{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:30:35Z","timestamp":1764783035625,"version":"3.46.0"},"reference-count":93,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:p>Blockchain technologies underpin an expanding ecosystem of decentralized applications, financial systems, and infrastructure. However, the fundamental networking layer that sustains these systems, the peer-to-peer (P2P) layer, of all but the top few ecosystems remains largely opaque. In this paper, we present the first longitudinal, cross-network measurement study of 36 public blockchain networks. Over 9 months (since late 2024), we deployed 15 active crawlers, sourced data from two additional community crawlers, and conducted hourly connectivity probes (e.g., pings and protocol-level handshakes) to observe the evolving state of these networks. Furthermore, by leveraging Ethereum's discovery protocols, we inferred metadata for an additional 19 auxiliary networks that utilize the Ethereum peer discovery protocol. We also explored Internet-wide scans, which only require probing each protocol's default ports with a simple, network-specific payload. This approach allows us to rapidly identify responsive peers across the entire address space without having to implement custom discovery and handshake logic for every blockchain. We validated this method on Bitcoin and similar networks with known ground truth, then applied it to Cardano, which we could not crawl directly.<\/jats:p>\n                  <jats:p>Our study uncovers dramatic variation in network size from under 10 to more than 10,000 active nodes. We quantify trends in IPv4 versus IPv6 usage, analyze autonomous systems and geographic concentration, and characterize churn, diurnal behavior, and the coverage and redundancy of discovery protocols. These findings expose critical differences in network resilience, decentralization, and observability. Beyond characterizing each network, our methodology demonstrates a general framework for measuring decentralized networks at scale. This opens the door for continued monitoring, benchmarking, and more transparent assessments of blockchain infrastructure across diverse ecosystems.<\/jats:p>","DOI":"10.1145\/3771572","type":"journal-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T20:07:03Z","timestamp":1764706023000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Multiple Sides of 36 Coins: Measuring Peer-to-Peer Infrastructure Across Cryptocurrencies"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2022-7993","authenticated-orcid":false,"given":"Lucianna","family":"Kiffer","sequence":"first","affiliation":[{"name":"IMDEA Networks, Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8258-1712","authenticated-orcid":false,"given":"Lioba","family":"Heimbach","sequence":"additional","affiliation":[{"name":"Category Labs, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8567-2353","authenticated-orcid":false,"given":"Dennis","family":"Trautwein","sequence":"additional","affiliation":[{"name":"University of G\u00f6ttingen, G\u00f6ttingen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5736-8197","authenticated-orcid":false,"given":"Yann","family":"Vonlanthen","sequence":"additional","affiliation":[{"name":"Ethereum Foundation, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3425-9331","authenticated-orcid":false,"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"IPinfo, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"unstructured":"2025. XRP Ledger Amendments - Bithomp. https:\/\/bithomp.com\/en\/amendments. Accessed: 2025-10-13.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","volume-title":"New kids on the block: an analysis of modern blockchains. arXiv preprint arXiv:1606.06530","author":"Anderson Luke","year":"2016","unstructured":"Luke Anderson, Ralph Holz, Alexander Ponomarev, Paul Rimba, and Ingo Weber. 2016. New kids on the block: an analysis of modern blockchains. arXiv preprint arXiv:1606.06530 (2016)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1007\/978-3-662-64322-8_7"},{"unstructured":"Ava Labs. 2025. Avalanche Info API: info.peers Endpoint. https:\/\/build.avax.network\/docs\/api-reference\/info-api#infopeers. Accessed: 2025-07-28.","key":"e_1_2_1_4_1"},{"unstructured":"Ava Labs. 2025. Avalanche Network Status Dashboard. https:\/\/stats.avax.network\/dashboard\/network-status\/. Accessed: 2025-07-28.","key":"e_1_2_1_5_1"},{"unstructured":"Ava Labs. 2025. Avalanche Node Configuration: Configs and Flags. https:\/\/build.avax.network\/docs\/nodes\/configure\/configs-flags#peer-list-gossiping. Accessed: 2025-07-27.","key":"e_1_2_1_6_1"},{"unstructured":"Ava Labs. 2025. AvalancheGo Network Implementation. https:\/\/github.com\/ava-labs\/avalanchego\/blob\/b1433fd550d40ff41451e1a1fcc8317bfe2c788b\/network\/network.go. Accessed: 2025-07-27.","key":"e_1_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1109\/P2P.2011.6038655"},{"key":"e_1_2_1_9_1","volume-title":"Bitcoin Core: Reference Implementation of the Bitcoin Protocol. https:\/\/bitcoincore.org\/. Accessed: 2025-07-28.","author":"Developers Bitcoin Core","year":"2009","unstructured":"Bitcoin Core Developers. 2009. Bitcoin Core: Reference Implementation of the Bitcoin Protocol. https:\/\/bitcoincore.org\/. Accessed: 2025-07-28."},{"unstructured":"Bitcoin Core Developers. 2023. Bitcoin Core: Address Relay and Response Caching. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/master\/src\/net.cpp. Bitcoin Core caches 'addr' responses for 24 hours to prevent redundant information sharing. See the implementation in 'net.cpp' particularly 'GetAddrFetch' and 'AddrResponseCurrentlyScheduled' handling..","key":"e_1_2_1_10_1"},{"unstructured":"Bitcoin Wiki contributors. 2025. Satoshi Client Node Discovery. https:\/\/en.bitcoin.it\/wiki\/Satoshi_Client_Node_Discovery. Accessed: 2025-07-29.","key":"e_1_2_1_11_1"},{"volume-title":"Bitnodes: Bitcoin Network Explorer. https:\/\/bitnodes.io\/. Accessed: 2025-07-28.","year":"2025","unstructured":"Bitnodes. 2025. Bitnodes: Bitcoin Network Explorer. https:\/\/bitnodes.io\/. Accessed: 2025-07-28.","key":"e_1_2_1_12_1"},{"unstructured":"Blockchair. 2025. Blockchair Blockchain Explorer. https:\/\/blockchair.com. Accessed: 2025-07-28.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","first-page":"2","volume-title":"Estimating Validator Decentralization Using","author":"Bostoen Jonas","year":"1992","unstructured":"Jonas Bostoen. 2024. Estimating Validator Decentralization Using p2p Data. Ethereum Research forum post (Networking). https:\/\/ethresear.ch\/t\/estimating-validator-decentralization-using-p2p-data\/19920 Accessed: 2025-07-30."},{"doi-asserted-by":"publisher","key":"e_1_2_1_15_1","DOI":"10.1007\/978-3-030-51280-4_31"},{"unstructured":"Cardano Community Guild Operators. 2025. Topology Updater. https:\/\/github.com\/cardano-community\/guild-operators\/blob\/alpha\/docs\/Scripts\/topologyupdater.md. GitHub repository. Accessed: 2025-07-26.","key":"e_1_2_1_16_1"},{"unstructured":"Cardano Foundation. 2025. Blockperf Data Daily statistics. https:\/\/data.blockperf.cardanofoundation.org\/daily\/index.html. Accessed: 2025-07-26.","key":"e_1_2_1_17_1"},{"unstructured":"Cardano Foundation. 2025. Cardano Daily Performance Data. https:\/\/data.blockperf.cardanofoundation.org\/daily\/index.html. Accessed: 2025-07-28.","key":"e_1_2_1_18_1"},{"unstructured":"Cardano Foundation. 2025. Cardano Network. https:\/\/docs.cardano.org\/about-cardano\/explore-more\/cardano-network. Cardano Docs. Accessed: 2025-07-26.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","volume-title":"Unveiling the Bitcoin Lightning (IP) Network. In 2021 IEEE 10th International Conference on Cloud Networking (CloudNet). IEEE, 87-90","author":"Casas Pedro","year":"2021","unstructured":"Pedro Casas, Matteo Romiti, Peter Holzer, Sami Ben Mariem, Benoit Donnet, and Bernhard Haslhofer. 2021. Where is the Light (ning) in the Taproot Dawn? Unveiling the Bitcoin Lightning (IP) Network. In 2021 IEEE 10th International Conference on Cloud Networking (CloudNet). IEEE, 87-90."},{"unstructured":"ChainID Network. 2025. ChainID Network: EVM Chain Registry. https:\/\/chainid.network\/. Accessed: 2025-07-28.","key":"e_1_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_22_1","DOI":"10.1109\/GLOCOM.2008.ECP.442"},{"unstructured":"Duncan Coutts Neil Davies Marc Fontaine Karl Knutsson Armando Santos Marcin Szamotulski and Alex Vieth. 2025. Ouroboros Network Specification. https:\/\/ouroboros-network.cardano.intersectmbo.org\/pdfs\/network-spec\/network-spec.pdf. PDF (84 pages). Accessed: 2025-07-26.","key":"e_1_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_24_1","DOI":"10.1007\/978-3-662-53357-4_8"},{"doi-asserted-by":"publisher","key":"e_1_2_1_25_1","DOI":"10.1109\/LCN44214.2019.8990796"},{"key":"e_1_2_1_26_1","first-page":"1","article-title":"Information propagation in the bitcoin network. In IEEE P2P 2013 Proceedings","author":"Decker Christian","year":"2013","unstructured":"Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In IEEE P2P 2013 Proceedings. IEEE, 1-10.","journal-title":"IEEE"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1007\/978-3-030-32101-7_32"},{"key":"e_1_2_1_28_1","volume-title":"The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. SSRN-Elec","author":"Dittrich David","year":"2012","unstructured":"David Dittrich and Erin Kenneally. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. SSRN-Elec (2012)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_29_1","DOI":"10.1007\/978-3-662-44774-1_7"},{"key":"e_1_2_1_30_1","first-page":"605","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. {ZMap}: Fast internet-wide scanning and its security applications. In 22nd USENIX Security Symposium (USENIX Security 13). 605-620."},{"key":"e_1_2_1_31_1","first-page":"55","article-title":"New Coins on the Block: How Should Cryptocurrency Hard Forks be Taxed","volume":"74","author":"Elman William","year":"2021","unstructured":"William Elman. 2021. New Coins on the Block: How Should Cryptocurrency Hard Forks be Taxed? Fed. Comm. LJ 74 (2021), 55.","journal-title":"Fed. Comm. LJ"},{"unstructured":"ETCNodes.org. 2025. ETCNodes - Ethereum Classic Network Node Explorer. https:\/\/etcnodes.org\/. Accessed: 2025-07-28.","key":"e_1_2_1_32_1"},{"unstructured":"Ethereum devp2p Contributors. 2025. devp2p Discovery v4 Protocol Specification (discv4). https:\/\/github.com\/ethereum\/devp2p\/blob\/master\/discv4.md. Accessed: 2025-07-29.","key":"e_1_2_1_33_1"},{"unstructured":"Ethereum devp2p Contributors. 2025. devp2p Discovery v5 Protocol Specification (discv5). https:\/\/github.com\/ethereum\/devp2p\/blob\/master\/discv5\/discv5.md. Accessed: 2025-07-29.","key":"e_1_2_1_34_1"},{"unstructured":"Ethernodes.org. 2025. Ethernodes - Real-Time Ethereum Node Statistics. https:\/\/ethernodes.org. Accessed: 2025-07-28.","key":"e_1_2_1_35_1"},{"unstructured":"Cardano Foundation. 2025. Peer-to-peer (P2P) networking. https:\/\/docs.cardano.org\/about-cardano\/explore-more\/cardano-network\/p2p-networking. Cardano Docs. Accessed: 2025-07-26.","key":"e_1_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_37_1","DOI":"10.1109\/ISCC47284.2019.8969695"},{"key":"e_1_2_1_38_1","first-page":"364","volume-title":"Proceedings of the Internet Measurement Conference","author":"Gasser Oliver","year":"2018","unstructured":"Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczy'ski, Stephen D Strowes, Luuk Hendriks, and Georg Carle. 2018. Clusters in the expanse: Understanding and unbiasing IPv6 hitlists. In Proceedings of the Internet Measurement Conference 2018. 364-378."},{"doi-asserted-by":"publisher","key":"e_1_2_1_39_1","DOI":"10.1007\/978-3-662-58387-6_24"},{"doi-asserted-by":"publisher","key":"e_1_2_1_40_1","DOI":"10.1007\/978-3-031-18283-9_35"},{"volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15). 129-144.","author":"Heilman Ethan","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on bitcoin's peer-to-peer network. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 129-144.","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","volume-title":"Usenix Security Symposium.","author":"Heimbach Lioba","year":"2025","unstructured":"Lioba Heimbach, Yann Vonlanthen, Juan Villacis, Lucianna Kiffer, Roger Wattenhofer, et al. 2025. Deanonymizing Ethereum Validators: The P2P network has a privacy issue. In Usenix Security Symposium."},{"doi-asserted-by":"publisher","key":"e_1_2_1_43_1","DOI":"10.1109\/EuroSPW.2019.00040"},{"unstructured":"Olga Hryniuk. 2023. Dynamic P2P is available on mainnet. https:\/\/iohk.io\/en\/blog\/posts\/2023\/03\/16\/dynamic-p2p-is-coming-to-cardano\/. IOHK Blog. Accessed: 2025-07-26.","key":"e_1_2_1_44_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1109\/BLOC.2019.8751297"},{"unstructured":"IPinfo. [n.d.]. IPinfo - IP Address API and Data Solutions. https:\/\/ipinfo.io.","key":"e_1_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1007\/978-3-662-64331-0_23"},{"unstructured":"Quentin Kniep Kobi Sliwinski and Roger Wattenhofer. 2025. Solana Alpenglow White Paper. https:\/\/drive.google.com\/file\/d\/1y_7ddr8oNOknTQYHzXeeMD2ProQ0WjMs\/view Accessed: 2025-07-28.","key":"e_1_2_1_48_1"},{"unstructured":"Koios Team. 2025. Koios API: GET Relays. https:\/\/api.koios.rest\/#get-\/pool_relays. Accessed: 2025-07-26.","key":"e_1_2_1_49_1"},{"key":"e_1_2_1_50_1","volume-title":"A Place for Everyone vs Everyone in its Place: Measuring and Attacking the Ethereum Global Network. Cryptology ePrint Archive","author":"Li Chenyu","year":"2025","unstructured":"Chenyu Li, Ren Zhang, and Xiaorui Gong. 2025. A Place for Everyone vs Everyone in its Place: Measuring and Attacking the Ethereum Global Network. Cryptology ePrint Archive (2025)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_51_1","DOI":"10.1145\/3487552.3487814"},{"doi-asserted-by":"publisher","key":"e_1_2_1_52_1","DOI":"10.1145\/3319535.3345649"},{"unstructured":"Pontem Technology Ltd. 2024. eCash: How Is It Different From Its Predecessors. https:\/\/pontem.network\/posts\/ecash-how-is-it-different-from-its-predecessors Accessed: 2025-10-09.","key":"e_1_2_1_53_1"},{"key":"e_1_2_1_54_1","volume-title":"Unveiling Ethereum's P2P Network: The Role of Chain and Client Diversity. arXiv preprint arXiv:2501.16236","author":"Luo Jiahao","year":"2025","unstructured":"Jiahao Luo. 2025. Unveiling Ethereum's P2P Network: The Role of Chain and Client Diversity. arXiv preprint arXiv:2501.16236 (2025)."},{"key":"e_1_2_1_55_1","volume-title":"Low-resource eclipse attacks on ethereum's peer-to-peer network. IACR ePrint Cryptology Report","author":"Marcus Yuval","year":"2020","unstructured":"Yuval Marcus, Ethan Heilman, and Sharon Goldberg. 2020. Low-resource eclipse attacks on ethereum's peer-to-peer network. IACR ePrint Cryptology Report (2020)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_56_1","DOI":"10.1109\/NOMS47738.2020.9110354"},{"doi-asserted-by":"publisher","key":"e_1_2_1_57_1","DOI":"10.1371\/journal.pone.0225966"},{"key":"e_1_2_1_58_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In International Workshop on Peer-to-Peer Systems. 53-65","author":"Maymounkov Petar","year":"2002","unstructured":"Petar Maymounkov and David Mazieres. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In International Workshop on Peer-to-Peer Systems. 53-65."},{"key":"e_1_2_1_59_1","volume-title":"Discovering bitcoin's public topology and influential nodes. et al","author":"Miller Andrew","year":"2015","unstructured":"Andrew Miller, James Litton, Andrew Pachulski, Neal Gupta, Dave Levin, Neil Spring, and Bobby Bhattacharjee. 2015. Discovering bitcoin's public topology and influential nodes. et al (2015)."},{"unstructured":"MonitorEth. 2025. MonitorEth Nodes Status Dashboard. https:\/\/monitoreth.io\/nodes. Accessed: 2025-07-28.","key":"e_1_2_1_60_1"},{"unstructured":"NEAR Protocol. 2025. NEAR Protocol Network Architecture. https:\/\/near.github.io\/nearcore\/architecture\/network Accessed: 2025-07-27.","key":"e_1_2_1_61_1"},{"unstructured":"NEAR Protocol Developers. 2025. NEAR Protocol Network Messages Specification. https:\/\/github.com\/near\/nearcore\/blob\/1167c0fda83fdfa76376021d1071719650d7a5b9\/chain\/network\/src\/network_protocol\/network.proto. Accessed: 2025-07-27.","key":"e_1_2_1_62_1"},{"key":"e_1_2_1_63_1","volume-title":"NEAR RPC API: Network (status) Method. https:\/\/docs.near.org\/api\/rpc\/network. Accessed: 2025-07-28.","author":"Protocol Foundation NEAR","year":"2025","unstructured":"NEAR Protocol Foundation. 2025. NEAR RPC API: Network (status) Method. https:\/\/docs.near.org\/api\/rpc\/network. Accessed: 2025-07-28."},{"key":"e_1_2_1_64_1","first-page":"358","article-title":"Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld)","author":"Neudecker Till","year":"2016","unstructured":"Till Neudecker, Philipp Andelfinger, and Hannes Hartenstein. 2016. Timing analysis for inferring the topology of the bitcoin peer-to-peer network. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld). IEEE, 358-367.","journal-title":"IEEE"},{"doi-asserted-by":"publisher","key":"e_1_2_1_65_1","DOI":"10.1007\/978-3-030-32101-7_6"},{"unstructured":"OBSRVR. 2025. OBSRVR Radar. https:\/\/radar.withobsrvr.com\/. Accessed: 2025-07-28.","key":"e_1_2_1_66_1"},{"key":"e_1_2_1_67_1","volume-title":"The CLARITY Act: Explaining and Analyzing How Congress Will Transform Digital Asset Markets. Available at SSRN 5288934","author":"Oranburg Seth","year":"2025","unstructured":"Seth Oranburg. 2025. The CLARITY Act: Explaining and Analyzing How Congress Will Transform Digital Asset Markets. Available at SSRN 5288934 (2025)."},{"doi-asserted-by":"publisher","key":"e_1_2_1_68_1","DOI":"10.1140\/epjds\/s13688-018-0159-3"},{"doi-asserted-by":"publisher","key":"e_1_2_1_69_1","DOI":"10.1109\/ACCESS.2019.2914098"},{"key":"e_1_2_1_70_1","volume-title":"Ethical Considerations in Network Measurement Papers. Commun. ACM","author":"Partridge Craig","year":"2016","unstructured":"Craig Partridge and Mark Allman. 2016. Ethical Considerations in Network Measurement Papers. Commun. ACM (2016)."},{"unstructured":"ProbeLab. 2025. ProbeLab: Network Measurement and Research. https:\/\/probelab.io. Accessed: 2025-07-28.","key":"e_1_2_1_71_1"},{"unstructured":"Protocol Labs \/ libp2p Contributors. 2025. go-libp2p-kad-dht: Go Implementation of the libp2p Kademlia DHT. https:\/\/github.com\/libp2p\/go\u00e2\u0102\u015alibp2p\u00e2\u0102\u015akad\u00e2\u0102\u015adht. Accessed: 2025-07-29.","key":"e_1_2_1_72_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_73_1","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"e_1_2_1_74_1","first-page":"1","article-title":"Clubbing with the peers: A measurement study of BitTorrent live. In 14-th IEEE International Conference on Peer-to-Peer Computing","author":"R\u00fcckert Julius","year":"2014","unstructured":"Julius R\u00fcckert, Tamara Knierim, and David Hausheer. 2014. Clubbing with the peers: A measurement study of BitTorrent live. In 14-th IEEE International Conference on Peer-to-Peer Computing. IEEE, 1-10.","journal-title":"IEEE"},{"doi-asserted-by":"publisher","key":"e_1_2_1_75_1","DOI":"10.1109\/ICDCS.2019.00119"},{"unstructured":"Helen Partz Savage. 2024. DeFi faces uncertain future as European Union passes new law targeting decentralization. https:\/\/cointelegraph.com\/news\/defi-decentralized-eu-law Accessed: 2025-07-29.","key":"e_1_2_1_76_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_77_1","DOI":"10.1145\/637201.637222"},{"unstructured":"SolanaBeach. 2025. SolanaBeach Network Explorer. https:\/\/solanabeach.io. Accessed: 2025-07-28.","key":"e_1_2_1_78_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_79_1","DOI":"10.1109\/SRDS.2015.40"},{"unstructured":"Stellar Development Foundation. 2025. Stellar Core Overlay Protocol Documentation. https:\/\/github.com\/stellar\/stellar-core\/blob\/master\/docs\/overlay.md. Accessed: 2025-07-27.","key":"e_1_2_1_80_1"},{"unstructured":"Stellar Development Foundation. 2025. Stellar Core OverlayManager Implementation. https:\/\/github.com\/stellar\/stellar-core\/blob\/99bd219bfa0cfbe91cd043c35e6c2429ffa3b975\/src\/overlay\/OverlayManagerImpl.cpp. Accessed: 2025-07-27.","key":"e_1_2_1_81_1"},{"unstructured":"Stellarbeat Development Team. 2024. JS Stellar Node Crawler. https:\/\/github.com\/stellarbeat\/js-stellar-node-crawler. Accessed: 2025-07-28.","key":"e_1_2_1_82_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_83_1","DOI":"10.1145\/1177080.1177105"},{"unstructured":"0xPolygon Team. 2025. bor: Official Golang Implementation of Polygon PoS (fork of Geth). https:\/\/github.com\/0xPolygon\/bor. Accessed: 2025-10-09.","key":"e_1_2_1_84_1"},{"key":"e_1_2_1_85_1","first-page":"1253","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Tran Muoi","year":"2021","unstructured":"Muoi Tran, Akshaye Shenoi, and Min Suk Kang. 2021. On the {Routing-Aware} peering against {Network-Eclipse} attacks in bitcoin. In 30th USENIX Security Symposium (USENIX Security 21). 1253-1270."},{"doi-asserted-by":"publisher","key":"e_1_2_1_86_1","DOI":"10.1145\/3544216.3544232"},{"key":"e_1_2_1_87_1","volume-title":"Towards better understanding of bitcoin unreachable peers. arXiv preprint arXiv:1709.06837","author":"Wang Liang","year":"2017","unstructured":"Liang Wang and Ivan Pustogarov. 2017. Towards better understanding of bitcoin unreachable peers. arXiv preprint arXiv:1709.06837 (2017)."},{"unstructured":"XRPL Foundation. 2024. XRPL Peer Crawler - Peer Port Methods. https:\/\/xrpl.org\/docs\/references\/http-websocket-apis\/peer-port-methods\/peer-crawler. Accessed: 2025-07-28.","key":"e_1_2_1_88_1"},{"unstructured":"XRPL Foundation. 2025. XRPL Peer Protocol. https:\/\/xrpl.org\/docs\/concepts\/networks-and-servers\/peer-protocol. Accessed: 2025-07-27.","key":"e_1_2_1_89_1"},{"key":"e_1_2_1_90_1","volume-title":"Rippled: PeerFinder Module. https:\/\/github.com\/XRPLF\/rippled\/tree\/develop\/src\/xrpld\/peerfinder. Accessed: 2025-07-27.","author":"XRPLF.","year":"2025","unstructured":"XRPLF. 2025. Rippled: PeerFinder Module. https:\/\/github.com\/XRPLF\/rippled\/tree\/develop\/src\/xrpld\/peerfinder. Accessed: 2025-07-27."},{"unstructured":"XRPSCAN. 2025. XRPSCAN - Validators. https:\/\/xrpscan.com\/validators. Accessed: 2025-10-13.","key":"e_1_2_1_91_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_92_1","DOI":"10.1093\/cmlj\/kmab005"},{"unstructured":"ZGrab2 authors. 2025. ZGrab 2.0 on GitHub. https:\/\/github.com\/zmap\/zgrab2. Accessed: 2025-07-26.","key":"e_1_2_1_93_1"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3771572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:25:56Z","timestamp":1764782756000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3771572"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":93,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["10.1145\/3771572"],"URL":"https:\/\/doi.org\/10.1145\/3771572","relation":{},"ISSN":["2476-1249"],"issn-type":[{"type":"electronic","value":"2476-1249"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"2025-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}