Sounds like BS. I am the owner of a fixed IP address and (subject to the phrase being meaningful) I can confirm that nobody has "indexed and archived" it.
Secondly it just sounds made-up / fake. For example there is no such thing as a "ninja wearing individual."
I am sure it's true that every public IP in the world is continually scanned by bots. My domestic router's logging function is not that great but a server I rent in France shows all sorts of stuff in the logs. Port 22 gets hit non-stop looking for a way into ssh, and other higher ports get scanned looking for vulnerabilities in popular web apps.
There is nothing you can do about those except block them but my point was more that the original sauce claimed that they had "indexed and archived every IP address in the world" implying that they had secret hackerz powers actually to break in and collect data from those IPs, which I doubt.
Sounds like BS. I am the owner of a fixed IP address and (subject to the phrase being meaningful) I can confirm that nobody has "indexed and archived" it.
Secondly it just sounds made-up / fake. For example there is no such thing as a "ninja wearing individual."
Have you ever looked at your router's log to see if your IP address is being accessed by unknowns?
I have a fixed IP address and someone or other tries to access my network about once a minute!
I am sure it's true that every public IP in the world is continually scanned by bots. My domestic router's logging function is not that great but a server I rent in France shows all sorts of stuff in the logs. Port 22 gets hit non-stop looking for a way into ssh, and other higher ports get scanned looking for vulnerabilities in popular web apps.
There is nothing you can do about those except block them but my point was more that the original sauce claimed that they had "indexed and archived every IP address in the world" implying that they had secret hackerz powers actually to break in and collect data from those IPs, which I doubt.
I saw "indexed and archived" as more of a logging process than a hacking one.