The Artima Developer Community
Sponsored Link

Python Buzz Forum
The first thing we do, let's kill all the spammers

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Phillip Pearson

Posts: 1083
Nickname: myelin
Registered: Aug, 2003

Phillip Pearson is a Python hacker from New Zealand
The first thing we do, let's kill all the spammers Posted: Jun 21, 2005 3:37 PM
Reply to this message Reply

This post originated from an RSS feed registered with Python Buzz by Phillip Pearson.
Original Post: The first thing we do, let's kill all the spammers
Feed Title: Second p0st
Feed URL: http://www.myelin.co.nz/post/rss.xml
Feed Description: Tech notes and web hackery from the guy that brought you bzero, Python Community Server, the Blogging Ecosystem and the Internet Topic Exchange
Latest Python Buzz Posts
Latest Python Buzz Posts by Phillip Pearson
Latest Posts From Second p0st

Advertisement

For the last few weeks, my web server (hosting PyCS, the Topic Exchange, and all that) has been spending much of its time more or less comatose. I haven't been able to figure out why, until today when I did a lsof | grep TCP and saw that almost all of the connections to port 80 were from clients of alestra.com.mx, requesting the PyCS comments page ... argh ...

So now I've configured it to deny all requests from .alestra.com.mx. My apologies to any legitimate visitors from alestra.com.mx PyCS might have, but the server was suffering too much from the huge volume of comments page requests from the spammer living somewhere near you.

Fingers crossed - let's see if the site comes back to life now. You'll know real soon...

Update: Looks like I needed to go a bit lower-level. The connections from Mexico were still coming up and TRYING to do something, and still hanging Apache. So now:

iptables -A INPUT -p tcp --source 207.248.240.118 --dport 80 -j DROP
iptables -A INPUT -p tcp --source 207.248.240.119 --dport 80 -j DROP
iptables -A INPUT -p tcp --source 148.244.150.57 --dport 80 -j DROP
iptables -A INPUT -p tcp --source 148.244.150.58 --dport 80 -j DROP

Update 2: OK, now they're on a different IP address.

iptables -F INPUT
iptables -A INPUT -p tcp --source 207.248.240.0/24 --dport 80 -j DROP
iptables -A INPUT -p tcp --source 148.244.150.0/24 --dport 80 -j DROP

Comment

Read: The first thing we do, let's kill all the spammers

Topic: As seen in old documentation... Previous Topic   Next Topic Topic: Housekeeping

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use