Distributed scanning, observed at length
Three months of careful observation of scan traffic against my honeypot has revealed a pattern: most of the scans hitting random IPs come from coordinated networks of compromised hosts, not individual attackers. The implications are significant.