Code quote:

  #!/bin/sh
#
# http / highfive - leapsec26
# CC-BY-SA Browserbased iheartmyart[at]browserbased[dot]org
#

deadline=$(TZ=GMT date -d "2015-06-30 23:59:59" +%s)
counter=0
while true
do
	epochtime=$(date +%s)
	# echo $epochtime

	if  [ $epochtime -eq $deadline ] && [ $counter -eq 0 ]   
	 then 
	     curl -A Browserbased -s http://noemata.net/leapsec26/highfive.html>/dev/null\ 
	         && echo "highfive!"
	     TZ=GMT date +%Y-%m-%d\ %H:%M:%S.%N
	     counter=$(expr $counter + 1)
	     sleep .7
        elif [ $epochtime -eq $deadline ] && [ $counter -eq 1 ] 
	 then
	     curl -A Browserbased -s http://noemata.net/leapsec26/highfive_again.html>/dev/null\ 
	         && echo "highfive again!"
	      TZ=GMT date +%Y-%m-%d\ %H:%M:%S.%N
	exit
	fi
done
#EOF


_high_five, the code, ran at the time of the 26th leap second adjustment at 23:59:59 on 30/06/2015 when it twice performed an http request on The leap second festival website at  http://noemata.net/leapsec26, for non-existent documents. We captured the passing interaction from one of the network nodes (routers) on our side with Wireshark. - by _browser_based. "Yes we scan!"
2015.

↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓
↓


/* anim gif found at http://s472.photobucket.com/user/majito007/media/random/allergictochickpeastumblr.gif.html */ Fuck the world I am Panda