This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


Hurricane Sandy ZMap Scans
External Dataset
External Data Source
Internet-Wide Scan Data Repository
56 (lowest rank is 56)

Category & Restrictions

application layer security, address space status data


TCP SYN scans of the public IPv4 address space on port 443 completed on Oct 30-31, 2012 to measure the impact of Hurricane Sandy. Results from these scans were released in "ZMap: Fast Internet-Wide Scanning and its Security Applications" at USENIX Security 2013. The data consists of the unique TCP SYN-ACK and RST responses received, in CSV format.

The dataset is composed the ZMap CSV output of full TCP SYN scans of the IPv4 address against port 443. All files contain the following fields: response, saddr, daddr, sport, dport, in_cooldown, timestamp. The output contains any TCP SYN-ACK or TCP RST responses. We acknowledge that there are several hours that are missing from the dataset. ;

Additional Details

scans, zmap, sandy, hurricane, 1090, hurricane sandy zmap scans, 2012, inferlink, inferlink corporation, external data source, external, source, corporation, tcp, syn, security, csv, rst, ipv4, port, ack, 443, responses, applications, consists, public, 2013, wide, fast, measure, scanning, impact, usenix, released, oct, space, format, received, completed, unique, dataset, output, fields, other, dport, timestamp, daddr, sport, response, acknowledge, files, team, cooldown, composed, hours, umich, missing, saddr