There are "smarter" ways to scan v6 address space than this approach. My favorite is "First, the attacker may rely on the administrator conveniently numbering their hosts from [prefix]::1 upward. This makes scanning trivial."
Most definitely- but not doing that should be considered best practices.
-Don