22110.s.t4vps.eu spammed me. Though they resolved a host name to 194.135.93.53, there was scant info on this host name, so I researched them. I do not see a pattern.
Observation:
22110.s.t4vps.eu host 194.135.93.53
Research:
12927.s.t4vps.eu 79.98.27.251
20951.s.t4vps.eu 109.235.64.29
13769.s.t4vps.eu 109.235.67.32
2857.s.t4vps.eu 109.235.69.177
20895.s.t4vps.eu 109.235.69.253
14223.s.t4vps.eu 185.5.52.22
13060.s.t4vps.eu 185.5.54.228
2993.s.t4vps.eu 185.5.55.83
14913.s.t4vps.eu 185.69.53.149
3955.s.t4vps.eu 185.69.55.222
13924.s.t4vps.eu 185.69.55.62
6v3.f.t4vps.eu 185.81.164.166
91j.f.t4vps.eu 194.135.82.223
11464.s.t4vps.eu 194.135.89.184
16367.s.t4vps.eu 194.135.89.238
6625.s.t4vps.eu 194.135.90.109
12542.s.t4vps.eu 194.135.90.130
10115.s.t4vps.eu 194.135.91.215
5kq.f.t4vps.eu 194.135.92.5
5710.s.t4vps.eu 194.135.92.115
22110.s.t4vps.eu 194.135.93.53
8982.s.t4vps.eu 194.135.93.227
5260.s.t4vps.eu 194.135.94.0
21238.s.t4vps.eu 212.24.99.167
19231.s.t4vps.eu 212.24.105.218
18976.s.t4vps.eu 212.24.107.132
19514.s.t4vps.eu 212.24.110.13
21210.s.t4vps.eu 212.24.111.80
Permanent link to this post (91 words, 0 images, estimated 22 secs reading time)
bot , Tech
ban , ban IP , bot , content scraper , internet security , ip address , pattern , research , spam , strategy , t4vps.eu
no.rdns.ukservers.com content spammed me, so I researched them. They have a sister host name, no.rdns-yet.ukservers.com, with very much the same ip ranges. See for yourself. They are industrious in their use of IPs.
no.rdns.ukservers.com
5.101.138.140 5.101.136.0 – 5.101.151.255 5.101.136.0/21
5.101.142.102
5.101.145.22
5.101.146.130
31.132.3.176 31.132.3.0/24
31.132.3.239
37.9.62.107 37.9.62.0/24
37.9.62.221
37.9.62.36
37.9.62.41
37.9.62.6
37.9.62.96
54.213.200.95
77.74.192.190 77.74.192.0 – 77.74.199.255 77.74.192.0/21
77.74.194.62
77.74.195.112
77.74.196.231
77.75.122.146
78.110.160.140 78.110.160.0 – 78.110.175.255 78.110.160.0/20
78.110.160.234
78.110.169.178
78.110.169.210
78.110.174.241
78.110.175.202
78.157.192.57 78.157.192.0/24
78.157.192.72
94.46.207.1
94.229.65.56 94.229.64.0 – 94.229.81.255 94.229.64.0/20
94.229.65.171
94.229.67.15
94.229.67.16
94.229.67.33
94.229.67.57
94.229.72.115
94.229.72.116
94.229.72.117
94.229.72.135
94.229.74.89
94.229.75.3
94.229.75.9
94.229.76.195
94.229.76.200
94.229.78.60
94.229.79.3
bot , Tech
ban , ban IP , bot , content scraper , internet security , ip address , no.rdns-yet.ukservers.com , no.rdns.ukservers.com , pattern , research , spam , strategy , ukservers.com
bezeqint.net content spammed me, so naturally I researched them. They are very smart, these Israelis, and employ a variety of anti-bot software techniques, in order to evade identification. Hats off to them for deploying these tactics. I hope they keep up the good work.
Observation:
bzq-80-17-106.red.bezeqint.net 82.80.17.106
Pattern:
This ISP employs 3 patterns, inter-dispersed within their Ip ranges. You need to differentiate between these three or you will ban the incorrect IP range.
red: reverse first 3 octets, add 4th
red, static.dcenter: straight 4 octets
cablep, red: host name has 3 octets, special number for first octet
Research:
bzq-112-168-31-210.red.bezeqint.net 31.168.112.210
bzq-137-168-31-233.red.bezeqint.net 31.168.137.233
bzq-200-168-31-84.red.bezeqint.net 31.168.200.84
bzq-208-168-31-96.red.bezeqint.net 31.168.208.96
bzq-224-168-31-106.red.bezeqint.net 31.168.224.106
bzq-230-168-31-194.red.bezeqint.net 31.168.230.194
bzq-236-168-31-236.red.bezeqint.net 31.168.236.236
bzq-241-168-31-208.red.bezeqint.net 31.168.241.208
bot , Tech
ban , ban IP , bezeqint.net , bot , cablep , content scraper , cust , dcenter , internet security , ip address , pattern , red , research , spam , static , static.dcenter , strategy
reverse.completel.fr gave me some error 404s, so I thought to look them up. This research excludes reverse.completel.net. Be careful here because though you could ban the whole /16 range you would exclude a whole bunch of French people, and that would be bad.
46.218.12.177 46.218.0.0 – 46.218.255.255 46.218.0.0/16
46.218.35.112
46.218.35.59
46.218.64.123
46.218.64.98
46.218.67.98
46.218.114.106
46.218.117.246
46.218.119.190
46.218.120.111
46.218.120.111
46.218.120.144
46.218.127.119
46.218.127.119
46.218.127.160
46.218.127.69
46.218.139.182
46.218.139.182
46.218.167.42
46.218.170.154
46.218.170.160
46.218.171.146
46.218.172.227
46.218.177.128
46.218.177.191
46.218.179.51
46.218.179.67
46.218.182.217
46.218.185.90
46.218.199.244
46.218.203.138
46.218.241.188
46.218.241.197
92.103.150.243 92.103.0.0/16
92.103.236.242
92.103.237.151
92.103.247.114
195.167.195.204
213.244.1.41 213.244.0.0/19
213.244.31.213
Permanent link to this post (90 words, 0 images, estimated 22 secs reading time)
bot , Tech
ban , ban IP , bot , completel.fr , content scraper , internet security , ip address , research , reverse.completel.fr , spam , strategy
ioflood.com piqueted my interest in their novel hostname: we.love.servers.at.ioflood.com. This turned out to be a barrage of IP addresses, something I did not expect.
Observations:
we.love.servers.at.ioflood.com host lookup 96.45.82.85
Research:
23.226.70.146
23.226.75.246
23.226.76.27
23.226.77.6
23.226.78.222
66.160.196.45
96.45.82.85
104.161.12.41
104.161.18.1
104.161.66.100
107.167.70.227
107.167.77.67
107.167.86.160 107.167.64.0 – 107.167.95.255 107.167.64.0/19
107.167.95.128
107.167.95.141
107.167.95.150
107.167.95.153
107.167.95.173
107.167.95.240
107.167.95.242
107.178.72.147
107.178.98.181
107.178.98.90
107.178.109.225
107.178.110.116
107.178.110.205
107.178.113.209
107.189.135.173
107.189.159.203
107.189.161.170
107.189.161.170
148.163.12.23
148.163.31.25
148.163.31.220
148.163.31.231
148.163.58.123
148.163.97.139
148.163.97.161
148.163.113.107
148.163.122.22
148.163.122.162
148.163.122.165
162.218.115.228
184.105.134.1
184.164.70.158
184.164.73.137
184.164.73.180
184.164.80.80
184.164.84.52
184.164.90.66
192.30.139.30
192.110.160.24
192.110.163.22
192.110.167.229
199.167.133.14
199.167.134.31
199.231.86.82
199.30.53.22
Permanent link to this post (93 words, 0 images, estimated 22 secs reading time)
bot , Tech
ban , ban IP , bot , content scraper , internet security , ioflood.com , ip address , research , spam , strategy , we.love.servers.at.ioflood.com
Voxility has been scraping me for a while and I’ve banned their hostnames, but I could not look up lh27033.voxility.net, so this started the research.
Observation:
lh27033.voxility.net
Research:
lh28925.voxility.net 5.254.112.141 5.254.64.0 – 5.254.127.255 5.254.64.0/18
lh27337.voxility.net 37.221.161.98 37.221.160.0 – 37.221.175.255 37.221.160.0/20
lh25704.voxility.net 37.221.161.149
lh20524.voxility.net 37.221.161.156
lh25696.voxility.net 37.221.163.213
lh25646.voxility.net 37.221.165.196
lh18827.voxility.net 37.221.167.108
lh28364.voxility.net 37.221.171.24
lh17088.voxility.net 39.41.114.93
lh25613.voxility.net 41.218.228.206
lh17088.voxility.net 93.114.41.39 93.114.40.0 – 93.114.47.255 93.114.40.0/21
lh20162.voxility.net 93.114.43.45
lh21485.voxility.net 93.115.82.214 93.115.80.0 – 93.115.87.255 93.115.88.0 – 93.115.91.255 93.115.92.0 – 93.115.95.255 93.115.80.0/20
lh21729.voxility.net 93.115.83.152
lh22451.voxility.net 93.115.83.252
lh21001.voxility.net 93.115.84.226
lh27175.voxility.net 93.115.85.133
lh25655.voxility.net 93.115.91.54
lh26417.voxility.net 93.115.92.207
lh26480.voxility.net 93.115.92.247
lh25350.voxility.net 93.115.92.248
lh28409.voxility.net 93.115.95.201
lh28409.voxility.net 93.115.95.202
lh28409.voxility.net 93.115.95.204
lh28409.voxility.net 93.115.95.206
lh28409.voxility.net 93.115.95.207
lh28409.voxility.net 93.115.95.207
lh17109.voxility.net 109.163.227.25 109.163.224.0 – 109.163.239.255 109.163.224.0/20
lh19738.voxility.net 109.163.231.168
lh25680.voxility.net 109.163.234.13
lh21184.voxility.net 109.163.234.39
bot , Tech
ban , ban IP , blazingfast.io , bot , content scraper , internet security , ip address , research , spam , strategy , voxility.net
M ulberries, we have in the backyard, compliments of our large black mulberry tree. With it comes the mulberry mess. Well, you either frown or you make the best of the situation. In this case: mulberry sorbet.
It started as a sproutlet at the side of our house. I was unsure if it was actually a mulberry as there were 3 or 4 different types of leaves growing from the same plant. I thought it was, so transplanted it to a sunny location and waited 4 years until it started fruiting. It has been going strong ever since.
hosted-by.blazingfast.io spammed me, so I looked them up. They are an orderly shop.
Observation:
185.61.138.178
Research:
185.11.144.105
185.11.145.4 185.11.145.0 – 185.11.148.255 185.11.145.0/22
185.11.145.5
185.11.145.7
185.11.145.10
185.11.145.18
185.11.145.184
185.11.145.97
185.11.146.126
185.11.146.139
185.11.146.201
185.11.146.76
185.11.147.3
185.11.147.59
185.61.136.34 185.61.136.0 – 185.61.139.255 185.61.136.0/22
185.61.137.48
185.61.137.50
185.61.137.78
185.61.137.93
185.61.138.25
185.61.138.28
185.61.138.124
185.61.138.170
185.61.138.196
185.61.138.250
185.62.188.3 185.62.188.0 – 185.62.191.255 185.62.188.0/22
185.62.188.55
185.62.188.78
185.62.188.98
185.62.188.100
185.62.188.109
185.62.188.128
185.62.188.148
185.62.188.162
185.62.188.176
185.62.188.177
185.62.189.81
185.62.189.189
185.62.189.211
185.62.190.76
185.62.190.79
185.62.190.156
185.62.190.203
188.209.49.34 188.209.49.0/24
188.209.49.47
188.209.49.84
188.209.49.206
188.209.52.34 188.209.52.0/24
188.209.52.63
188.209.52.109
188.209.52.120
Permanent link to this post (82 words, 0 images, estimated 20 secs reading time)
bot , Tech
ban , ban IP , blazingfast.io , bot , content scraper , customer.clientshostname.com , hosted-by.blazingfast.io , internet security , ip address , research , spam , strategy
client.yota.ru spammed me so I did research. This Russian spammer makes it difficult to track them down. They are prolific. They also have the host name wimax-client.yota.ru that they also use to spam.
Observations:
client.yota.ru 94.25.168.61 2017-nov-22
client.yota.ru 94.25.173.177 2016-nov-10
client.yota.ru 94.25.177.77 2017-jul-03
client.yota.ru 94.25.179.233 2017-jan-17
client.yota.ru 94.25.180.215 2017-apr-04
client.yota.ru 94.25.228.4 2016-dec-18
client.yota.ru 94.25.229.18 2-17-jan-14
client.yota.ru 94.25.231.224 2016-dec-18
wimax-client.yota.ru 109.188.127.14 2016-dec-02
client.yota.ru 188.162.14.35 2016-dec-30
client.yota.ru 188.162.39.25 2016-nov-12
client.yota.ru 188.162.65.24 2016-sept-20
client.yota.ru 188.162.65.56 2016-nov-12
client.yota.ru 188.162.80.201 2017-feb-21
client.yota.ru 188.162.166.227 2017-jan-17
client.yota.ru 188.162.236.184 2016-oct-30
client.yota.ru 188.162.245.156 2016-sept-20
bot , Tech
ban , ban IP , bot , client.yota.ru , content scraper , internet security , ip address , research , spam , strategy , wimax-client.yota.ru , yota.ru
customer.clientshostname.com scraped me, and the name is very generic, so I thought to research it. clientshostname.com has a lot of customer names prepended to it, so this excludes all their names. Three IP ranges should do you.
Observed:
customer.clientshostname.com
Research:
93.170.13.233 93.170.13.0/24
93.170.13.212
93.170.13.205
104.193.252.10 104.193.252.0/24
104.193.252.1
104.193.252.0
185.104.8.50 185.104.8.0 – 185.104.11.255 UK-KSERVERS
185.104.8.56
185.104.8.52
185.104.8.52
185.104.8.50
185.104.8.126
185.104.9.38
185.104.9.38
185.104.9.37
185.104.9.37
185.104.9.246
185.104.9.236
185.104.9.236
185.104.9.230
185.104.9.228
185.104.10.80
185.104.10.6
185.104.10.17
185.104.10.11
185.104.11.255
185.104.11.195
185.104.11.195
185.104.11.195
185.104.11.143
185.104.11.130
185.104.11.130
185.130.104.134
204.155.31.255
213.180.204.213
Permanent link to this post (82 words, 0 images, estimated 20 secs reading time)
bot , Tech
ban , ban IP , bot , clientshostname.com , content scraper , customer.clientshostname.com , internet security , ip address , research , spam , strategy