Forum Moderators: open

Message Too Old, No Replies

Blocking hits from TOR nodes

Can go weeks without seeing them, then I see a lot on the same day

         

SumGuy

4:17 pm on Nov 20, 2022 (gmt 0)

5+ Year Member Top Contributors Of The Month



I look periodically at the IP's that my router is blocking that was trying to hit my web site (ports 80 and 443). My router has 2 blocking lists - one that is not logged and one that is logged. So there are some (or a lot) of garbage IP's that are being blocked that I'm not logging. This cuts down on log file size.

During the last 24 hours, there were 75 unique ip's that were blocked, of which 35 have no rDNS (ie no host names). Of the ones that do have a host-name, 25 of them have "tor" in their host name (ie tor-exit, this-is-a-tor-node, etc).

Two of them are exit.tor.uwaterloo.ca and tor-exit.csail.mit.edu.

I can go weeks or a month or two without seeing any attempted web-hits from tor exit nodes, and then on the same day I can see a ton of hits - like today. It can't be a coincidence that there is such a high level of TOR use trying to hit my site today. This can't be from multiple different scrapers / bots all independently making the decision to hit my site today using tor.

(I block tor because all I've ever seen in the past when they were open was garbage hits / searching for exploits, never a legit hit)

Pfui

12:11 am on Nov 22, 2022 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I can’t explain Tor hit patterns but like you, I block all Tor all the time, whether by a fragment in Hostname or an IP lookup. I also can’t understand why ISPs even host Tor accounts anymore. Project Honeypot always shows Tor hits to be nothing but garbage, loads and loads and loads of garbage.

Sgt_Kickaxe

3:50 am on Nov 24, 2022 (gmt 0)



Project Honeypot always shows Tor hits to be nothing but garbage

Correction - Project Honeypot shows garbage hits. ie: Garbage hits are all you will find, regardless of browser used.

Also, ISPs give internet access to people. What people do with it is on them but the ISP knows who is using TOR, it's not an illegal activity.

The people who use TOR browsers just don't want others to know who they are, including you. Why? I wouldn't assume it's always for nefarious reasons. People occasionally use TOR when traveling and on public(hotel, cafe, school, corporate, library etc) computers. Would you want to ban everyone in those locations?

By choosing to block them all you're sending your competitors legit users, too.

Just saying.

A better way - judge traffic by what it does and limit how often it can try to do it.
- You went for my admin files, goodbye
- You're a known spam bot, sayonara.
- You're using TOR... all eyes on what you're doing, stranger.

As for the spikes in TOR node hits, they may not be nefarious either. A quick look at the news will show you many regions where people aren't exactly free to browse the internet without repercussions as gov and protesters protest each other.(2009 article, not much has changed unfortunately) [eff.org...]

WHY a visitor is using TOR isn't a big concern, what they are doing to your site with it is. I am not supporting TOR here, just the PEOPLE using it because they feel they need to. By all means find and block the spammers and hackers. I hope this helped enlighten.

Cheers!

Pfui

7:35 pm on Nov 24, 2022 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



FWIW, since 2016 when I started recording Tor hits, my experience on my primary site is that the conduct of 100% of Tor-related 'visitors' has been bad news. Whether an unwitting Tor user's UA/platform is compromised or their aims are intentionally nefarious, the hits are disallowed because of bad conduct, just like everybody else.

SumGuy

12:04 am on Nov 25, 2022 (gmt 0)

5+ Year Member Top Contributors Of The Month



> ISPs give internet access to people. What people do with it is on them but the
> ISP knows who is using TOR, it's not an illegal activity.

I don't believe I've ever seen (and hence block) a tor exit node on a consumer broadband IP. IE Verizon comcast Bell Rogers etc.

Edit: Actually, I wouldn't know if a hit from consumer broadband space WAS a tor exit node. You wouldn't know it from the rDNS. How easy or hard is it to operate an exit node on a consumer broadband dynamic IP? Or once you are part of a tor network (by using a tor browser?) you can be an exit node? I'm not up on how tor works, especially for end users.

blend27

8:22 pm on Jan 8, 2023 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



[check.torproject.org...] << Opa!

martinibuster

9:04 pm on Jan 8, 2023 (gmt 0)

WebmasterWorld Administrator 10+ Year Member Top Contributors Of The Month



There are thousands of TOR IPs. There are lists of them on GitHub published by various parties.

I block them with WordFence using a wildcard in the Custom Blocking tool in the hosts field.

Is there a way to do the same with .htacess, to block hosts that have *.tor as the host?

Sgt_Kickaxe

9:55 pm on Jan 8, 2023 (gmt 0)



I block them with WordFence using a wildcard in the Custom Blocking tool in the hosts field.

Is there a way to do the same with .htacess, to block hosts that have *.tor as the host?

Probably, but reporters doing research in dangerous areas use it a lot to get the news out. Even the NYTimes has run a TOR service for years, with good reason. Do you want to block NYTimes readers maybe? - [open.nytimes.com...]

IMO it's best not to judge by the browser, but by the actions.

[edited by: Sgt_Kickaxe at 10:10 pm (utc) on Jan 8, 2023]

tangor

10:09 pm on Jan 8, 2023 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Then again, does one routinely admit masked strangers into the house without identifying them first?

All of us keep and use logs for a reason.

Just sayin'...

Sgt_Kickaxe

10:43 pm on Jan 8, 2023 (gmt 0)



Then again, does one routinely admit masked strangers into the house without identifying them first?

All of us keep and use logs for a reason.

Just sayin'...


Not sure, my house isn't online, my logs don't detect faces, and my logs monitor behavior while on my site. No bad behavior, no problem, everyone is welcome.

I was curious as to where the fear of visitors who've done nothing wrong(or illegal) comes from, even the CIA offers a public TOR system to keep people safe - [cia.gov...]

TOR is not a nefarious, scary, dangerous tool and people using it aren't automatically 'a masked stranger in your house'. It's just a tool, hopefully you never need it.

tangor

3:57 am on Jan 9, 2023 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I'm confused. Earlier you said:

- You're using TOR... all eyes on what you're doing, stranger


MEANWHILE, my experiences with tor-enabled has not been good---mostly bad actors. As with any webmaster, one manages what they perceive as undesired traffic for their specific site. We all do this, tor or not.