On 2021-05-20 11:20-0600 the...@sys-concept.com wrote:

> It seems to me IPv4 is broken beyond repair.
> I'm trying to block spammers but buy rewrite source IP (that is not
> checked) so it is impossible to block them. Example below is from a
> single source:
> 
> 189.142.216.209 - - [20/May/2021:09:49:29 -0600] "GET /contact_us.php
> HTTP/1.0" 200 25552 82.79.97.137 - - [20/May/2021:09:49:31 -0600]
> "GET /vvc_display.php?vvc= HTTP/1.0" 200 4149 202.138.252.59 - -
> [20/May/2021:09:49:33 -0600] "POST /contact_us.php?action=send
> HTTP/1.0" 302 13 91.235.177.140 - - [20/May/2021:09:49:35 -0600] "GET
> /contact_us.php?action=success HTTP/1.0" 200 24031 41.82.36.214 - -
> [20/May/2021:09:49:37 -0600] "GET /contact_us.php HTTP/1.0" 200 25725

As long as the website is find-able by search engines, it doesn't
matter if it is IPv4 or IPv6.
A good measure against non-targeted spam is a hidden input field with
the name “url”. If the bot put anything in that field, throw it out.
Simple math captchas (like “what is 2 + 3?”) work well too.
If the spam is targeted, you'll probably need a more advanced captcha
solution.

See also:
  <https://nearcyan.com/you-probably-dont-need-recaptcha/>
  
<https://www.nfriedly.com/techblog/2009/11/how-to-build-a-spam-free-contact-forms-without-captchas/>

Kind regards, tastytea

-- 
Get my PGP key with `gpg --locate-keys tasty...@tastytea.de` or at
<https://tastytea.de/tastytea.asc>.

Attachment: pgpCsdtr9FCix.pgp
Description: Digitale Signatur von OpenPGP

Reply via email to