> on the public Internet.\u00a0 It has<a href=\"https:\/\/alcatraz.net.in.tum.de\/ipv6-hitlist-service\/open\/aliased-prefixes.txt.xz\"> aliased<\/a> and<a href=\"https:\/\/alcatraz.net.in.tum.de\/ipv6-hitlist-service\/open\/non-aliased-prefixes.txt.xz\"> non-aliased prefixes<\/a> and is openly accessible.\u00a0 \u201c<a href=\"http:\/\/tma.ifip.org\/2016\/papers\/tma2016-final51.pdf\">Scanning the IPv6 Internet: Towards a Comprehensive Hitlist<\/a>\u201d, written in 2016 by Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle, discusses how to construct a hitlist from other sources and perform active reachability measurements on the data.\u00a0 Their 2018 paper (and<a href=\"https:\/\/ripe77.ripe.net\/presentations\/93-slides-presented.pdf\"> RIPE77 presentation<\/a>) titled \u201c<a href=\"https:\/\/arxiv.org\/pdf\/1806.01633.pdf\">Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists<\/a>\u201d, by Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczy\u0144ski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle, discussed constructing the IPv6 Hitlist.\u00a0 They discuss performing a longitudinal active measurement study over six months and targeting more than 50 million addresses in a comprehensive hitlist.\u00a0 They used entropy clustering to discover aliased prefixes and leveraged crowdsourcing using AWS MTurk and ProA.<\/p>\n<p>The Center for Applied Internet Data Analysis (<a href=\"https:\/\/www.caida.org\/\">CAIDA<\/a>), based at the San Diego Supercomputer Center on the UC San Diego campus, also has<a href=\"https:\/\/publicdata.caida.org\/datasets\/topology\/ark\/\"> several IPv6 datasets<\/a>: the<a href=\"https:\/\/www.caida.org\/catalog\/datasets\/ipv6_allpref_topology_dataset\/\"> Ark IPv6 Topology Dataset<\/a>, the<a href=\"https:\/\/www.caida.org\/catalog\/datasets\/ipv6_dnsnames_dataset\/\"> IPv6 DNS Names Dataset<\/a>, the<a href=\"https:\/\/www.caida.org\/catalog\/datasets\/ipv6_routed_48_topology_dataset\/\"> IPv6 Routed \/48 Topology Dataset<\/a>, and the<a href=\"https:\/\/www.caida.org\/catalog\/datasets\/ipv6_aslinks_dataset\/\"> IPv6 AS Links Dataset<\/a>.\u00a0 Security researchers and attackers alike can use this information for remote reconnaissance.<\/p>\n<p>Ramakrishna Padmanabhan, Zhihao Li, Dave Levin, and Neil Spring, at the University of Maryland, wrote a paper in 2015 titled \u201c<a href=\"https:\/\/www.ramapad.com\/papers\/uav6_pam15.pdf\">UAv6: Alias Resolution in IPv6 Using Unused Addresses<\/a>\u201d.\u00a0 Their paper discussed actively scanning the IPv6 Internet looking for router interfaces that are associated with the same router (alias resolution).\u00a0 They probed the router\u2019s other IPv6 addresses, soliciting ICMPv6 Address Unreachable (AU) errors and using traceroutes and the Too-Big-Trick (TBT) to determine if the aliases are in fact connected to the same router.<\/p>\n<p>One of the important papers in this area is \u201c<a href=\"https:\/\/arxiv.org\/pdf\/1606.04327.pdf\">Entropy\/IP: Uncovering Structure in IPv6 Addresses<\/a>\u201d, by Pawe\u0142 Foremski, David Plonka, and Arthur Berger (Akamai Technologies), 2016.\u00a0 Entropy\/IP is a tool for analyzing patterns in IPv6 addresses; it is not primarily a Target Generation Algorithm (TGA) per se.\u00a0 Their system analyzes and visualizes IPv6 addresses and creates candidate addresses for active scanning.<\/p>\n<p>Another often-cited 2017 paper (<a href=\"https:\/\/pdfs.semanticscholar.org\/dd67\/5c78db80f311165b0bc91c0a2da4402bb8c2.pdf\">and presentation<\/a>) titled \u201c<a href=\"https:\/\/austinmurdock.com\/6Gen.pdf\">Target Generation for Internet-wide IPv6 Scanning<\/a>\u201d, by Austin Murdock, Frank Li, Paul Bramsen, Zakir Durumeric, and Vern Paxson, discusses finding IPv6 seed addresses prior to scanning.\u00a0 The concept is to try to figure out likely IPv6 addresses (using 6Gen) that might be in use ahead of time to save effort performing active probes to confirm reachability.<\/p>\n<p>Since the publication of these papers, there have been many other papers published on many other Target Generation Algorithms (TGAs) for pre-calculating IPv6 address targets to probe.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128618312003\">6Tree<\/a>: Efficient dynamic discovery of active addresses in the IPv6 address space, 2019<\/li>\n<li><a href=\"https:\/\/arxiv.org\/pdf\/2204.09425.pdf\">6GCVAE<\/a>: Gated Convolutional Variational Autoencoder for IPv6 Target Generation, 2020<\/li>\n<li><a href=\"http:\/\/webhome.cs.uvic.ca\/~wkui\/papers\/IPv6Scanning.pdf\">6Hit<\/a>: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning, 2020<\/li>\n<li><a href=\"https:\/\/arxiv.org\/pdf\/2204.09839.pdf\">6GAN<\/a>: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning, 2021<\/li>\n<li><a href=\"https:\/\/arxiv.org\/pdf\/2008.02213.pdf\">6VecLM<\/a>: Language Modeling in Vector Space for IPv6 Target Generation, 2021<\/li>\n<li><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1389128621005430\">6Graph<\/a>: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning, 2022<\/li>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9796925\">6Forest<\/a>: An Ensemble Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning, 2022<\/li>\n<li><a href=\"https:\/\/www.usenix.org\/conference\/atc22\/presentation\/song\">AddrMiner<\/a>: A Comprehensive Global Active IPv6 Address Discovery System, 2022<\/li>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1109\/TNET.2022.3145040\">DET<\/a>: Enabling Efficient Probing of IPv6 Active Addresses, 2022<\/li>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10012428\">6Scan<\/a>: A High Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding, 2023<\/li>\n<\/ul>\n<p>The most recent paper (published in 2023) on this topic is \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2307.06872.pdf\">Target Acquired? Evaluating Target Generation Algorithms for IPv6<\/a>\u201d, by Lion Steger, Liming Kuang, Johannes Zirngibl, Georg Carle, and Oliver Gasser.\u00a0 This paper discusses the IPv6 hitlist and compares various TGA methods to improve the responsive IPv6 addresses in the hitlist.<\/p>\n<p>The work to develop these hitlists and TGAs gives attackers a head start so they can simply load these IPv6 addresses into their scanning tools and fire away.<\/p>\n<h3>IPv6 Scanning Tools<\/h3>\n<p>For years, tools like<a href=\"https:\/\/zmap.io\/\"> ZMap<\/a> and<a href=\"https:\/\/github.com\/robertdavidgraham\/masscan\"> Masscan<\/a> have been trolling the whole IPv4 Internet finding targets.\u00a0 However, these tools didn\u2019t initially support IPv6.\u00a0 Internet scanning tools have evolved to perform broader scanning, including IPv6 targets.<\/p>\n<p>Now there is a new version of<a href=\"https:\/\/github.com\/tumi8\/zmap\"> ZMapv6<\/a> that can send ICMPv6 Echo Requests, TCP SYNs, and UDP probes.\u00a0 This updated version of ZMap was developed by Oliver Gasser and the team of IPv6 security researchers mentioned above, who work at the TUM School of Computation, Information and Technology at the Technical University of Munich.<\/p>\n<p><a href=\"https:\/\/github.com\/robertdavidgraham\/masscan\">Masscan<\/a> has now been updated to perform IPv6 scanning but there is no need for a \u201c-6\u201d option.\u00a0 Simply use an IPv6 or IPv4 address as the targets or create a text file with the destinations to scan.<\/p>\n<p><a href=\"https:\/\/github.com\/zmap\/zgrab2\">ZGrab 2.0<\/a> is a fast network scanner written in Go that can perform large-scale IPv6 Internet surveys.<\/p>\n<p><a href=\"https:\/\/github.com\/sfan5\/fi6s\">fi6s<\/a> (Fast IPv6 Scanner) is an IPv6 TCP and UDP port scanner which can scan individual addresses as well as prefix ranges.\u00a0 The destinations can be loaded into the tool with a text file, and you can set the scanning rate with the \u201cmax-rate\u201d option.<\/p>\n<p><a href=\"https:\/\/www.cmand.org\/yarrp\/\">Yarrp<\/a> (Yelling at Random Routers Progressively) is an open-source tool developed by Robert Beverly and the team of security researchers previously mentioned who work at NPS and<a href=\"https:\/\/www.cmand.org\/yarrp\/\"> Center for Measurement and Analysis of Network Data<\/a> (cMAND).\u00a0 Yarrp can perform stateless scanning with randomly chosen destinations and hop-limits.\u00a0 This utility facilitates fast active large-scale Internet remote reconnaissance.<\/p>\n<p><a href=\"https:\/\/github.com\/RustScan\/RustScan\">RustScan<\/a> is a modern and fast IPv6-capable port scanner that runs as a Docker container that claims to scan all 65,536 ports in 3 seconds.\u00a0 It uses adaptive learning to improve itself over time.\u00a0 RustScan internally uses<a href=\"https:\/\/nmap.org\/\"> nmap<\/a> to do all the scanning and is more a multithreaded wrapper on top of nmap than an independent scanner itself.<\/p>\n<p><a href=\"https:\/\/netsec.ccert.edu.cn\/projects\/xmap\">XMap<\/a> is another dual-protocol Internet-wide scanner developed by the team in the Network &amp; Information Security Lab at Tsinghua University in Beijing.<\/p>\n<p>There are many utilities that can make the work of large-scale IPv6 Internet scanning easier for attackers or security researchers.<\/p>\n<h3>Examples of IPv6 Internet Scanning<\/h3>\n<p>Many organizations have observed IPv6 scanning destined for their networks or passing through their transit networks or monitoring systems.\u00a0 In the past few years there have been published works showing examples of large scale IPv6 Internet scanning and analysis of the results.<\/p>\n<p>Attackers could easily discover IPv6-enabled CPE devices using<a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc7136.html\"> Modified EUI-64 IIDs<\/a> and comparing how those IIDs moved to new IPv6 prefixes as a result of the DHCPv6-PD prefix rotation policies of various ISPs.\u00a0 This was written about in the paper \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2102.00542.pdf\">Follow the Scent: Defeating IPv6 Prefix Rotation Privacy<\/a>\u201d, by Erik Rye, Robert Beverly, and K C Claffy. 2021.\u00a0 CPE devices using EUI-64 IIDs have been shown to have security privacy implications, as documented in \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2203.08946.pdf\">One Bad Apple Can Spoil Your IPv6 Privacy<\/a>\u201d, by Said Jawad Saidi, Oliver Gasser, and Georgios Smaragdakis.<\/p>\n<p>Performing IPv6 remote reconnaissance of CPE devices using EUI-64 IID was written about in \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2208.06767.pdf\">IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation<\/a>\u201d.\u00a0 This published paper and<a href=\"https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/US-21-Rye-IPvSeeYou.pdf\"> Black Hat 2021 presentation<\/a> (<a href=\"https:\/\/www.youtube.com\/watch?v=KG4LF49hLM4\">video<\/a>) by Robert Beverly and Erik C. Rye resulted from their work performed at CMAND, the NPS, and CAIDA.\u00a0 The authors used yarrp to find 60 million CPE devices using EUI-64, and knowledgeably determined the offset of WAN interface MAC and internal\/Wi-Fi MACs.\u00a0 From there, they cross-referenced the CPEs\u2019 BSSIDs with geolocation data (from war-drivers, Apple, Google, and others), thus mapping IPv6 addresses to latitude\/longitude coordinates.\u00a0 It should be noted that this only works for CPE that use EUI-64, are responsive to probes, and use predictable MACs and Wi-Fi, which unfortunately is many devices.\u00a0 Furthermore, the penultimate hop shows the IPv6 (e.g. \/48) prefix of nearby CPEs, even if those are using privacy addresses.<\/p>\n<p>The<a href=\"https:\/\/www.shadowserver.org\/\"> Shadowserver<\/a> foundation is a nonprofit organization that collects information on nefarious Internet activity and publishes this data to their subscribers and law enforcement organizations globally.\u00a0 Shadowserver published an article in July 2022 titled \u201c<a href=\"https:\/\/www.shadowserver.org\/news\/hello-ipv6-scanning-world\/\">Hello IPv6 Scanning World!<\/a>\u201d in which they described their IPv6 scanning methods (using DNS, certificate transparency streams, hitlists, and other sources).\u00a0 Piotr Kijewski wrote the APNIC article \u201c<a href=\"https:\/\/blog.apnic.net\/2022\/08\/15\/shadowserver-now-scanning-ipv6\/\">Shadowserver now scanning IPv6<\/a>\u201d on this same topic.\u00a0 Shadowserver\u00a0 used ZMapv6 and ZGrab 2.0 to scan various well-known TCP port numbers.\u00a0 Shadowserver<a href=\"https:\/\/www.shadowserver.org\/news\/over-3-6m-exposed-mysql-servers-on-ipv4-and-ipv6\/\"> found over 1.3 million Internet-reachable MySQL servers<\/a> accessible over IPv6.\u00a0 Dave De Coster and Piotr Kijewski gave a presentation at the<a href=\"https:\/\/www.first.org\/resources\/papers\/conf2022\/08-InternetSpelunking-KijewskiandDeCoster.pdf\"> 2022 FIRST conference<\/a> titled \u201c<a href=\"https:\/\/www.shadowserver.org\/wp-content\/uploads\/2022\/07\/Internet-Spelunking-FIRST-2022-Public.pdf\">Internet Spelunking: IPv6 Scanning and Device Fingerprinting<\/a>\u201d showing their IPv6 scanning results.<\/p>\n<p>Furthermore, organizations are encouraged to proactively scan their own public-facing IPv4 and IPv6 reachable services as described in the paper \u201c<a href=\"https:\/\/grimminck.medium.com\/the-implications-of-neglecting-ipv6-on-your-internet-facing-services-538ebe3506fa\">The implications of neglecting IPv6 on your internet facing services<\/a>\u201d, by Stefan Grimminck, May 12, 2021.\u00a0 In Stefan\u2019s esearch, they performed port scans and vulnerability scans over IPv4 and IPv6 and compared the results to make sure both protocols were equally protected and noted when they were different.<\/p>\n<p>Akamai observed IPv6 Internet scanning traffic over a 15-month period from their global perspective of CDN servers and observation points.\u00a0 In fact, the IPv6 addresses of their servers can be scanned and do show up on hitlists.\u00a0 Akamai\u2019s Philipp Richter published an article in October 2022 titled \u201c<a href=\"https:\/\/www.akamai.com\/blog\/security-research\/vulnerability-scanning-IPv6-why-should-we-care\">Who\u2019s Scanning the IPv6 Space? And, Frankly, Why Do We Even Care?<\/a>\u201d\u00a0 Their work also focused on analyzing the source addresses, the ASes, and the volume of scanning traffic.\u00a0 Akamai found that scans are often sourced from a variety of networks and IIDs instead of from a single 128-bit static IPv6 host address.\u00a0 Scanners could use an entire \/64, \/48, or even \/32 to source their scanning traffic, attempting to avoid detection and ending up on a block list.\u00a0 They found that the top scanner sourced traffic from a single 128-bit address, but another source used nearly an entire \/32 for the source addresses.\u00a0 They discovered that 93% of the scanning traffic came from just five scanners.\u00a0 Philipp Richter (Akamai), Oliver Gasser (Max Planck Institute for Informatics), and Arthur Berger (Akamai\/MIT) wrote a paper they presented at the ACM Internet Measurement Conference 2022 titled<a href=\"https:\/\/www.akamai.com\/content\/dam\/site\/en\/documents\/research-paper\/large-scale-IPv6-scanning-2022.pdf\"> \u201cIlluminating Large-Scale IPv6 Scanning in the Internet<\/a>\u201d discussing this IPv6 Internet scanning activity.<\/p>\n<h3>Conclusions<\/h3>\n<p>Internet-wide IPv6 active scanning is possible and is being performed at this very moment.\u00a0 It is also feasible to scan private IPv6 networks just as easily and it is trivial to discover targets on a link-local access network.\u00a0 The tools exist to perform IPv6 Internet scanning and there are hitlists of IPv6 addresses to make reconnaissance even easier.\u00a0 Every organization connected to the IPv6 Internet can observe this scanning traffic.<\/p>\n<p>Knowledge of an organization\u2019s global IPv6 prefix address, their networks, and the individual IPv6 addresses assigned to hosts should not be a security measure that is solely relied upon.\u00a0 In other words, sooner or later the IPv6 address could be discovered by a remote or local attacker, so \u201csecurity through obscurity\u201d of the IPv6 address is not a valid security measure.<\/p>\n<p>Just as end nodes have moved away from using the EUI-64 method of configuring their IPv6 IID, CPE devices should also deprecate this method toward<a href=\"https:\/\/datatracker.ietf.org\/doc\/rfc8064\/\"> RFC 8064<\/a> \u201cRecommendation on Stable IPv6 Interface Identifiers\u201d methods.<\/p>\n<p>Enterprises may want to utilize these techniques themselves to proactively check which IPv6 networks and addresses are reachable within their environments.\u00a0 Enterprises may want to consider these techniques when performing<a href=\"https:\/\/blogs.infoblox.com\/ipv6-coe\/ipv6-security-vulnerability-scanning\/\"> IPv6 network-based vulnerability scanning<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Part 1 Part one of this article discussed how it was previously believed that IPv6 scanning was nearly impossible.\u00a0 But it is trivial to scan IPv6 addresses that are on the local link, in DNS, easily guessed, or found using other creative methods.\u00a0 IPv6 addresses can also be found in other places and then used [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":8326,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[38,107,112,956,957],"class_list":{"0":"post-9222","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-ipv6","9":"tag-internet","10":"tag-vnios","11":"tag-reconnaissance","12":"tag-scanning","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox<\/title>\n<meta name=\"description\" content=\"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox\" \/>\n<meta property=\"og:description\" content=\"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-13T18:05:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-13T18:17:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox\" \/>\n<meta name=\"twitter:description\" content=\"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2)\",\"datePublished\":\"2023-12-13T18:05:30+00:00\",\"dateModified\":\"2023-12-13T18:17:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/\"},\"wordCount\":1932,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-03.jpg\",\"keywords\":[\"IPv6\",\"Internet\",\"vNIOS\",\"reconnaissance\",\"scanning\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/\",\"name\":\"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-03.jpg\",\"datePublished\":\"2023-12-13T18:05:30+00:00\",\"dateModified\":\"2023-12-13T18:17:45+00:00\",\"description\":\"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-03.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ipv6-image-03.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox","description":"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/","og_locale":"en_US","og_type":"article","og_title":"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox","og_description":"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/","og_site_name":"Infoblox Blog","article_published_time":"2023-12-13T18:05:30+00:00","article_modified_time":"2023-12-13T18:17:45+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_title":"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox","twitter_description":"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2)","datePublished":"2023-12-13T18:05:30+00:00","dateModified":"2023-12-13T18:17:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/"},"wordCount":1932,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg","keywords":["IPv6","Internet","vNIOS","reconnaissance","scanning"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/","name":"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2) | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg","datePublished":"2023-12-13T18:05:30+00:00","dateModified":"2023-12-13T18:17:45+00:00","description":"Explore the evolving landscape of IPv6 and its impact on cybersecurity. As the adoption of IPv6 accelerates, so does the attention from potential attackers. This blog delves into the intricate phases of targeted attacks, starting with reconnaissance and culminating in advanced exploitation techniques.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipv6-image-03.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/large-scale-ipv6-internet-reconnaissance-part-2-of-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Large-Scale IPv6 Internet Reconnaissance (Part 2 of 2)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=9222"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9222\/revisions"}],"predecessor-version":[{"id":9242,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/9222\/revisions\/9242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8326"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=9222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=9222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=9222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}