This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


Internet Wide Amplification Survey (MaxPain)
External Dataset
External Data Source
51 (lowest rank is 51)

Category & Restrictions

denial of service, network data, cyber attack


UDP scan and meassurement of public UDP services that could be used in relation to Amplified DDoS attacks.

The dataset consists of 20 UDP Services and 21 attack vectors. Data is collected in a JSON format with both the request and response. The dataset is composed through a custom service scanner that mimiks a single packet from an attack and records the response. Services covering: Chargen, DNS, SSDP, Portmap, SIP, TFTP, NetBIOS, MSSQL, Steam, NTP(Monlist/Readvar), SNMP, mDNS, QOTD, ICA, Sentinel, RIPv1, Quake3, CoAP, LDAP, Memcached. Notice the data collected does not include the UDP header only the data. I acknowledge that the scans has not been run on a fully regular basis. The data was used as part of a Proof-of-Concept in relation to a new attack vector named MaxPain

Additional Details

cybercrime, memcached, network booting, internet wide amplification survey (maxpain), the sentinel, communication protocol, dos, application layer protocols, data serialization formats, multicast dns, rockhurst university, packets, database application, external data source, structured storage, domain name system, lightweight directory access protocol, json, internet protocol, vector, portmap, character generator protocol, network packet, internet governance, microsoft sql server, simple network management protocol, netbios, malware, computer worm, hypertext transfer protocol, computer viruses, inferlink corporation, constrained application protocol, internet security, 1371, denial of service attack, directory service, cyberwarfare, history of computing, internet of things, cyberattack, qotd, internet relay chat, exploit, trivial file transfer protocol