Hi all i need a script that gets the proxys from http://proxy.org/tor.shtml and i want it blacklist in /db/blacklist.txt
i need this script a spammer that use tor proxys wont go away and this is the only way so please help thanks.
Question: Does the spammer show an ip or a hostname (need to know whether hostnames need to be reverse-resolved into ip for checking against the list.)
Both ip and hostname, tor proxys has hostnames and some dont...
* g695239 (~7HX8EW@69.55.232.152) has joined
* g695239 was kicked by Evi1Bot (drone)
* Evi1Bot sets mode: +b *!*@69.55.232.152
* c273508 (~3o3@c-24-21-172-176.hsd1.mn.comcast.net) has joined
* c273508 was kicked by Evi1Bot (drone)
* Evi1Bot sets mode: +b *!*@c-24-21-172-176.hsd1.mn.comcast.net
all the proxys he use comes from http://proxy.org/tor.shtml thats why i need the bot go to the website and put all of them in the blacklist perm
you tried what? tor proxies dnsbl's are pretty well up to date. I used just 1 that you listed and got this result.
OpmLongshanks check c-24-21-172-176.hsd1.mn.comcast.net
[22:50:45] <OpmLongshanks> CHECK -> Checking '24.21.172.176' for open proxies []
[22:50:45] <OpmLongshanks> CHECK -> DNSBL -> 24.21.172.176 does not appear in BL zone dnsbl.njabl.org
[22:50:45] <OpmLongshanks> CHECK -> DNSBL -> 24.21.172.176 does not appear in BL zone opm.blitzed.org [22:50:45] <OpmLongshanks> CHECK -> DNSBL -> 24.21.172.176 appears in BL zone tor.dnsbl.sectoor.de (Tor exit server)
[22:50:45] <OpmLongshanks> CHECK -> All tests on 24.21.172.176 completed.
I too would say using dnsbl lookups is the way togo..
By merely looking at the source of the page you wished to mine, makes it pretty obvious the author has no intention on making it easy for ppl to use some automated mining tool (inserting ramdom comments, switching between plain-text and &nnn;-style for each digit and decimal, etc).
Although converting these into something usable should'nt be that hard, it surely indicates the service-provider don't want ppl mining it, and is prepared to do quite alot to prevent ppl from doing it...
nml375 wrote:Although converting these into something usable should'nt be that hard, it surely indicates the service-provider don't want ppl mining it, and is prepared to do quite alot to prevent ppl from doing it...
Besides, dnsbl is pretty standardized these days.
In their defense, they do provide an .htaccess formatted file, but, why bother making a new script when dnsbl+proxyscan will do the job infinitely faster than any other method I could think of? I was thinking of pulling the data from the htaccess file, then using lsearch, but dnsbl is super-fast and there's many of em to pick from.
I use several dnsbl's for my sendmail config, works quite well.</offtopic>
silverboy wrote:if ur doin it the other way eggdrop is damn slower.!
proxyscan.tcl looked pretty fast to me.. Anyone care to use [time] on it and find out exactly how many milliseconds it takes to get the info from a half dozen dnsbl's with it? If I had to guess, I'd say it took maybe 1/100th of a sec to look up the test IP I tried in the 5 dnsbl's..
Of course, there's always the possibility that one of the dnsbl servers doesn't respond immediately, and I already deleted the proxyscan script, so I dont know offhand if/how it handles timeouts.
Considering that it does the query in 1 one proc and handles the response in a separate proc, I don't see any reason it would lag the bot. I suppose the join bind might lag the bot if the channel is extremely busy, but dnsbl lookups as done in proxyscan.tcl is a damn sight faster than the method I had in mind =)
If there is a sock4 dnsbl, sure.. Try google searching for "socks4 dnsbl" and the link for proxyscan was posted in this thread, or just search the tcl archive for proxyscan, it's in the archive.
If the variable banport is in the proxycheck script, yes you can add more to it, I dont have the script any longer to look at it, and for your 2nd question, yes you can comment out the putserv line or delete if you prefer to stop sending kick notices to the users.