{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:52:32Z","timestamp":1774021952481,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561452","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"410-418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Illuminating large-scale IPv6 scanning in the internet"],"prefix":"10.1145","author":[{"given":"Philipp","family":"Richter","sequence":"first","affiliation":[{"name":"Akamai"}]},{"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics"}]},{"given":"Arthur","family":"Berger","sequence":"additional","affiliation":[{"name":"Akamai\/MIT"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AbuseIPDB. 2022. Abuse Reports for 240e:f7:4f01:c::\/64. https:\/\/www.abuseipdb.com\/check-block\/240e:f7:4f01:c::\/64  AbuseIPDB. 2022. Abuse Reports for 240e:f7:4f01:c::\/64. https:\/\/www.abuseipdb.com\/check-block\/240e:f7:4f01:c::\/64"},{"key":"e_1_3_2_2_2_1","unstructured":"Tore Anderson. 2021. NANOG mailing list: Scanning activity from 2620:96:a000::\/48. https:\/\/mailman.nanog.org\/pipermail\/nanog\/2021-July\/214198.html  Tore Anderson. 2021. NANOG mailing list: Scanning activity from 2620:96:a000::\/48. https:\/\/mailman.nanog.org\/pipermail\/nanog\/2021-July\/214198.html"},{"key":"e_1_3_2_2_3_1","volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium.","author":"Antonakakis M.","unstructured":"M. Antonakakis , T. April , M. Bailey , M. Bernhard , E. Bursztein , J. Cochran , Z. Durumeric , J. A. Halderman , L. Invernizzi , M. Kallitsis , D. Kumar , C. Lever , Z. Ma , J. Mason , D. Menscher , C. Seaman , N. Sullivan , K. Thomas , and Y. Zhou . 2017 . Understanding the Mirai Botnet. In USENIX Security Symposium. M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium."},{"key":"e_1_3_2_2_4_1","unstructured":"ARIN. 2022. Statistics and Reporting. https:\/\/www.arin.net\/reference\/research\/statistics\/  ARIN. 2022. Statistics and Reporting. https:\/\/www.arin.net\/reference\/research\/statistics\/"},{"key":"e_1_3_2_2_5_1","volume-title":"A. Snoeren, and M. Kallitsis.","author":"Benson K.","year":"2015","unstructured":"K. Benson , A. Dainotti , kc claffy , A. Snoeren, and M. Kallitsis. 2015 . Leveraging Internet Background Radiation for Opportunistic Network Analysis . K. Benson, A. Dainotti, kc claffy, A. Snoeren, and M. Kallitsis. 2015. Leveraging Internet Background Radiation for Opportunistic Network Analysis."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47426-3_47"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488912"},{"key":"e_1_3_2_2_8_1","volume-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 192--207","author":"Cui Tianyu","year":"2020","unstructured":"Tianyu Cui , Gang Xiong , Gaopeng Gou , Junzheng Shi , and Wei Xia . 2020 . 6VecLM: Language Modeling in Vector Space for IPv6 Target Generation . In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 192--207 . Tianyu Cui, Gang Xiong, Gaopeng Gou, Junzheng Shi, and Wei Xia. 2020. 6VecLM: Language Modeling in Vector Space for IPv6 Target Generation. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 192--207."},{"key":"e_1_3_2_2_9_1","volume-title":"An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium.","author":"Durumeric Z.","unstructured":"Z. Durumeric , M. Bailey , and A. Halderman . 2014 . An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium. Z. Durumeric, M. Bailey, and A. Halderman. 2014. An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium."},{"key":"e_1_3_2_2_10_1","volume-title":"USENIX Security Symposium.","author":"Durumeric Z.","unstructured":"Z. Durumeric , E. Wustrow , and J. A. Halderman . 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications . In USENIX Security Symposium. Z. Durumeric, E. Wustrow, and J. A. Halderman. 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987445"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the Internet Measurement Conference","author":"Fukuda Kensuke","year":"2018","unstructured":"Kensuke Fukuda and John Heidemann . 2018 . Who Knocks at the IPv6 Door? Detecting IPv6 Scanning . In Proceedings of the Internet Measurement Conference 2018. 231--237. Kensuke Fukuda and John Heidemann. 2018. Who Knocks at the IPv6 Door? Detecting IPv6 Scanning. In Proceedings of the Internet Measurement Conference 2018. 231--237."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_2_14_1","volume-title":"Traffic Monitoring and Analysis Workshop","author":"Gasser Oliver","year":"2016","unstructured":"Oliver Gasser , Quirin Scheitle , Sebastian Gebhard , and Georg Carle . 2016 . Scanning the IPv6 Internet: Towards a Comprehensive Hitlist . In Traffic Monitoring and Analysis Workshop 2016. Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle. 2016. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. In Traffic Monitoring and Analysis Workshop 2016."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.010"},{"key":"e_1_3_2_2_17_1","unstructured":"MAWI Working Group. 2021. MAWI Working Group Traffic Archive. http:\/\/mawi.wide.ad.jp\/mawi\/  MAWI Working Group. 2021. MAWI Working Group Traffic Archive. http:\/\/mawi.wide.ad.jp\/mawi\/"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431314"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815678"},{"key":"e_1_3_2_2_21_1","volume-title":"kIP: a Measured Approach to IPv6 Address Anonymization. CoRR abs\/1707.03900","author":"Plonka David","year":"2017","unstructured":"David Plonka and Arthur Berger . 2017. kIP: a Measured Approach to IPv6 Address Anonymization. CoRR abs\/1707.03900 ( 2017 ). https:\/\/arxiv.org\/abs\/1707.03900 David Plonka and Arthur Berger. 2017. kIP: a Measured Approach to IPv6 Address Anonymization. CoRR abs\/1707.03900 (2017). https:\/\/arxiv.org\/abs\/1707.03900"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355595"},{"key":"e_1_3_2_2_23_1","volume-title":"DET: Enabling Efficient Probing of IPv6 Active Addresses","author":"Song Guanglei","year":"2022","unstructured":"Guanglei Song , Jiahai Yang , Zhiliang Wang , Lin He , Jinlei Lin , Long Pan , Chenxin Duan , and Xiaowen Quan . 2022 . DET: Enabling Efficient Probing of IPv6 Active Addresses . IEEE\/ACM Transactions on Networking ( 2022). Guanglei Song, Jiahai Yang, Zhiliang Wang, Lin He, Jinlei Lin, Long Pan, Chenxin Duan, and Xiaowen Quan. 2022. DET: Enabling Efficient Probing of IPv6 Active Addresses. IEEE\/ACM Transactions on Networking (2022)."},{"key":"e_1_3_2_2_24_1","unstructured":"Hammas Bin Tanveer Rachee Singh Paul Pearce and Rishab Nithyanand. [n. d.]. Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild. https:\/\/datatracker.ietf.org\/meeting\/113\/materials\/slides-113-maprg-glowing-in-the-dark-00.  Hammas Bin Tanveer Rachee Singh Paul Pearce and Rishab Nithyanand. [n. d.]. Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild. https:\/\/datatracker.ietf.org\/meeting\/113\/materials\/slides-113-maprg-glowing-in-the-dark-00."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108666"}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France","acronym":"IMC '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561452","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":25,"alternative-id":["10.1145\/3517745.3561452","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561452","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}