Research scan logo

Researchscan01

Project

The Researchscan initiative is a cutting-edge project conducted by Cyber Harbor to advance our understanding of the global Internet landscape.

Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project //
Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project // Cyber harbor // Researchscan Project //

Why am I receiving connection attempts from the Researchscan?02

Our team performs harmless and minimal connection attempts to every publicly accessible computer worldwide on a daily basis. This endeavor enables us to monitor the global Internet, analyze trends in technology deployment, and assess the state of cybersecurity.

Our mission03

Our mission also includes identifying potential signs of cybercriminal activities, such as compromised infrastructures used for command and control servers. Upon detecting such threats, we promptly report our findings to the relevant CERTs (Computer Emergency Response Teams) and authorities to mitigate risks. Each public IP address may receive a limited number of data packets daily across common ports as part of this research. These interactions involve standard connection attempts and RFC-compliant protocol handshakes with responsive hosts. Importantly, our approach is non-intrusive—we do not exploit vulnerabilities, attempt to guess passwords, or modify device configurations. We only collect data that is publicly accessible to anyone connecting to the specific address and port.

Can I opt-out of these measurements?04

Our research is crucial for the scientific community, enabling the detection of security issues and empowering system operators to address vulnerabilities. While participating in this research contributes to the collective security of the Internet, we respect your choice to opt out. To do so, you can configure your firewall to drop traffic from IP addresses with DNS PTR records ending in researchscan.io Alternatively, you can reach out to us directly at [email protected] with your CIDR or IP list to ensure your network is excluded from future scans.