One person was able to claim 20M IPs

lists.nanog.org

219 points by speckx 5 days ago


ludwik - 5 days ago

Turns out what constitutes "claiming" an IP on the site is nothing like you’d expect. You don’t need to prove you control the IP. All it takes is embedding a transparent 1x1 tracking pixel on a website, and every IP that loads the page gets counted as “claimed” by you. In other words, it’s just a tally of visitors (or even ad impressions), not actual control of the IPs. So there’s really nothing meaningful here.

JdeBP - 4 days ago

The idea that this is just exploitation of open proxy HTTP servers has been doing the rounds for a year, now.

* https://isc.sans.edu/diary/31136

However, at least one person thinks that it is a bug in the X-Forwarded-For handling code,

* https://biggo.com/news/202508070812_IPv4_Games_Header_Exploi...

which, contrary to the headlined NANOG mailing list thread, is being parsed, as we can see:

* https://github.com/jart/cosmopolitan/blob/master/net/turfwar...

* https://justine.lol/threads/

I think that the person who thinks that X-Forwarded-For: cannot be manipulated here needs to be put in the same room with the person who thinks that there's an endless variety of ways in which "desync" attacks can forge such headers when one uses HTTP/1.1.

* https://portswigger.net/research/http1-must-die

* https://news.ycombinator.com/item?id=44915090

miyuru - 4 days ago

Currently top player no 2 "jackson" uses JS to send a request from his websites and anyone who clones his code.

https://github.com/search?q=https%3A%2F%2Fipv4.games%2Fclaim...

NO 1 must be doing a similar thing.

Other attempts: https://github.com/search?q=ipv4.games%2Fclaim&type=code

jsnell - 4 days ago

The 9% number comes from dividing by the number of IPv4 hosts reported by Censys, who do a portscan of the entire IPv4 space.

But obviously most clients will not have any ports open, and wouldn't be visible to the scan. It's not at all correct to treat that as the number of actively used IPv4 addresses.

mijoharas - 4 days ago

I'm trying to understand. If 9% is 20 million then the total is ~220 million. That doesn't seem right to me. So this isn't talking about the ipv4 address space is it? (Ignoring reserved blocks that's 4 billion). What exactly is it talking about?

nilsherzig - 4 days ago

Couple ideas (can’t test them now):

They list guns.lol as one of their projects. Looks like a linktree type of personal website hosting service. Some traffic might come from that network of pages, but if that would be the case I would expect google to have indexed their claim links by now. Same thing goes for the captcha service they are running.

They also have a cracked version of a Minecraft cheat client on GitHub. It’s very common to use residential proxies while cheating (or cracking Minecraft accounts), so that might be another option (obviously not for all of the IPs). Someone should scan the IPs claimed by them for common proxy ports.

Might be a good idea to run their claims through a geoip db, even tho they are pretty spread out over different subnets, there still might be a correlation there (like mostly Spanish speaking countries or something like that).

Looks like the gameserver provides some more insights at /statusz, notably there a basically no „image claims“. So it would have to be iframes or script src requests (?).

Might also be fun to monitor your local network for requests to ipv4.games, I will set a notification with my firewall and report back :).

flerchin - 4 days ago

How is 20M IPs 9% of all IPv4 hosts? That works out to something like 220M IPv4 hosts, when I'd naively think there should be more like 4B or so.

Aurornis - 4 days ago

So to “claim” an IP address you only need to send a GET request to the server with your tag as a param?

What am I missing? It seems like sampling the headers for the incoming requests would reveal the answer quickly if it’s a 1x1 tracking pixel.

There’s a good chance that they wouldn’t really like the answer: It could have been slipped into a WordPress plugin or added as a call from an npm package, generating millions of unintended requests from other people’s computers to win an internet game.

thrance - 4 days ago

So, everyone just ignored that one guy that suggested simply... asking them by email?

progbits - 5 days ago

Buying ads or embedding on some popular sites seems like best theory.

@jart: You could log referer header maybe, or user agent?

TZubiri - 4 days ago

If the shared proxy addresses hypothesis is correct, this would single handedly make for a great ip blacklist

mzajc - 4 days ago

> There are currently 13'797 Tor exit nodes <https://www.dan.me.uk/tornodes>

As far as I'm aware, this is off by a magnitude, and I'm not sure where the number comes from because the linked website lists much fewer (but ratelimits to 1/30m for some reason?). The official list at https://check.torproject.org/torbulkexitlist lists just over 1k exits, so I really doubt these made much of a difference.

mdemare - 4 days ago

I once thought of creating a cryptocoin where 1 initial coin would be handed out to whoever would be the first to claim each ip4 address. I think IP is too easy to spoof for that to work, but I still like the idea.

- 3 days ago
[deleted]
zocco - 4 days ago

An analysis of the source IP address networks might reveal more about the technique he's using. For example if they are all from one cloud provider, he could be rapidly allocating and deallocating IPv4 addresses from their pool, to attach to a VM to make the requests.

That said, probably it's multiple different techniques being used to make these requests, considering they are from such a huge number of different IP addresses. There's probably not one simple answer to this puzzle.

g-mork - 4 days ago

One person was able to claim 9% of all HN clickthroughs

dilyevsky - 4 days ago

https://ipv4.games/user.html?name=femboy.cat - looking at claimed networks they go in order. Some kind of spoofing attack either on TCP layer (less likely) or maybe server is consuming X-Real-IP or X-Forwarded-For without verification

- 5 days ago
[deleted]
luckystarr - 4 days ago

My hunch: it's not a real captcha on their page femboy.cat, but actually a script which "claims" the address in the ipv4.games game. Nothing to see here, move along.

Thaxll - 4 days ago

Would be interesting to log the referer.

autoexec - 4 days ago

Man, I really hate NANOG's new site.

I've been using https://seclists.org/nanog/ since the switch and it's so much better.

On the new site I see that the post has a link at the bottom which claims to take you to non-JS version of the site and that gave me hope, but following it and clicking on the "list overview" button takes you to a page that doesn't work without JS, and clicking on the "all threads" page just gives you links to posts that also need JS.

- 4 days ago
[deleted]
topak3000 - 4 days ago

Subscribed to several residential proxies and claimed all IPs.

- 4 days ago
[deleted]