On Wed, Sep 28, 2016 at 1:43 PM, Steve Kinney <ad...@pilobilus.net> wrote: > Things. MITM the vendor's connection and collect them as they pass?
Abusing the vendor, that's one way. > Send connection requests to Things at whole IP address ranges and see > who answers? This is done... zmap.io scans.io . IPv6 makes full scan pointless, but discovering actual ranges/ip in use, based on collecting metadata beforehand for targeted scans, will happen. At least so long as it remains profitable effort.