Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Tim W RESISTS
Tim W RESISTS
@tim@union.place  ·  activity timestamp 6 hours ago

Ruh roh. That feeling when you get the Google "we detected unusual activity from your computer or network" page and wonder if some IoT device on your network got popped...

Anyone know how to scan my network for #Kimwolf? (I don't THINK I have any old Android TVs but it's the big one of the moment I'm aware of...)

#CyberSec #Botnet

  • Copy link
  • Flag this post
  • Block
Jérôme Meyer
Jérôme Meyer
@jmeyer@infosec.exchange replied  ·  activity timestamp 11 minutes ago

@tim https://synthient.com/check and https://spur.us/context/me
Not specific to Kimwolf but to residential proxies in general.

https://spur.us/context/me
  • Copy link
  • Flag this comment
  • Block
AMS
AMS
@AMS@infosec.exchange replied  ·  activity timestamp 5 hours ago

@tim Greynoise has a self check if their honeypot network saw anything. https://check.labs.greynoise.io/

Usually I get that from google when they don't like my adblocker.

  • Copy link
  • Flag this comment
  • Block
Tim W RESISTS
Tim W RESISTS
@tim@union.place replied  ·  activity timestamp 6 hours ago

Or a non-snake-oil "scan my local network" tool in general?

  • Copy link
  • Flag this comment
  • Block
emerssso
emerssso
@emerssso@union.place replied  ·  activity timestamp 6 hours ago

@tim I've used the free tier of Nessus to run scans on my network. Kind of a pain to set up, but it did tag some vulns in some of my IoT stuff that was medium useful.

  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-beta.23 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct