#computertech Bot Logged User list

Network: TechNet
Modes: +ntf
Last Seen: 1 month, 4 weeks ago
Topic:
2
Users

Channel Log Archive for #computertech

Prev
Next

* All times are UTC
Filtering by user: jmjl/rizon
Friday, January 26, 2024
[16:45:53] jmjl/rizon Lol, "Mozilla/5.0 (Linux; Android 5.0) AppleWebKit/537.36 (KHTML, like Gecko) Mobile Safari/537.36 (compatible; Bytespider; https://zhanzhang.toutiao.com/)
[16:47:25] jmjl/rizon esjay: it seems to be bytedance, (the company that runs tiktok I think)
[16:47:31] jmjl/rizon so, into blacklist
[16:48:39] jmjl/rizon Mikoolo: Yeah, I've added `if ($http_user_agent ~* "Bytespider") { return 400 "Blocked bytedance."; }` to my nginx
[16:49:19] jmjl/rizon h4: I had only one, (Brave) for some sites, added it to tilde.green too, (will take a bit to update)
[16:49:20] jmjl/rizon not sure
[16:50:11] jmjl/rizon I've thought about changing the code to 405
[16:50:19] jmjl/rizon Or 403.
[16:50:35] jmjl/rizon I guess 429 is also valid, but it's not exactly what I want to send
[16:51:32] jmjl/rizon !bang
[16:51:35] jmjl/rizon ops
[16:51:40] jmjl/rizon !bang
[16:52:07] jmjl/rizon Mikoolo: it's not a teapot :P
[16:52:15] jmjl/rizon I am a admin of teapot.chat, tho :P
[16:52:37] jmjl/rizon Mikoolo: it's a dedicated server, not a teapot :P
[16:52:54] jmjl/rizon I don't think so
[16:53:00] jmjl/rizon I think 406 would be more ok
[16:54:52] jmjl/rizon out of 46 requests by bytespider, only 2 are to /robots.txt
[16:55:27] jmjl/rizon 110.249.201.136,110.249.201.155,110.249.201.16,110.249.201.169,110.249.201.173,110.249.201.178,110.249.201.190,110.249.201.67,110.249.202.105,110.249.202.107,110.249.202.116,110.249.202.141,110.249.202.147,110.249.202.165,110.249.202.169,110.249.202.170,110.249.202.208,110.249.202.231,110.249.202.53,110.249.202.57,110.249.202.64,110.249.202.72,110.249.202.89,110.249.202.98,111.2
[16:55:27] jmjl/rizon 25.148.146,111.225.148.188,111.225.148.206,111.225.149.110,111.225.149.111,111.225.149.120,111.225.149.13,111.225.149.18,111.225.149.186,111.225.149.203,111.225.149.79,111.225.149.92,47.128.119.105,47.128.122.188,47.128.62.167
[16:55:57] jmjl/rizon oh probably good idea
[16:56:01] jmjl/rizon lol
[16:56:12] jmjl/rizon Mikoolo: yeah all requests I have on current log are from this year it seems
[16:56:40] jmjl/rizon I should probably look into the entire log, but I don't know how to grep it easily (the .gz files)
[16:57:06] jmjl/rizon by 0days I thought esjay meant software vulnerabilities
[16:58:16] jmjl/rizon hardware too?
[16:59:56] jmjl/rizon They are hard to fix right?
[17:00:18] jmjl/rizon What's EHR?
[17:00:44] jmjl/rizon .t en es EHR
[17:00:47] jmjl/rizon .u EHR
[17:01:17] jmjl/rizon esjay: oh the record machines?
[17:01:37] jmjl/rizon Like healthcare database machines
[17:01:46] jmjl/rizon Where they store all customer data?
[17:08:14] jmjl/rizon Yeah, if you have a vuln on that, it's pretty dangerous :P
Prev
Next