{"id":18,"date":"2004-08-22T23:34:28","date_gmt":"2004-08-22T22:34:28","guid":{"rendered":"http:\/\/pgregg.com\/wp\/2004\/08\/annoyances\/"},"modified":"2013-05-28T23:40:08","modified_gmt":"2013-05-28T22:40:08","slug":"annoyances","status":"publish","type":"post","link":"https:\/\/blog.pgregg.com\/blog\/2004\/08\/annoyances\/","title":{"rendered":"Annoyances"},"content":{"rendered":"<p>If you are any kind of a geek, you&#8217;ll be checking your web site&#8217;s access_log on a semi-regular basis to get an idea of who is linking to you.\u00a0 Call it an ego trip if you must \ud83d\ude42\u00a0but, of late, it has become a little more annoying.<\/p>\n<p>You see, spammers have started &#8220;referer spamming&#8221; (sic) where they spam your referRer logs with URLs that don&#8217;t really link to your site in order to get link backs, con people into visiting the URLs, or hopefully find some sites that publish their web site log stats\/analysis.<\/p>\n<p>I know it is tempting to believe that jennaloveshack.com or somesuch loves to link to your pages, but this really screws up the logs.\u00a0 And, so I have taken to firewalling the offenders and it is proving remarkably effective.\u00a0 So for your perusing pleasure, the &#8220;bad guys&#8221; list provided in PeerGuardian format (which I convert to ipfw firewall rules):<\/p>\n<p>&nbsp;<\/p>\n<table style=\"width: 95%;\" cellspacing=\"4\" cellpadding=\"6\" align=\"center\">\n<tbody>\n<tr>\n<td class=\"punquote\"><span class=\"puntext\">Link Referrer Spammer:66.6.223.190-66.6.223.190<br \/>\nCare Initiatives linkref spammer 123gotcash:63.227.76.25-63.227.76.25<br \/>\nLinkref spammer:66.119.34.39-66.119.34.39<br \/>\nLinkref spammer:216.104.196.225-216.104.196.225<br \/>\nLinkref spammer:212.253.2.204-212.253.2.204<br \/>\nthebestofnet.com spammer:194.228.211.200-194.228.211.207<br \/>\nlinkref spam:148.244.150.52-148.244.150.52<br \/>\nPossible linkref spammer:195.244.37.80-195.244.37.80<br \/>\nHacked \/ scanner machine:80.109.48.242-80.109.48.242<br \/>\nwhois.sc \/ nameintelligence &#8220;bot&#8221; ref spam:64.246.160.0-64.246.191.255<br \/>\npetalsnetwork.com\/se\/coral-springs-florists spammer:211.157.8.41-211.157.8.41<br \/>\nteens-photo.com spam:12.22.85.3-12.22.85.3<br \/>\nteens-photo.com spam:12.33.10.164-12.33.10.164<br \/>\nrefspam:211.157.8.44-211.157.8.44<br \/>\nrefspam:209.44.12.250-209.44.12.250<br \/>\ncatagoryhound.com linkspamming their own service:205.236.189.0-205.236.189.255<br \/>\n<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Since I added firewalling to those networks\/ips, my referer log is much cleaner and my irregular ego boost can continue largely uninterrupted.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you are any kind of a geek, you&#8217;ll be checking your web site&#8217;s access_log on a semi-regular basis to get an idea of who is linking to you.\u00a0 Call it an ego trip if you must \ud83d\ude42\u00a0but, of late, it has become a little more annoying. You see, spammers have started &#8220;referer spamming&#8221; (sic) &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.pgregg.com\/blog\/2004\/08\/annoyances\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Annoyances&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-18","post","type-post","status-publish","format-standard","hentry","category-general"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQOUu-i","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/posts\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":2,"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/posts\/18\/revisions"}],"predecessor-version":[{"id":537,"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/posts\/18\/revisions\/537"}],"wp:attachment":[{"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/media?parent=18"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/categories?post=18"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.pgregg.com\/blog\/wp-json\/wp\/v2\/tags?post=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}