Is the DNS of nmap.org compromised somehow?

I’m currently developing a Python library that fetches subdomains from some APIs and during testing I came to fetch the subdomains of “nmap.org” just so I can have sample data for my tests. The results returned from VirusTotal API included 100+ domains, many of which make no sense.

Here is a small sample of what it returned:

{‘scanme-baumschutz.nmap.org‘, ‘echoriseaboveyourlimits.nmap.org‘, ‘prestashoptuto.nmap.org‘, ‘ckeepingthechristmasspiritalive365.nmap.org‘, ‘the-blog-that-shareswww.nmap.org‘, ‘nrlwashdc-mil-tac-issues.nmap.org‘, ‘keralahoneymoonvactionpackage-echo.nmap.org‘, ‘wwwtradingdeportivo-domingodearmas.nmap.org‘, ‘ifashionvibe-blogfashionvibe-bloguefashionvibe-blog.nmap.org‘, ‘dgbridgedgbridgedgbridge.nmap.org‘}

Is this right? All you need is a free API key but you guys can check for yourselves on VirusTotal: https://developers.virustotal.com/reference/domains-relationships

submitted by /u/EONRaider
[link] [comments]

Read More >>