Forum Moderators: open
sitting there like a glaring sore thumb
I think there are more "broadband" ISP ranges than server ranges.
I would also point out that a LOT of "broadband" IPs I block are run by botnets:
Those IPs are handled on an individual basis because you couldn't block all of Comcast or Cox unless you wanted to lose a ton of customers.
It is easy enough to block and individual IP or a malformed UA that you find doing things you don't want them to do but what do you do with IPs inside AT&T or Verizon that use a common vanilla agent?
I am blocking individual IPs, I just don't think that is a very reliable defense when I see my own IP change daily and even in the same day.
Do most Communications ISP clients have unique static IPs?
Do most Communications ISP clients have unique static IPs?
My own IP is usually in the middle of a range that I have blocked from several sites (locking myself out more than once and needing to ftp an edit) sometimes, but it jumps all over
Admittedly this is easier if you've got a browser with some distinguishing features.
ADSL appears to be an option, however I'm not sure if that requires two phone lines, which would deter the expense for that slower speed (256kb up).
Hughes simply has too many restrictions, however for speed-users it's the only valid rural option. It's my understanding that the Hughes routers only allow a single machine connection.
"GET /robots.txt and one with all the "GET / HTTP/1.1" lines and another for all the lines with HTTP/1.1" 304 responses. With these I can go look at the activity in context and see what was going on. It also makes it easier to check against my long list of bad IPs. It is slow and done manually but I only do this for an update audit. If I find I need more data I look at more logs for the same site. I know there are lots of people here who could do these things dynamically but I have decided I'll never have the time available to learn all that. Just added them as ideas.
One of the things I do to check for unidentified robots in raw logs to to pull out all the lines with "GET /robots.txt and one with all the "GET / HTTP/1.1" lines and another for all the lines with HTTP/1.1" 304 responses. With these I can go look at the activity in context and see what was going on. It also makes it easier to check against my long list of bad IPs. It is slow and done manually but I only do this for an update audit. If I find I need more data I look at more logs for the same site. I know there are lots of people here who could do these things dynamically but I have decided I'll never have the time available to learn all that. Just added them as ideas.
Logs of course have one advantage over real-time activity: you can see what the next request will be.
Problem with running rDNS requests against the IPs that do not have them is that the time to look up is USUALLY 4-5 seconds
hidden from view using a variety of CSS tricks.
Visitors from Nebraska, The Dakota's Oklahoma, Colorado, Las Vegas, Oregon, Washington, in fact for me most everything west of the Mississippi. These folks are simply without interests in widgets.
I have similar traps, but I find they only return a small percentage of the total trapped.
if you're using phpmyadmin... stop.