Skip to content

hyperionosint/North-side

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Hyperion

Project North Side

The most comprehensive open-source reconnaissance of North Korea's public internet infrastructure.

A Hyperion project.

Conducted: 2026-05-02 / 2026-05-03
Target: 175.45.176.0/22 — AS131279 (STAR-KP / Korea Post & Telecom), Pyongyang, DPRK
Total domains documented: ~56
Total files collected: 8,238 across 860 directories

⚠️ This project is ongoing. North Side is not a one-time snapshot — Hyperion will be updating and expanding this database on a rolling basis as new data is collected. Last updated: 2026-05-03.

⚠️ GITHUB VIEWERS The snapshots folder is located at this location https://archive.org/details/north-side-snapshots.tar


What This Is

Project North Side is a systematic, multi-source reconnaissance of the entire publicly reachable North Korean internet. The DPRK's public-facing internet exists on a single /22 IP block (1,024 addresses) routed through two upstream providers. This project scanned, fingerprinted, enumerated, and archived everything reachable on that block from the open internet.

To the best of our knowledge, this is the most complete correlated record of North Korea's public internet infrastructure that exists — covering DNS, web, mail, network gear, TLS certificates, and full site content.


Methodology

Data was collected from five independent sources and cross-correlated:

1. nmap port scan
Full /22 sweep across 67 ports including web, mail, DNS, database, admin, and remote access ports.
Command: nmap -T4 --min-rate 5000 -n -Pn -e nordlynx -iL targets.txt
Duration: 42.43 seconds across all 1,024 hosts.

2. httpx enrichment
HTTP/HTTPS probing of all responsive hosts with tech fingerprinting, title extraction, redirect following, and server banner collection.

3. Censys passive data
Cross-referenced against Censys indexed records to surface hosts and services missed by active scanning (DNS servers, mail servers, FTP servers, XAMPP cluster).

4. DNS sweep
114 domains queried against both public DNS resolvers and directly against NK's own nameserver (ns1.kptc.kp at 175.45.176.15). Covered all record types: A, MX, NS, TXT (SPF), SOA. Zone transfer attempted and denied.

5. Full site crawl
Playwright-based crawler with per-page screenshots, full HTML archival, HAR network captures, image downloading with perceptual hashing, and metadata extraction (emails, phones, JSON-LD, OG tags, tech stack). Ran against every identified domain.


Key Findings

Infrastructure Overview

Category Count Notes
IP range /22 (1,024 addresses) AS131279, Pyongyang
Web servers 10 identified Apache dominant
DNS servers 4 real + anomaly 683 IPs respond on port 53
Mail servers 4 All Postfix
FTP servers 2 Censys only, not scanned
Network gear 1 Cisco IOS router/switch
XAMPP nodes 3 Dev stack exposed to internet
Domains documented ~56 30 original + ~26 newly discovered
Internal-only domains 7 Leaked via TLS cert SANs

Most Significant Findings

Exposed Cisco router175.45.177.65 is an internet-facing Cisco IOS device with Telnet (port 23) open to the public internet. SSH is also open. This is live routing infrastructure with no access control visible from outside.

National firewall DNS interception — 683 of 1,024 hosts in the /22 respond on port 53. This is not 683 DNS servers. It is almost certainly a national middlebox intercepting all DNS queries on every IP in the range. A parallel anomaly exists on ports 80, 443, and 8080 where hundreds of IPs accept TCP connections that don't correspond to real web servers.

North Korea's national Certificate Authority — The TLS certificate on 175.45.176.75 (Voice of Korea) was issued by CN=www.dprk.gov.kp / O=dprk, with contact email eitc@star-co.net.kp. This is the first public documentation of NK's internal CA infrastructure. dprk.gov.kp resolves to nothing publicly — it is internal only.

Kwangmyong intranet hostname leak — The same TLS certificate contains krt.kp and tech.krt.kp as Subject Alternative Names. These are hostnames from North Korea's domestic intranet (Kwangmyong) that have leaked into a public-facing certificate. This appears to be the first documented bleed between Kwangmyong and the public internet.

Let's Encrypt certificate on NK infrastructure175.45.176.91 (Central Zoo / kza.org.kp) holds a certificate issued by Let's Encrypt in April 2026. It is the only NK host with a certificate from a US-based CA, and the only host running Next.js — anomalous against the rest of the stack.

Xen virtualisation cluster — The TLS certificate at 175.45.176.80 has CN=5-XEN, indicating this is node 5 of a Xen hypervisor cluster. Nodes 1–4 exist somewhere in the range but were not identified.

XAMPP development stack exposed — Three hosts (175.45.176.21, .22, .32) run XAMPP (a development/testing web stack) with multiple unusual ports open including SIP/VoIP (5061), suggesting internal communications infrastructure accidentally exposed to the internet.

Routing split — The /22 is split across two upstream providers. 175.45.176.x and 175.45.177.x route via China Unicom (AS4837). 175.45.178.x and 175.45.179.x route via Russia's TransTelekom (AS20485). Mail infrastructure and portal.net.kp sit exclusively on the Russian-routed subnet.


Domain Map

Shared hosting — 175.45.176.91 (24 domains)

The single largest server in NK infrastructure. Hosts virtually all government ministries and cultural organisations. Apache 2.4.25 / RedStar OS 4.0.

naenara.com.kp · mfa.gov.kp · moph.gov.kp · tourismdprk.gov.kp · koreanarchitecture.gov.kp · mirae.aca.kp · kza.org.kp · sdprk.org.kp · yongsaeng.org.kp · korean-books.com.kp · korstamp.com.kp · pyongyangtimes.com.kp · minju.rep.kp · youth.rep.kp + www variants

Load-balanced pair — 175.45.176.80 / 175.45.177.10

nginx 1.18.0 / Apache 2.4.25. Commercial, educational, and portal domains.

dprkportal.kp · friend.com.kp · knic.com.kp · kftrade.com.kp · kut.edu.kp · koredufund.org.kp · mediaryugyong.com.kp · fia.law.kp · ryongnamsan.edu.kp

State media

kcna.kp175.45.176.71 (primary) / 175.45.177.1 (mirror)
vok.rep.kp175.45.176.75 (+ mirrors at .73, .83, .85 per TLS SAN)
rodong.rep.kp175.45.176.68 (302 redirect, destination unknown)

Government / admin

ma.gov.kp175.45.176.76 (Maritime Administration — login page exposed)
lritdc.rcc.net.kp175.45.176.72 (Ship tracking — Windows Server / IIS 7.5, only non-Linux host)

Mail infrastructure

Hostname IP Role
mail.airkoryo.com.kp 175.45.177.33 Inbound (Air Koryo, Silibank, futurere)
mail.silibank.net.kp 175.45.177.33 Inbound (shared)
mail.ryongnamsan.edu.kp 175.45.178.55 Inbound (university + STAR)
smtp.ryongnamsan.edu.kp 175.45.178.56 Outbound relay (shared)
smtp1.ryongnamsan.edu.kp 175.45.178.57 Secondary outbound relay

DNS infrastructure

Hostname IP Role
ns1.kptc.kp 175.45.176.15 Primary TLD nameserver (.kp)
ns2.kptc.kp 175.45.176.16 Secondary TLD nameserver
ns1.silibank.net.kp 175.45.176.8 Primary domain nameserver (all .kp domains)
(unnamed) 175.45.176.9 Secondary domain nameserver

SOA serial for kp. is 2013083001 — the public zone has not been updated since August 30, 2013.


Tech Stack

Layer Technology
OS RedStar OS 4.0 (NK custom Linux, ~2016-era) — dominant
Web server Apache 2.4.25 + PHP 5.6.2 + OpenSSL 1.0.1e — dominant
Web outliers nginx 1.18.0, Microsoft IIS 7.5, Next.js
Mail Postfix (all mail servers)
DNS ISC BIND on RedHat Enterprise Linux
Network Cisco IOS
Dev stack XAMPP (exposed to internet)
Virtualisation Xen hypervisor
TLS Self-signed (most), NK national CA (vok.rep.kp), Let's Encrypt (kza.org.kp)

The dominant stack is uniformly ~2016-era software. The entire infrastructure appears to have been deployed around the RedStar OS 4.0 release period and not substantially updated since.


Known Gaps

The following were identified but not fully captured:

  • 8080 hosts — 23 IPs respond on port 8080 with no identified hostname or content
  • 302 redirect destinations — Rodong Sinmun (.176.68) and Air Koryo (.176.69) redirect to unknown destinations
  • VoK mirror IPs.176.73, .176.83, .176.85 appear in TLS SAN but were not independently verified
  • Xen nodes 1–4 — only node 5 confirmed; others exist somewhere in the range
  • FTP servers.177.41 and .177.42 identified by Censys but not scanned (port 21 excluded from nmap run)
  • .178.x / .179.x subnets — Russian-routed subnets have far fewer identified hosts; likely more present
  • Kwangmyong — the domestic intranet is air-gapped and unreachable from outside by design

Context

North Korea's public internet is intentionally tiny. The country operates a parallel domestic intranet (Kwangmyong) that is air-gapped from the global internet. What is documented here represents the entirety of what the DPRK chooses to expose to the outside world — state media, a handful of government portals, commercial fronts, and the telecom and banking infrastructure that supports them.

The 2016 DNS zone leak (@mandatoryprogrammer) gave researchers the first real map of .kp domains. Project North Side builds on that foundation with active scanning, passive enrichment, and full content archival to produce what is, to our knowledge, the most complete record of this infrastructure to date.


Related Research

Other notable public research into North Korea's internet infrastructure:

North Korea DNS Leak — mandatoryprogrammer (2016)
A misconfiguration in North Korea's nameserver briefly allowed public zone transfers of the entire .kp TLD, exposing the full list of registered domains. The foundational domain list that most subsequent NK internet research is built on, including North Side.

nknetobserver — nknetobserver (2011–2014)
The original systematic port scanning of the 175.45.176.0/22 range, started the day after Kim Jong Un came to power. Documents the evolution of NK's internet infrastructure over three years including the first sightings of RedStar OS on public-facing servers, an exposed Cisco router, and a MacBook Air on a live NK IP.


Project North Side — Hyperion — 2026

About

Comprehensive reconnaissance of North Korea's entire public internet infrastructure — DNS, web, mail, TLS, network gear, and full site content.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors