If you are looking at this page, then more than likely, you noticed a scan coming from this server across your network and/or poking at the VNC service on port 5900/tcp.
The Shadowserver Foundation is currently undertaking a project to search for publicly accessible devices that have the VNC service running. The goal of this project is to identify openly accessible systems that have the VNC service running and report them back to the network owners for notification.
This service does not utilize encryption and has the possibility of disclosing sensitive information or unknowningly providing remote access to the system if configured improperly. If at all possible, we would like to see these services made un-available to miscreants that would misuse these resources.
Servers that are configured this way have been incorporated into our reports and are being reported on a daily basis.
We are querying all computers with routable IPv4 addresses that are not firewalled from the internet on port 5900/tcp with a VNC connection request and capturing the response. We intend no harm, but if we are causing problems, please contact us at: dnsscan [at] shadowserver [dot] org.
If you would like to test your own device to see if it has VNC accessible, try the nmap command: "nmap -v -p 5900 [IP]"
To be removed from this set of scanning you will need to send an email to dnsscan [at] shadowserver [dot] org with the specific CIDR's that you would like to have removed. You will have to be the verifiable owner of these CIDR's and be able to prove that fact. Any address space that is whitelisted will be publicly available here: https://vncscan.shadowserver.org/exclude.html
(Click image to enlarge)
These are the roughly 460k devices with VNC accessible
If you would like to see more regions click here
If you would like us to not scan your network, please let us know and we will remove your networks from the scan.
Likewise, if you have anymore questions please feel free to send us an email at: gro [tod] revreswodahs [ta] nac ssnd