I said:
It's probably a stealth searchbot from a communist country's military intelligence apparatus, looking for vulnerabilities and sensitive information of any kind. Such information could be used for a wide range of criminal or terrorist activities.
Then you said:
I think your tinfoil hat is a little tight this morning.
And now I reply:
Well, you might think my scenario is outlandish, and the stuff of conspiricy theories, but
this link (washington post) is about a graduate student who, using standard network query tools, mapped a large amount of corporate lan/wan and larger structures on the internet to the degree where US authorities want his thesis kept under wraps since it could be used by terrorists. So? Is my hypothesis really that outlandish? Don't answer, because the answer is evidently "no", and other people in high places seem to think so as well. I don't doubt for a microsecond that all sorts of nefarious groups including criminals, terrorists, and military agencies of foriegn governments are examining every nook and cranny of the net to understand its underlying structure and possible vulnerabilities. So instead of reaching for the increasingly tired tin-foil hat saw, and attempting to discredit the messenger, you might try thinking outside the box instead.