• 0

Perl Form Spam


Question

I have a problem with a certain IP hitting my form MANY times to see if it can send it's spam.
Fortuanently, it's configured it can't, but I still get it's stupid bounces.

Is there some code someone can provide, that if a certain IP hits it more than x times in a minute, it blocks it for a certain period, and adds it to a log file for further blocking, and sends it to be a page saying your blocked?

Sorry I don't know perl, it was a pre-written script I just modified vars for.

Thanks a bunch guys!

Link to comment
Share on other sites

6 answers to this question

Recommended Posts

  • 0

If you want to prevent it from even loading your page it's going to be complicated :/

You can block it's ip address in a htaccess file:

order allow,deny
deny from 34.134.231.23
allow from all

Change the id into the spam ip and save it as a .htaccess file on your server.

 

You can also use services like cloudflare which will block spammers like these.

 

Blocking it's ip in perl after a ip hits it more then x times a minute. This could be done by logging the ip address and time code on every visit and for every visitor which might become quite a big database so you will have to also write a script to clean the database every minute.

 

I suggest to use services like cloudflare instead which is a lot less work and already has a list of spammers available for you.

Link to comment
Share on other sites

  • 0

Wont work with .htaccess files, it's Frontpage based - which yes, is outdated, but doesn't work with Apache.

I already have Cloudflare setup and it didn't help.

Link to comment
Share on other sites

  • 0

Wont work with .htaccess files, it's Frontpage based - which yes, is outdated, but doesn't work with Apache.

I already have Cloudflare setup and it didn't help.

The way you built your webpage has nonthing to do with .htaccess files, you can just drop .htaccess files on your server(linux required) web root folder and they'll work.

 

And frontpage isn't that something from MS from a few years ago? Never really heard much about it.

If I remember correctly they're just plain html pages, office publisher does the same nowadays.

Link to comment
Share on other sites

  • 0

The way you built your webpage has nonthing to do with .htaccess files, you can just drop .htaccess files on your server(linux required) web root folder and they'll work.

 

And frontpage isn't that something from MS from a few years ago? Never really heard much about it.

If I remember correctly they're just plain html pages, office publisher does the same nowadays.

 

That's right, MS uses Frontpage back in late 90's ..  

 

OP, just create htaccess file and copy and paste seahorse's code and place it in your root folder or in your form folder wherever your form is placed.

 

If you already have htaccess file, then add the code that seahorse provided onto it.

Link to comment
Share on other sites

  • 0

Wont work with .htaccess files, it's Frontpage based - which yes, is outdated, but doesn't work with Apache.

I already have Cloudflare setup and it didn't help.

http://docs.cpanel.net/twiki/bin/view/EasyApache/Apache/ModFrontPage

 

You can install apache 2.2 and then install the frontpage module.

 

Or you can block ip adresses manually in cloudflare: https://support.cloudflare.com/hc/en-us/articles/200171346-How-do-I-block-blacklist-or-trust-whitelist-an-IP-address-manually-

Keep in mind it can take up to 48hour to see any changes in cloudflare on your website.

That's right, MS uses Frontpage back in late 90's ..  

 

OP, just create htaccess file and copy and paste seahorse's code and place it in your root folder or in your form folder wherever your form is placed.

 

If you already have htaccess file, then add the code that seahorse provided onto it.

Seems apache dropped support for frontpage :P

http://docs.cpanel.net/twiki/bin/view/EasyApache/Apache/ModFrontPage

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.