319 Works

Philips Healthcare (PSN) Normal State Network Traffic Data Set 1 (09/06/2018 to 09/06/2018)

Massachusetts General Hospital
This data set consists of medical device network traffic collected from a Philips Healthcare Supplied Network (PSN). The system consisted of a Philips MX800 Patient Monitor and a Philips PIIC IX Central Station (Ver. A.02.16) connected through a Cisco 2960-S network switch. Data was collected via a data collection computer connected to the SPAN port of the switch. The MX800 monitor sensor inputs were connected to a Fluke ProSim 8 patient simulator, which supplied EKG...

US coastal network infrastructure map shapefile (01/01/2017 to 11/01/2018)

University Of Wisconsin
This data set is a shapefile for coastal network infrastructure in the US. This data set was used to conduct the study of how sea water inundation over the next 100 years will affect US Internet infrastructure (refer to R. Durairajan, C. Barford and P. Barford. "Lights Out: Climate Change Risk to Internet Infrastructure", In Proceedings of the ACM/IRTF/ISOC Applied Networking Research Workshop, July, 2018.). The shapefile provides detailed locations of nodes (e.g, co-location centers)...

Network map shapefile archive (01/01/2017 to 11/01/2018)

University Of Wisconsin
This data set consists of an gzip archive of shapefiles for maps of a selection of 50 network service provider networks from around the world. The archive includes maps of both large service providers with a world-wide footprint and metro area fiber maps. In particular, the archive offers maps of 5 the tier-1 ISPs, 10 regional ISPs distributed around the US, 5 metro fiber maps from the US and the remaining 25 maps from ISPs...

internet_outage_adaptive_a33w-20180701 (07/01/2018 to 10/01/2018)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a33n-20180701 (07/01/2018 to 10/01/2018)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a33j-20180701 (07/01/2018 to 10/01/2018)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a33g-20180701 (07/01/2018 to 10/01/2018)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a33e-20180701 (07/01/2018 to 10/01/2018)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a33c-20180701 (07/01/2018 to 10/01/2018)

University Of Southern California-Information Sciences Institute
To collect this data, all allocated and responsive Internet IP address blocks were pinged by sending ICMP ECHO_REQUEST (PING) packet. The block status was recorded in this data set. Probe was repeated every 11 minutes, and more quickly when uncertain about block status. In all, approximately 3.5M /24 subnets were periodically probed.

internet_outage_adaptive_a33all-20180701 (07/01/2018 to 10/01/2018)

University Of Southern California-Information Sciences Institute
Combined reachability information for over 3.5M /24 subnets; this dataset is created by post-processing data from datasets internet_outage_adaptive_a33c-20180701 internet_outage_adaptive_a33e-20180701 internet_outage_adaptive_a33g-20180701 internet_outage_adaptive_a33j-20180701 internet_outage_adaptive_a33n-20180701 internet_outage_adaptive_a33w-20180701

internet_address_survey_reprobing_it82w-20180904 (09/04/2018 to 09/18/2018)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40491 netblocks (/24 subnets) were periodically reprobed.

internet_address_survey_reprobing_it82c-20180919 (09/19/2018 to 10/03/2018)

University Of Southern California-Information Sciences Institute
To collect this data, a subset of Internet IP addresses was pinged by sending ICMP ECHO_REQUEST (PING) packet. The response (if it ever came within 11 minutes time interval) was recorded in this data set. Probe was repeated every 11 minutes. In all, 40491 netblocks (/24 subnets) were periodically reprobed.

internet_address_census_it82w-20180904 (09/04/2018 to 10/06/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_history_it82w-20180904 (12/02/2015 to 10/06/2018)

University Of Southern California-Information Sciences Institute
This dataset, generated on 2018-10-18, contains all IPv4 addresses who ever responded to our ISI-west (w) censuses, starting from census it11w (internet_address_survey_it11w-20060307), e.g. it11w, it12w, ... Each IP address is given a history of replies (as a bit-string with 's representing ICMP_ECHO_REPLY received from this IP, and 's corresponding to no-replies. We also include numerical scores that are intended to reflect the likelihood that the given IP address will repond in the future. The scores...

internet_address_hitlist_it82w-20180904 (12/02/2015 to 10/06/2018)

University Of Southern California-Information Sciences Institute
This IP hitlist was generated on 2018-10-18, based on census data from it67w to it82w. Hitlist contains one representative IP address for each /24 block which has appeared to have responsive addresses during it67w - it82w.

internet_address_census_it82n-20180904 (09/04/2018 to 10/06/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it82j-20180904 (09/04/2018 to 10/07/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it82g-20180904 (09/04/2018 to 10/07/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it82e-20180904 (09/04/2018 to 10/09/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

internet_address_census_it82c-20180904 (09/04/2018 to 10/06/2018)

University Of Southern California-Information Sciences Institute
To collect this data, an Internet-wide IP address sweep was conducted. Every IP address in the ranges allocated by IANA was pinged once by sending ICMP ECHO_REQUEST (PING) packet. If the response (ICMP_ECHO_REPLY) came, its IP address was recorded in this data-set. In all, over 2.5 billion distinct IP addresses were probed during this experiment.

ISP Abuse E-Mail Feed

External Data Source
This feed is filterable by e-mail address, IP address, or ASN number. This is the master feed for the Twitter “bad abuse” feed and is pulled from live data. URLs https://www.webiron.com/abuse_feed/ https://www.webiron.com/abuse_feed/[ip address] https://www.webiron.com/abuse_feed/[asn number] https://www.webiron.com/abuse_feed/[e-mail address] Fields Log Entry Type – Contains the action. This is either, report sent, report opened, report or if the host has replied with a resolved statement. Log Time – Time action was done Attacker IP – The IP...

IP Net Abuse Leaderboard

External Data Source
This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Insidents Reported, Last Reported: Rank– Rank of UNRESOLVED ISP ABUSE LEADERBOARD Host ASN- unique number that's available globally to identify an autonomous system Network – Network in which attack took place Day Unresolved – amount of days issue was unresolved Insidents Reported –amount of insidents reported Last Reported- Date issue was last reported ;

BOT NETWORK FEED

External Data Source
This feed is filterable by Rank, Host ASN, Network, Days Unresolved, Insidents Reported, Last Reported: Rank– Rank of UNRESOLVED ISP ABUSE LEADERBOARD Host ASN- unique number that's available globally to identify an autonomous system Network – Network in which attack took place Day Unresolved – amount of days issue was unresolved Insidents Reported –amount of insidents reported Last Reported- Date issue was last reported ;

IP Web Abuse Leaderboard

External Data Source
This feed is filterable by Rank, Days Unresolved, Insidents Reported, Attacker IP, Network, Reported Emails, Last Calculated: Rank– Rank of IP web Abuse Days Unresolved- number of days unresolved Insidents Reported –amount of insidents reported Attacker IP- Specific IP of abuse attcker ;

Captured File Feed

External Data Source
Captured file feed contains a log of our reports and status of the issue reported. This feed is filterable by File MD5, File Mine Type, Captured Type, Associated URL, File Size, Captured Time. Fields: File MD5– Contains the Identification ID. File Mine Type- identifying files on the Internet according to their nature and format Captured Type – extracted or uploaded Associated URL – Specific URL assocaited with attack File Size –size of file of captured...

Registration Year

  • 2018
    319

Resource Types

  • Dataset
    319