Daily download of Alexa Top 1 Million Domains and A record lookup for each domain.
Scan of the Alexa Top 1 Million for DNS servers that reply to AXFR requests.
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed variant. With an Internet-wide scan we identified 184 HTTPS servers repeating nonces, which fully breaks the authenticity of the connections. Affected servers include large corporations, financial institutions, and a credit card company. We present a proof of concept of our attack allowing to violate the authenticity of affected HTTPS connections which in turn can be utilized to inject seemingly valid content into encrypted sessions. Furthermore, we discovered over 70,000 HTTPS servers using random nonces, which puts them at risk of nonce reuse, in the unlikely case that large amounts of data are sent via the same session.
Regular scans of the IPv4 space conducted by Project 25499
Project Sonar includes a regular scan of IPv4 SSL services on TCP port 443. The dataset includes both raw X509 certificates and processed subsets.
Project Sonar includes a regular HTTP GET request for all IPv4 hosts with an open 80/TCP
Project Sonar includes a regular scan of IPv4 SSL/TLS services such as IMAP, POP3, SMTP. Sonar scans both the direct SSL and STARTTLS modes for these services. The dataset includes raw X509 certificates, IP address to certificate mappings and certificate names for convencience.
Project Sonar includes a regular DNS lookup for all names gathered from the other scan types, such as HTTP data, SSL Certificate names, reverse DNS records, etc
Project Sonar includes a regular DNS lookup for all IPv4 PTR records
Project Sonar includes weekly probes of common UDP services across all of IPv4
The Critical.IO project was designed to uncover large-scale vulnerabilities across the global IPv4 internet. The project scanned a number of ports across the entire IPv4 address space between May 2012 and March 2013.

TCP/25, TCP/110, TCP/143, TCP/465, TCP/587, TCP/993, TCP/995, SSLyze
SBA Research · TLS in the E-mail Ecosystem

SSLyze scans of POP, IMAP and SMTP related TCP ports, 20,000,000 IP/port combinations, Apr 2015 - August 2015
Regular and continuing scans of the HTTPS Ecosystem from 2012 and 2013 including parsed and raw X.509 certificates, temporal state of scanned hosts, and the raw ZMap output of scans on port 443. The dataset contains approximately 43 million unique certificates from 108 million hosts collected via 100+ scans.
TCP SYN scans of the public IPv4 address space on port 443 completed on October 30-31, 2012 in order to measure the impact of Hurricane Sandy. The initial results from these scans were originally released as part of "ZMap: Fast Internet-Wide Scanning and its Security Applications" at USENIX Security 2013. The dataset consists of the unique TCP SYN-ACK and RST responses received by ZMap in CSV format.

TCP/443, TCP/225, TLS, X.509, ZMap, Heartbleed
University of Michigan · Heartbleed Vulnerability

Regular daily scans of IPv4 and the Alexa Top 1 Million domains on HTTPS and SMTP+StartTLS for the Heartbleed vulnerability.

DNS, Zonefile Transfer, axfr
axfr-tools · Zonefile Database

Publicly available Zonefiles parsed into a sqlite3 database.