nyuuzyou commited on
Commit
c9888b5
1 Parent(s): 2e484f4

Upload folder using huggingface_hub

Browse files
README.md ADDED
@@ -0,0 +1,58 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ annotations_creators:
3
+ - machine-generated
4
+ license:
5
+ - cc0-1.0
6
+ pretty_name: CT Log Archive Hostnames
7
+ size_categories:
8
+ - 100M<n<1B
9
+ source_datasets:
10
+ - original
11
+ task_categories:
12
+ - other
13
+ language_creators:
14
+ - found
15
+ ---
16
+
17
+ # CT Log Archive: Download Hostnames from Inactive Logs
18
+
19
+ ## Warning
20
+
21
+ The data was obtained by parsing CT with modified software, which will be discussed below. I cannot guarantee the accuracy of the data, as it is possible that some data was lost due to a variety of factors, such as the data from Let's Encrypt Oak 2022. If you want to do passive data analysis and you want maximum accuracy for each specific CT, then I highly recommend that you use self-written software that has been tested to work correctly with CTs.
22
+
23
+ ## Why
24
+
25
+ Collecting the initial dataset for the [scanner.ducks.party](https://scanner.ducks.party) project was a time-consuming task. As with any scanner, a significant amount of data is required, which can be provided by CTLs. However, due to rate limits and the large volume of certificates, downloading can take a considerable amount of time. Additionally, some companies may terminate their inactive CTLs. For instance, Cloudflare Nimbus 2022 is no longer publicly accessible, but it can still be downloaded from mirrors run by Google. I believe that even outdated archives can still hold value for research. I will not update this page, but I feel it is my duty to share this information with the world for archival purposes. The entire hostname list from inactive CTLs can now be accessed with a single button, instead of using modified software.
26
+
27
+ ## Data Format
28
+
29
+ All archives contain a txt file with hostnames obtained using a slightly modified [CaliDog/Axeman](https://github.com/CaliDog/Axeman). All files are sorted from invalid hostnames, and since only inactive CTLs that are not/almost not updated have been downloaded, there is a good chance that the data is still current at the time of viewing this page. Hostnames are presented in plain text format, one hostname per line. Duplicate hostnames have not been removed from the data.
30
+
31
+ ## Downloads
32
+
33
+ - [Google Argon 2018](https://huggingface.co/datasets/nyuuzyou/ct/resolve/main/argon2018.txt.zst)
34
+ - 427,533,479 certificates, 1,405,659,037 hostnames
35
+
36
+ - [Let's Encrypt Oak 2022](https://huggingface.co/datasets/nyuuzyou/ct/resolve/main/letsencrypt_oak2022.txt.zst)
37
+ - 494,549,333 certificates, 374,105,799 hostnames
38
+
39
+ - [DigiCert Nessie 2022](https://huggingface.co/datasets/nyuuzyou/ct/resolve/main/digicert_nessie2022.txt.zst)
40
+ - 162,451,767 certificates, 275,830,969 hostnames
41
+
42
+ - [Google Argon 2017](https://huggingface.co/datasets/nyuuzyou/ct/resolve/main/argon2017.txt.zst)
43
+ - 7,842,537 certificates, 29,663,968 hostnames
44
+
45
+ - [Google Xenon 2019](https://huggingface.co/datasets/nyuuzyou/ct/resolve/main/xenon2019.txt.zst)
46
+ - 1,258,608 certificates, 3,761,461 hostnames
47
+
48
+ - [TrustAsia 2022](https://huggingface.co/datasets/nyuuzyou/ct/resolve/main/log2022.txt.zst)
49
+ - 1,548,183 certificates, 2,035,594 hostnames
50
+
51
+ - [Google Xenon 2018](https://huggingface.co/datasets/nyuuzyou/ct/resolve/main/xenon2018.txt.zst)
52
+ - 366,555 certificates, 1,115,507 hostnames
53
+
54
+ ## Thank you
55
+
56
+ **CaliDog**, for creating [Axeman](https://github.com/CaliDog/Axeman). Axeman served as the foundation for the software used in this project and saved countless hours of development time.
57
+
58
+ **Google** for creating and maintaining [mirrors](https://github.com/google/certificate-transparency-community-site/blob/master/docs/google/known-logs.md) and, at the same time, archives of CT data. And for creating CT itself, of course.
argon2017.txt.zst ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:05b24e4cf8598b4c77f368548bb8d9ad1d2a050c83e91a5d0676a5aca2a28b23
3
+ size 128692082
argon2018.txt.zst ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f8d707e680cc19fd8db136abe01ea6473b8b755dbc962302b4077228a128facd
3
+ size 7201849625
digicert_nessie2022.txt.zst ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5f1178dea0bec606d093205ac4a3b449e606d25c4a37fa856cb867d3fc6b1b8b
3
+ size 1747737528
letsencrypt_oak2022.txt.zst ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e868b75dd22e83228092b5d6016b9cb0f759dac6e1c7dc71ae0cdd0ba21eaff0
3
+ size 2359296979
log2022.txt.zst ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dbe798bbe75ce000a73360427f1838e3cbfbff5c7f99dbf701b197c028fc65a2
3
+ size 13564362
xenon2018.txt.zst ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f6c519f670422e28770965ab5e69da17a19ea41aef075639ee56d78bc805c447
3
+ size 5904611
xenon2019.txt.zst ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c445d481b7f9653ea37b83c2d92771919b3a8fab755110a8d8abf92d33ca5257
3
+ size 22024410