Următoarele adrese IP nu vor putea lăsa comentarii pe acest blog find cunoscute ca sursa de spam. Faptul ca acest blog dofollow atrage spameri nu e defel o surpriza. Având în vedere ca marea majoritate a celor menționați mai jos fac random spam, soluțiile îndeobște utile nu funcționează. Decizia de a nu instala plug-in-uri antispam pe acest blog nu înseamnă totuși ca spam-ul este permis.
Acest post va conține începând de astăzi adresele de IP care fac blog spam aici și numele providerilor care le furnizează resurse.
41.190.16.17 – Emerging Markets Telecommunication Services (EMTS) Limited – Nigeria, Ahmed Al Housani
58.181.37.238 – Nexg, Republic Of Korea
58.211.218.74 – China Beijing Chinanet Jiangsu Province Network
62.24.105.115 – Telkom Kenya Jambonet network
67.222.5.159 – US Leland Privatesystems Networks
78.186.130.43 – Turkey Istanbul Tt Adsl-meteksan Ttnet Static_aci
79.125.18.112 – Amazon Web Services, Elastic Compute Cloud, EC2, EU
79.125.18.101 – Amazon Web Services, Elastic Compute Cloud, EC2, EU
79.125.28.123 – Amazon Web Services, Elastic Compute Cloud, EC2, EU
79.125.12.241 – Amazon Web Services, Elastic Compute Cloud, EC2, EU
80.250.146.50 – Cellcom Israel Ltd.
83.146.112.130 – Southern Urals TransTelecom, Russia
82.196.220.116 – Broadnet Norge AS, FORNEBU, Norway, Helge Dahl
83.222.223.186 – Net of Synterra for WiMax, Moscow, Russia
91.199.50.100 – Netrouting, Netherlands, Savvas Bout
93.137.25.253 – Croatian Telecom Inc., Zagreb, Croatia
93.182.136.42 – ViaEuropa i Lund AB, Max Jonborn
95.215.0.39 – Petersburg Internet Network LLC
112.78.216.102 – SAKURA Internet Inc., 1-8-14, Minami Honmachi, Chuo-ku, Osaka, Japan
120.28.64.77 – GBB SAN JUAN, Makati City, Philippines, Allan Abarquez
120.50.54.20 – Danawa Resources Sdn Bhd, Kuala Lumpur, Malaysia
128.104.116.80 – US Madison University Of Wisconsin Madison
128.177.27.59 – Vienna Openhosting Inc
141.30.37.133 – Technische Universitaet Dresden
147.228.63.164 – University of West Bohemia
149.32.224.33 – Vitro Corporation, Rockville, MD, USA, John Briggs
163.192.4.213 – Tribune Company, 435 North Michigan, Chicago
173.61.152.100 – Verizon Internet Services Inc
174.121.114.175 – Dallas Theplanet.com Internet Services Inc
174.123.132.251 – Dallas Theplanet.com Internet Services Inc
174.129.5.87 – Amazon Web Services, Elastic Compute Cloud, EC2
184.73.231.159 – Amazon Web Services, Elastic Compute Cloud, EC2
188.165.75.23 -Projet-Xen, OVH SAS, 59100 Roubaix, France
190.2.57.185 – ITRIO Consulting and Software Development, Buenos Aires, Argentina
193.36.37.2 – Aras Kargo Yurtici Yurdisi Tasimacilik, Turkey, Ahmet Vasif OZKAN
193.41.184.100 – DAN Telecom, Rivne, Ukraine, Victor Ustymchuk
194.7.188.53 – FORMATECH ASSOCIATES SA, Brussel, Belgium, Claude Glowacki
195.120.202.106 – CEAC SERVIZI E SISTEMI INFORMATICI SRL, Milano, Italy, GIORDANO PINA
200.19.137.253 – Associação Rede Nacional de Ensino e Pesquisa, Brasil, Nelson Simões Silva
202.87.41.228 – India Mumbai Netmagic Datacenter, Mehra Industrial Estate, Sharad Sanghi
202.155.8.118 -Indosat Internet Service Provider, Jakarta – Indonesia
208.96.11.114 -UCSF Breast Care Center, 2186 Geary Blvd suite 103
208.27.113.137 – https://www.ilrinc.com/
209.128.96.116 – US Santa Clara Coconut Tree Software
212.49.116.179 – Novasolar & Steelstroy
213.132.231.101 – Kuwait Kuwait Gulfnet Corporate Customers
213.165.87.105 – Teletext Ltd., Chiswick, London, United Kingdom
217.169.129.36 -Switzerland Ch Ecole Internationale De Geneve
218.6.15.36 – China Beijing Chinanet Fujian Province Network
Următoarele adrese [& intervale] IP sunt banate pe acest server [motiv: utilizare excesiva a resurselor]:
77.88.18. -Yandex enterprise network
77.88.42.27 – Yandex enterprise network
87.250.254. – Yandex enterprise network
93.158.147. – Yandex enterprise network
94.100.181. – Yandex enterprise network
95.108.142. – Yandex enterprise network
188.40.125.9 – TreeWorks LLC
213.180.198. – Yandex enterprise network
213.180.199. – Yandex enterprise network
213.180.200. – Yandex enterprise network
[motiv: Blog SPAM]:
Un exemplu de mesaj a fi transmis deținătorului IP-ului care va face spam:
Hello.
A spammer is using your resources to perform an attack on our server [IP: ]. A legitimate company like yours probably would not approve. The information below should be all you need.
[informatiile din log-ul serverului pentru acel IP]
Daca aveți și alte idei ce pot fi aplicate pentru combaterea spam-ului va invit sa le împărtășiți în comentarii.
2 Responses to Banned IP 4 SPAM