ad88 d8" 88 MM88MMM 88 88 888888888 888888888 88,dPYba,,adPYba, ,adPPYba, 88 88 88 a8P" a8P" 88P' "88" "8a a8P_____88 88 88 88 ,d8P' ,d8P' 88 88 88 8PP""""""" 88 "8a, ,a88 ,d8" ,d8" 88 88 88 "8b, ,aa 88 `"YbbdP'Y8 888888888 888888888 88 88 88 `"Ybbd8"' -- another project by --
::::::::::. :::. .,-::::: ::: . .,::::::::::::::::::::::::::::::.,:::::: ::: `;;;```.;;;;;`;; ,;;;'````' ;;; .;;,.;;;;'''';;;;;;;;'''';;;;;;;;'''';;;;'''' ;;; `]]nnn]]',[[ '[[, [[[ [[[[[/' [[cccc [[ [[ [[cccc [[[ $$$"" c$$$cc$$$c $$$ _$$$$, $$"""" $$ $$ $$"""" $$' 888o 888 888,`88bo,__,o,"888"88o, 888oo,__ 88, d8b 88, 888oo,__ o88oo,.__ YMMMb YMM ""` "YUMMMMMP"MMM "MMP" """"YUMMM MMM YMP MMM """"YUMMM""""YUMMM

Feel free to launch interesting packets at our fuzz box, located at:
IPv4: 185.10.68.110
IPv6: 2a06:1700:0:b::44cb:6e

Check out the PCAP of the last 10 minutes: fuzzme.packet.tel.last10minutes.pcap
Have a look at the archive of some PCAPs here: fuzzme.packet.tel/archive/

The goal of this project is to collect interesting fuzzed packets, mainly
from scapy. At the same time, you get the ability to run "real world" 
fuzzing and send "bad traffic" without risking legal problems. 

Please read this next sentence carefully:

We dont give a fuck about your ability to launch a DDoS attack.
We are only interested in FUZZING packets or other interesting fragmented traffic. 
These fuzzed packets are created by using scapy's fuzz() utility. 

DO NOT DDOS THIS SERVER. GO FIND A DSTAT SERVER TO TEST YOUR BOTNET.
If you really need something to test your botnet, use these: 
3 free Layer 4 DSTAT graphs for you to play with.


Here's the rules broken out in to 3 easy lines:

1.) Do not send more than 10Gbps for over 30 seconds. 
2.) Do not use booter services to target this IP address.
3.) If you lose control of a system that is sending traffic
    EMAIL outofcontrol[@T]packet.tel IMMEDIATELY.

I'm obviously running tcpdump 24/7 and have a semi-good capture buffer, but if you 
happen to find something cool or want to showcase something you did, email staff@packet.tel 
and tell us about it! That said, remember that your IP address is being captured and displayed 
to the public. **WE HIGHLY RECOMMEND YOU SPOOF YOUR SOURCE IP ADDRESS WHEN POSSIBLE**

Here's the last 10 minute pcap: fuzzme.packet.tel.last10minutes.pcap 
Here's the available archived pcaps: fuzzme.packet.tel/archive

Have fun!! --PACKET.TEL STAFF

 __.
 /aa \_
                   __\-' / )                 .-.
         .-.      (__/    /        haha    _/oo \
       _/ ..\       /     \               ( \v  /__
      ( \  u/__    /       \__             \/   ___)
       \    \__)   \_.-._._   )  .-.       /     \
       /     \             `-`  / ee\_    /       \_
    __/       \               __\  o/ )   \_.-.__   )
   (   _._.-._/     hoho     (___   \/           '-'
jaja'-'          /     \
                          _/       \    teehee
                (   __.-._/


--[ Served proudly over unencrypted HTTP on port 80. ]--
--[ We see no value in encrypting this site, but let ]--
--[     us know what you think by clicking here.     ]--
--[ (also its actually available over 443, so whatev ]--