Forum Moderators: open
On a side note, Is there a master ip deny list that is updated often from a trusted source. I would pay for something like that.
Thanks.
I've done this using mod_rewrite on Apache, and rewriting the request to key_master's bad-bot script (See our PERL forum's library).
You can also ban IP addresses which exceed some number of requests per unit time -- See xlcus/AlexK's runaway-bot script in our PHP forum library.
As for a "master IP address range deny list,' such a thing isn't possible, because since the underlying reasons to deny an IP address range vary from site-to-site, the deny lists would also have to vary.
Jim
In the former case, they're trying to get your server to run a remotely-hosted script. In the latter, they're hoping that you foolishly make your 'server stats' publicly-available, so they can get a link from your domain.
But they don't really care if it works on your specific server or not; They just fire and forget without directly checking the results. If either exploit works, then they'll know if your server fetches and runs their script, or they'll get a link on your 'stats' page. If not, it didn't cost much, and they're hitting millions of sites... so they do get a few every time.
Jim
Check out this article from our Spider forum library on this topic:
[webmasterworld.com...]
If that isn't what's going on perhaps with a few more details we can help you figure it out.
If you aren't sure about posting those details because of the TOS, sticky me with them first and I'll help you sanitize them for the forum ;)
The bots were trying to inject this simple PHP probe into his site:
<?php echo md5("just_a_test");?>
If the pages respond with an MD5 encoded response of "just_a_test" then the site is logged for the bot herder to come back and hack later.