A. Filtering hosts with multiple ports can be removed IMO:
B. Tor v3 can also be included in the results.
C. Recent observation which can be confirmed with:
wget https://gitlab.com/api/v4/projects/33695681/packages/generic/nrich/0.1.1/nrich_0.1.1_amd64.deb
sudo dpkg -i nrich_0.1.1_amd64.deb
host -t a seed.bitcoin.sipa.be | sed -e 's/seed.bitcoin.sipa.be has address //g' | nrich -
Possible reasons for vulnerable machines used for bitcoin nodes:
- False positives
- Users not aware or don't care
- Attackers prefer using these for better results
- Honeypots
- Other reasons
Leaving 1 which won't be true for all the results, filtering such nodes in makeseeds.py should make sense. Below is an example for one IP copied from suspicious_hosts.txt
ip = '88.198.17.7'
url = 'https://internetdb.shodan.io/' + ip
response = requests.get(url)
if response.text.find('CVE') != -1:
print('vulnerable')