![]() |
|
Pathologically Eclectic Rubbish Lister | |
PerlMonks |
Re^2: Anonymous Google Chrome browsers now under additional scrutinyby LanX (Saint) |
on May 05, 2025 at 23:01 UTC ( [id://11164956]=note: print w/replies, xml ) | Need Help?? |
Well yes, a node behind the honeypot could automatically block the IP. But probably it's better to redirect blacklisted IPs to some static and link-wise shallow fake content to feed them a little. ¹ Otherwise HTTP-Errors are easily detected, so someone might be triggered to improve the attack. From my understanding they are using IP-farms to attack us and share the harvested links among them for the next requests. Like that we might trap far more IPs in our "honeyfarm"
Cheers Rolf
¹) like a wget-mirror of the last week in a dedicated node-id range, there is a huge unused gap there, which we could reuse.
In Section
Perl Monks Discussion
|
|