Call for donations from my blocklist users
Many of my regular visitors to this website (www.wizcrafts.net/) are aware of the fact that I maintain and publish, for free, various IP address blocklists. In fact, a lot of you are using one or more of these lists to protect your websites and forums from scammers, spammers, content thieves and exploits. If you are benefiting from using my blocklists I could sure use your help, in the form of PayPal Donations, in any amount you can afford.
All of the blocklists come in two forms: Apache .htaccess and Linux iptables. I'll discuss the differences later in this article. Note, that there is no real difference between a "blocklist" and a "blacklist" and while some people interchange them, blocklist is the correct technical term for ip and "host name" lists used to block access to a web server. Also, my IP blocklists are specifically formatted for use on Linux or Unix (or equivalent) operating systems and Apache web servers. The Apache web server is totally free and is the most widely deployed web server on the Internet.
It is my understanding that websites hosted on Windows IIS Servers can import the IP ranges into a special IIS configuration file, possibly only line by line, but I don't know the details. Ask your web host or server administrator if they can convert long .htaccess or iptables blocklists into Windows IIS format.
My earliest and most famous blocklist is the Nigerian Blocklist, which I began compiling during the summer of 2005. It came about as the result of me being a member of a specialty interest group buy and sell forum that was invaded by Nigerian 419 scammers. Soon there were wholesale reports of multiple daily scam messages being received by sellers on that forum. I asked the owner a few technical questions about the server and proceeded to begin compiling a flow of forwarded-as-attachments scam emails from the members, which contained the originating IP addresses of the scammers, in the headers. I researched each address to trace the ISP to which that IP was assigned and then discovered the full CIDR assigned to them. These IP CIDRs were accumulated into what soon became the Nigerian Blocklist, for use as a .htaccess file, on the forum's Apache-based server.
Today, about three and a half years later, webmasters around the World apply my Nigerian Blocklist to their .htaccess file, or iptables firewalls, keeping Nigerian and other African 419 scammers from conning their members out of their money and sometimes goods, as well. Many of these scams targeting sellers involved overpayment with a counterfeit cashiers' check, or Postal Money Order, with the seller refunding the difference by Western Union. It wasn't usually until two weeks had passed that the banks began notifying victims that they had deposited counterfeit checks and the victims were responsible for repaying the full amount to their bank. Yes, it really can take that long to find out if a cashiers' check is counterfeit, or drawn on a closed account.
This work began evolving in the beginning of 2007 to cover other types of hostile actions aimed at my websites, including, form, log and blog spam, content theft, hacking probes and server exploit attacks and the work continues to this day. Each day I read through my raw access logs and use special software and regular expressions to separate hostile contacts from legitimate ones. After performing Whois lookups of the more frequent IP abuses I add their ISP or web hosting, or dedicated server leasing company to the appropriate blocklist and publish the updates. You'd be amazed at the sheer number of exploited servers being used to launch attacks against other servers, every day!
As of now I maintain four different blocklist, each available in both .htaccess and iptables formats. Webmasters who lease space on shared hosting servers are limited to using the .htaccess blocklists. These lists contain "directives" interpreted by an Apache web server, to control access to any, or all of your web pages. This is all they are able to block. They cannot stop spammers from sending email to your email server, hackers from trying to ftp into your account - and try tp crack your password. To block these things requires applying IP blocklists and individual offending IP addresses to the Linux automatic policy firewall, which protects your server box itself. Only a system administrator can do such things, so, if you rent a dedicated server you will have "Root" access. Some "VPS" servers also contain a mini-operating system for each account, allowing root access to the underlying operating system and firewall.
The different types of web hosting accounts can be confusing at first, so I maintain a web page all about web hosting. Yes it has links to commercial companies, and yes I will make a commission when somebody signs up through my links and banners. This is not a crime. It is a way to help offset to costs of hosting and updating my websites. I have to eat like the rest of you all!
I have created two landing pages to help new users determine which blocklists are best for their use and level of server privileges. If you only have .htaccess permissions, please visit my Htaccess Blocklists page. If you have Root access to the Linux firewall, please look at my Iptables Blocklists page. Each links to four different blocklists: Chinese-Korean, Exploited-Hostile Servers, Nigerian-African and Russian-Turkish blocklists. And, each landing page also has PayPal Donation buttons, which I hope some of you will be kind enough to use.
Further, each page on my website has a link to contact me, the Webmaster, to send reports of new IP addresses assigned to ISPs and servers used by forum spammers, blog and form scammers and server exploiters.
In closing, thanks to those who are already making occasional donations, as well as those of you who will in the future. I thank you from the bottom of my heart!
PS: I am available for hire as a website security consultant and can install and manage blocklists for you, on a contract, or as needed basis. See my Webmaster Services page for more details about my Webmaster services.
If you like this article please share it.
The content on this blog may be reprinted provided you do not modify the content and that you give credit to Wizcrafts and provide a link back to the blog home page, or individual blog articles you wish to reprint. Commercial use, or derivative work requires written permission from the author.