A Survey of IPv6 Address Scanning Technologies
Abstract
1. Introduction
2. Overview of IPv6 Address Space Scanning
2.1. IPv6 Address Space Encoding and Allocation
- Overview of IPv6 Addresses
- 2.
- Analysis of Address Patterns
2.2. Detection Process and Challenges
3. Optimized Scanning-Based Detection Algorithms
3.1. Single-Point Detection Optimization Algorithms
3.2. Distributed Detection Algorithms
3.2.1. CAIDA Archipelago
3.2.2. Rapid7 Nexpose
4. Address Generation-Based Detection Algorithms
4.1. DNS-Based Detection Address Generation Algorithms
4.1.1. Algorithms Based on Website Resolution
- NXERROR means the query domain exists in the ip6.arpa domain, but there are no PTR records. It adds a new nibble whose initial value is 0, and appends it to the previous reverse query.
- NXDOMAIN means there are no records for the query; the program will increase the value on the current nibble and query again.
- If the response is the hostname, the program will save the result in the database.
4.1.2. IPv4 vs. IPv6 Algorithm
4.1.3. Traversal Algorithm Based on Domain Name Tree
- Network Segment Traversal: When traversing the subnet addresses, a combination of depth-first and breadth-first traversal is adopted. Firstly, a depth-first traversal of the first 32-bit subnets is carried out, and then a breadth-first traversal. After that, for the subnets with existing domain names, a depth-first traversal is performed again to obtain 48-bit subnets, and then a breadth-first traversal is carried out. According to the above algorithm, the 64-bit subnets are traversed.
- Host Traversal: For each domain name space where hosts exist, a direct traversal to 128 bits is carried out. In order to speed up the search, this algorithm takes the active IPv6 address segments published by the Route View project [44] and the RIPE project [45] as inputs. Additionally, it analyzes the prevalence of dynamic domain names in the current network by introducing the Damerau–Levenshtein edit distance to compute domain name similarity, thereby facilitating the detection of dynamically allocated domain names.
4.2. Pattern-Based Detection Address Generation Algorithms
4.2.1. Non-Neural Networks-Based Generation Algorithms
- Algorithm Based on Seed Fingerprint
Algorithm 1. Recursion pattern-based IPv6 generation algorithm |
Input: IP Bit Pattern (Marked with Determined and Undetermined Bits) 1: if count(undetermined bits) < threshold then 2: iterateAddresses(pattern) 3: return false 4: end if 5: rule = findBestRule(pattern) 6: pattern = apply(pattern,rule) 7: doRecursionWith(pattern) 8: alternativeRule = inverse(rule) 9: alternativePattern = apply(pattern, alternativeRule) 10: doRecursionWith(alternativePattern) |
- 2.
- Information Entropy-Based Generation Algorithm
- 3.
- 6Gen Algorithm
- 4.
- 6Tree Algorithm
- 5.
- Anomaly Seed Detection Algorithms
4.2.2. Neural Networks-Based Generation Algorithms
- Deep Neural Networks-based Generation algorithms
- 2.
- Generative Adversarial Network-based Generation Algorithm
- 3.
- Hybrid Neural Network-Based Generation Algorithm
5. Comprehensive Comparison and Future Direction
5.1. Comprehensive Comparison and Analysis of Algorithms
5.2. Future Research Directions
- Collection of Active IPv6 Addresses and Allocation Patterns
- 2.
- Discovery and Detection of IPv6 Address Patterns Based on Machine Learning
- 3.
- Improving the Detection Response Rate
- 4.
- Moral Issues Caused by Network Detection
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
Abbreviations
ISP | Internet Service Provider |
DNS | Domain Name System |
ICMP | Internet Control Message Protocol |
LSTM | Long Short-Term Memory network |
CNN | Convolutional Neural Network |
BGP | Border Gateway Protocol |
GAN | Generative Adversarial Network |
AS | Autonomous System |
References
- Statista. Available online: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/ (accessed on 26 May 2025).
- Ngo, T.; Yin, J.; Ge, Y.-F.; Wang, H. Optimizing IoT Intrusion Detection—A Graph Neural Network Approach with Attribute-Based Graph Construction. Information 2025, 16, 499. [Google Scholar] [CrossRef]
- Alshehri, S.M.; Sharaf, S.A.; Molla, R.A. Systematic Review of Graph Neural Network for Malicious Attack Detection. Information 2025, 16, 470. [Google Scholar] [CrossRef]
- Jain, V.K.; Aggrawal, J.; Dangi, R.; Prasad Shukla, S.S.; Yadav, A.K.; Choudhary, G. Unmasking the True Identity: Unveiling the Secrets of Virtual Private Networks and Proxies. Information 2025, 16, 126. [Google Scholar] [CrossRef]
- Li, K.-H.; Wong, K.-Y. Empirical Analysis of IPv4 and IPv6 Networks through Dual-Stack Sites. Information 2021, 12, 246. [Google Scholar] [CrossRef]
- The RIPE NCC Has Run Out of IPv4 Addresses. Available online: https://www.ripe.net/publications/news/about-ripe-ncc-and-ripe/the-ripe-ncc-has-run-out-of-ipv4-addresses (accessed on 21 July 2025).
- Chinese Government Website. Available online: http://www.gov.cn/zhengce/2017-11/26/content_5242389.htm (accessed on 21 July 2025).
- 2018 ISOC Report on IPv6 Deployment. Available online: https://www.internetsociety.org/wp-content/uploads/2018/06/2018-ISOC-Report-IPv6-Deployment.pdf (accessed on 21 July 2025).
- The 55th Statistical Report on China’s Internet Development. Available online: https://cnnic.cn/n4/2025/0117/c208-11228.html (accessed on 21 July 2025).
- Ubiedo, L.; O’Hara, T.; Erquiaga, M.J.; Garcia, S. Current state of IPv6 security in IoT. arXiv 2021, arXiv:2105.02710. [Google Scholar] [CrossRef]
- Hinden, R.; Deering, S. IP Version 6 Addressing Architecture, RFC1884, December 1995. Available online: https://www.rfc-editor.org/rfc/rfc1884.html (accessed on 21 July 2025).
- Hinden, R.; Deering, S. IP Version 6 Addressing Architecture, RFC2373, July, 1998. Available online: https://www.rfc-editor.org/rfc/rfc2373.html (accessed on 21 July 2025).
- Hinden, R.; Deering, S. IP Version 6 Addressing Architecture, RFC3513, April 2003. Available online: https://www.scirp.org/reference/referencespapers?referenceid=246286 (accessed on 21 July 2025).
- Hinden, R.; Deering, S. IP Version 6 Addressing Architecture, RFC3513, February 2006. Available online: https://www.rfc-editor.org/rfc/rfc4291.html (accessed on 21 July 2025).
- Ehsan ul Haq, M.; Raza Perwaz, M.; Ahmed, K. Compact and user-friendly representation of IPv6 addressing approach and masking. In Proceedings of the 2009 International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 9–12 November 2009. [Google Scholar]
- Foremski, P.; Plonka, D.; Berger, A. Entropy/IP: Uncovering Structure in IPv6 Addresses. In Proceedings of the Internet Measurement Conference, ACM, Santa Monica, CA, USA, 27–29 October 2016. [Google Scholar]
- Plonka, D.; Berger, A. Temporal and Spatial Classification of Active IPv6 Addresses. In Proceedings of the Internet Measurement Conference, ACM, Tokyo, Japan, 28–30 October 2015. [Google Scholar]
- Gont, F.; Chown, T. Network Reconnaissance in IPv6 Networks; Technical Report; Internet Engineering Task Force (IETF): Montreal, QC, Canada, 2016. [Google Scholar]
- Malone, D. Observations of IPv6 addresses. In Proceedings of the International Conference on Passive and Active Network Measurement, Cleveland, OH, USA, 29–30 March 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 21–30. [Google Scholar]
- Fan, X.; Heidemann, J. Selecting representative IP addresses for Internet topology studies. In Proceedings of the Internet Measurement Conference, ACM, Melbourne, VIC, Australia, 1–3 November 2010; pp. 411–423. [Google Scholar]
- Bou-Harb, E.; Debbabi, M.; Assi, C. Cyber scanning: A comprehensive survey. IEEE Commun. Surv. Tut 2013, 16, 1496–1519. [Google Scholar] [CrossRef]
- Durumeric, Z.; Wustrow, E.; Halderman, J.A. ZMap: Fast Internet-wide Scanning and Its Security Applications. In Proceedings of the 22nd USENIX Conference on Security, Washington, DC, USA, 14–16 August 2013. [Google Scholar]
- Masscan. Available online: https://github.com/robertdavidgraham/masscan/ (accessed on 21 July 2025).
- Song, G.; He, L.; Wang, Z.; Yang, J.; Jin, T.; Liu, J.; Li, G. Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space. In Proceedings of the IWQOS 2020: 28th International Teletraffic Congress (ITC 28), Hangzhou, China, 15–17 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
- Cheng, X.; Jing, S.; Jiao, L.; Zhao, C.; Yang, H. A survey of IPv6 address scanning techniques. In Proceedings of the Second International Conference on Frontiers of Applied Optics and Computer Engineering (AOCE 2025), Guangzhou, China, 20–22 March 2025; SPIE: Bellingham, WA, USA, 2025; Volume 13564, pp. 143–152. [Google Scholar]
- Colitti, L.; Di Battista, G.; Patrignani, M. IPv6-in-IPv4 tunnel discovery: Methods and experimental results. IEEE TNSM Trans. Netw. Serv. Manag. 2004, 1, 30–38. [Google Scholar] [CrossRef]
- Ahmed, A.S.A.M.S.; Hassan, R.; Othman, N.E. IPv6 neighbor discovery protocol specifications, threats and countermeasures: A survey. IEEE Access 2017, 5, 18187–18210. [Google Scholar] [CrossRef]
- Chown, T. IPv6 Implications for Network Scanning; Technical Report; Internet Engineering Task Force (IETF): Montreal, QC, Canada, 2008. [Google Scholar]
- Li, J.; Su, F.; Lin, Z.; Yan, M. The research and analysis of worm scanning strategies in IPv6 network. In Proceedings of the 2011 13th Asia-Pacific Network Operations and Management Symposium, Jeju, Korea, 21–23 March 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–4. [Google Scholar]
- Su, F.; Xu, W.J.; Lin, Z.W.; Ma, Y. Internet Worm Modeling and Analysis in IPv6 Networks. Adv. Mater. Res. 2011, 268, 1514–1519. [Google Scholar] [CrossRef]
- Zirngibl, J.; Steger, L.; Sattler, P.; Gasser, O.; Carle, G. Rusty Clusters? Dusting an IPv6 Research Foundation. In Proceedings of the 2022 Internet Measurement Conference, Nice, France, 25–27 October 2022. [Google Scholar]
- Rapid7 IPv6 Discovery Press Release. Available online: https://www.rapid7.com/about/press-releases/ (accessed on 21 July 2025).
- Clark, D.; Testart, C.; Luckie, M.; Claffy, K. A path forward: Improving Internet routing security by enabling zones of trust. J. Cybersecur. 2024, 10, tyae023. [Google Scholar] [CrossRef]
- Alfroy, T.; Holterbach, T.; Krenc, T.; Claffy, K.C.; Pelsser, C. Next Generation of BGP Data Collection Platforms. In Proceedings of the ACM SIGCOMM Conference 2024, Sydney, NSW, Australia, 4–8 August 2024. [Google Scholar]
- Livadariu, I.; Elmokashfi, A.; Dhamdhere, A. An agent-based model of IPv6 adoption. In Proceedings of the 2020 IFIP Networking Conference (Networking), Paris, France, 22–26 June 2020. [Google Scholar]
- Alexa Top 1,000,000 Sites. Available online: http://www.alexa.com/topsites (accessed on 21 July 2025).
- Strowes, S.D. Bootstrapping Active IPv6 Measurement with IPv4 and Public DNS. arXiv 2017, arXiv:1701.00891. [Google Scholar] [CrossRef]
- Fiebig, T.; Borgolte, K.; Hao, S.; Kruegel, C.; Vigna, G. Something from Nothing (There): Collecting Global IPv6 Datasets from DNS. In Passive and Active Measurement (PAM); Springer: Cham, Switzerland, 2017; pp. 30–43. [Google Scholar]
- Borgolte, K.; Hao, S.; Fiebig, T.; Vigna, G. Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones. In Proceedings of the 2018 IEEE Symposium on Security & Privacy, San Francisco, CA, USA, 21–23 May 2018; IEEE Computer Society: Los Alamitos, CA, USA, 2018; pp. 770–784. [Google Scholar]
- Gasser, O.; Hof, B.; Helm, M.; Korczynski, M.; Holz, R.; Carle, G. In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements. In Passive and Active Measurement Conference Proceedings; Springer: Cham, Switzerland, 2018; pp. 173–185. [Google Scholar]
- Fukuda, K.; Heidemann, J. Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning. In Proceedings of the Internet Measurement Conference 2018, Boston, MA, USA, 31 October–2 November 2018; ACM: New York, NY, USA, 2018; pp. 1–7. [Google Scholar]
- Nikkhah, M.; Guérin, R.; Lee, Y.; Woundy, R. Assessing IPv6 Through Web Access: A Measurement Study and Its Findings. In Proceedings of the Seventh Conference on Emerging Networking Experiments and Technologies, Tokyo, Japan, 6–9 December 2011. [Google Scholar]
- Hu, Q.; Brownlee, N. IPv6 Host Address Usage Survey. Int. J. Future Comput. Commun. 2014, 3, 341–345. [Google Scholar] [CrossRef]
- University of Oregon RouteViews Project. Available online: https://www.routeviews.org/routeviews/ (accessed on 20 July 2025).
- Ripe NCC. RIPE Routing Information Service (RIS). Available online: https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris/ (accessed on 21 July 2025).
- Fiebig, T.; Borgolte, K.; Shuang, H.; Kruegel, C.; Vigna, G.; Feldmann, A. In rDNS We Trust: Revisiting a Common Data-Source’s Reliability. In International Conference on Passive & Active Network Measurement Proceedings; Springer: Cham, Switzerland, 2018; pp. 1–15. [Google Scholar]
- Ullrich, J.; Kieseberg, P.; Krombholz, K.; Weippl, E. On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. In Proceedings of the 2015 10th International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24–27 August 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–8. [Google Scholar]
- Song, G.; Yang, J.; Wang, Z.; He, L.; Lin, J.; Pan, L.; Duan, C.; Quan, X. DET: Enabling efficient probing of IPv6 active addresses. IEEE/ACM TON Trans. Netw. 2022, 30, 1629–1643. [Google Scholar] [CrossRef]
- Murdock, A.; Li, F.; Bramsen, P.; Durumeric, Z.; Paxson, V. Target generation for internet-wide IPv6 scanning. In Proceedings of the Internet Measurement Conference, London, UK, 1–3 November 2017; ACM: New York, NY, USA, 2017; pp. 242–253. [Google Scholar]
- Zheng, G.; Xu, X.; Wang, C. An Effective Target Address Generation Method for IPv6 Address Scan. In Proceedings of the 2020 IEEE 6th International Conference on Computer and Communications (ICCC), Chengdu, China, 11–14 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar]
- Liu, Z.; Xiong, Y.; Liu, X.; Xie, W.; Zhu, P. 6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space. Comput. Netw. 2019, 155, 31–46. [Google Scholar] [CrossRef]
- Yang, T.; Hou, B.; Cai, Z.; Wu, K.; Zhou, T.; Wang, C. 6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning. Comput. Netw. 2022, 203, 108666. [Google Scholar] [CrossRef]
- Yang, T.; Cai, Z.; Hou, B.; Zhou, T. 6Forest: An ensemble learning-based approach to target generation for internet-wide IPv6 scanning. In Proceedings of the IEEE INFOCOM 2022—IEEE Conference on Computer Communications, London, UK, 2–5 May 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1679–1688. [Google Scholar]
- Cui, T.; Gou, G.; Xiong, G. 6GCVAE: Gated Convolutional Variational Autoencoder for IPv6 Target Generation. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining, Singapore, 11–14 May 2020; pp. 609–622. [Google Scholar]
- Cui, T.; Xiong, G.; Gou, G.; Shi, J.; Xia, W. 6VecLM: Language Modeling in Vector Space for IPv6 Target Generation. In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, Ghent, Belgium, 14–18 September 2020; pp. 192–207. [Google Scholar]
- Cui, T.; Gou, G.; Xiong, G.; Liu, C.; Fu, P.; Li, Z. 6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning. In Proceedings of the IEEE Conference on Computer Communications, Vancouver, BC, Canada, 10–13 May 2021; pp. 1–10. [Google Scholar]
- Gasser, O.; Scheitle, Q.; Foremski, P.; Lone, Q.; Korczyński, M.; Strowes, S.D.; Hendrinks, L.; Carle, G. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. In Proceedings of the IMC ‘18: Internet Measurement Conference, Boston, MA, USA, 31 October–2 November 2018; ACM: New York, NY, USA, 2018; pp. 364–378. [Google Scholar]
- Song, G.; He, L.; Zhu, F.; Lin, J.; Zhang, W.; Fan, L.; Li, C.; Wang, Z.; Yang, J. AddrMiner: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System. IEEE/ACM TON Trans. Netw. 2024, 32, 3870–3887. [Google Scholar] [CrossRef]
- Gasser, O.; Scheitle, Q.; Gebhard, S.; Carle, G. IPv6 Hitlist Collection. Available online: http://www.net.in.tum.de/pub/ipv6-hitlist/ (accessed on 21 July 2025).
Algorithm | Complexity | Year | Key Techniques | Seed Dependent | Integrity |
---|---|---|---|---|---|
Alex-based [42] | O(N) | 2011 | Alex + rDNS | Yes | poor |
RIR-based [43] | O(MN) | 2011 | RIR + rDNS | Yes | poor |
IPv4 Vs IPv6 [37] | O(N) | 2017 | IPv4 + rDNS | Yes | poor |
DNS-based [38] | O(N2) | 2017 | Levenshtein Distance + rDNS | Semi | excellent |
DNS-based++ [39] | 0.5O(N2) | 2018 | DNSSEC + rDNS | Semi | good |
Pattern-based [47] | MO(N2) | 2015 | Address pattern + recursive scanning | Yes | good |
Pattern-based++ [18] | MO(N2) | 2017 | Address pattern | Yes | good |
Entropy/IP [16] | O(nlogn) + O(N2k) | 2016 | Information entropy + Bayesian network | Yes | good |
Balanced [57] | O(nlogn) + O(n) | 2018 | Information entropy + k-means | Yes | good |
IDEC [50] | O(nlogn) + O(N2) | 2020 | Information entropy + OPTICS | Yes | good |
6Gen [49] | O(nlogn) + O(N2) | 2017 | Hamming distance + density clustering | Yes | good |
6Tree [51] | O(nlogn) + O(N3) | 2019 | Information entropy + Agglomerative Clustering | Yes | good |
DET [48] | O(nlogn) + O(N3) | 2020 | Information entropy + Divisive Hierarchical | Yes | good |
6GCVAE [54] | O(n*D2) | 2020 | Gated Convolutional Network | Yes | good |
6VecLM [55] | O(n*D2) | 2021 | Word Vector + Gated Convolutional Network | Yes | good |
6Gan [56] | O(2n*D2) | 2021 | Generative Adversarial Networks | Yes | good |
AddrMiner [58] | O(2n*D2) | 2024 | BGP Allocation + Generative Adversarial Networks | No | excellent |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ma, Y.; Chen, L.; Wang, Z. A Survey of IPv6 Address Scanning Technologies. Information 2025, 16, 727. https://doi.org/10.3390/info16090727
Ma Y, Chen L, Wang Z. A Survey of IPv6 Address Scanning Technologies. Information. 2025; 16(9):727. https://doi.org/10.3390/info16090727
Chicago/Turabian StyleMa, Yang, Liquan Chen, and Zhanfeng Wang. 2025. "A Survey of IPv6 Address Scanning Technologies" Information 16, no. 9: 727. https://doi.org/10.3390/info16090727
APA StyleMa, Y., Chen, L., & Wang, Z. (2025). A Survey of IPv6 Address Scanning Technologies. Information, 16(9), 727. https://doi.org/10.3390/info16090727