We Canadians are always overshadowed by the 10 larger in population US. If at all possible I like to highlight our accomplishments, or in this case, sophisticated comment spamming from Canada. Bad, Canada.
Comment spammers on my site usually use a single IP to first read the post, determine if they can submit spam, then submit the spam comment. This shows up in my Akismet spam comments. They are simple to identify and ban.
It is always good to see international cooperation amongst different nations in this great world. However, when China, India and Russia cooperate to try to break into my site, forgive me when I get a little upset. While I usually file complaints to internet host providers, in this case the complaint would fall on deaf ears: hosts in China, India and Russia ignore abuse emails. Then most hosts from all over the world ignore abuse emails.
Number of login attempts: 417
All the user agent names are the same: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:40.0) Gecko/20100101 Firefox/40.0
I have moved host providers, and my new provider uses CloudLinux.
CloudLinux uses a container technology called Lightweight Virtual Environment, or LVE. This container technology allows many users to co-locate on the same server. Each tenant is limited to specific resources and cannot exceed them and thus, negatively influence the other tenants.
Physical Memory Usage (RAM) is a combination of physical memory and disk cache. When physical memory usage is close to max CloudLinux will dump its disk cache to free up space. If physical memory usage is still maxing, users will experience PHP error 500 and 503s.
Moved, I did, from Site5, to A2. The last 21 hrs was a wet and wild ride all without the protection of my trusty .htaccess file, the one with my Ip ban list. Within that time, 21 hrs, I received a total of 33 spam comments. Usually I receive only one or two. It is clear that without protection I would be inundated by comment spam.
Of course these IPs are only the ones that comment spammed me. There are many more that use their bots to do content scraping, trying to break into my site, trick my host provider, etc. There are too many to list.
It sounds like a very common thing to me. You post some content, you want others to comment, comments invite bots, you want a Captcha question. In D8 by default this is turned off. Unfortunately in Drupal 8 it is also not easy to find this setting.
To add Captcha to Drupal 8 Comments one must:
– Goto “admin/config/people/captcha/captcha-points”
– Click ” + Add Captcha Point” button at top of page
– Use “comment_comment_form” as Form ID
Domain Crawler hit my server a 500 transaction attack today, using 5 IP addresses, all from Sweden. They scraped me hard! Their user agent is “DomainCrawler/3.0 (info@domaincrawler.com; http://www.domaincrawler.com/dontai.com)”. I have banned all these IP addresses with their last octet. Good riddance.
80.248.225.142 Internetbolaget Se domaincrawler
80.248.227.107 Internetbolaget Se domaincrawler
176.74.192.36 Tralex Se domaincrawler
193.183.102.178 Internetbolaget Se domaincrawler
Humans being humans, shudder when confronted with long, boring end user agreements, or EUAs. I am pretty sure sites and the legal profession knowingly takes advantage of this when they write them. It is important, however, to understand the agreement, as this does affect your privacy.
Jenny Afia, a privacy lawyer and partner at Schillings law firm in London, Uk, took it upon herself to rewrite Instagram’s EUA so that preteens and teens could understand what expectations they are signing up for when using Instagram. The original interview was with the Washington Post.
Why is today so special? It looks like two separate groups tried their own brute force login attacks on my site, each using a different technique. There were a total of 510 login attempts today on my site.
The first technique is to use a low number of IPs, but try numerous times. UA: “Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:40.0) Gecko/20100101 Firefox/40.0”
SSH is a unix tool you can use to facilitate secure and fast transfers between servers, or between your desktop and a server. Instead of transferring a file from server A to your PC and then from your PC to server B, you can more directly transfer files from Server A to server B.
You will need SSH credentials for both servers. These credentials include an ID, the server name, port and a password. You will need to get these from your server admin, or your ISP. Once you have these, start a terminal each and “SSH id@servername”. You will be prompted for a password. Once you login your terminal prompt will change, showing you that you’re on a different server. Keep both open. From the receiving server you can do the scp command. This seems the easiest.