![]() |
NATS Paysite owners: You getting botted with user/pass pre-joins "super123" as pass?
Anyone else have a guy botting a paysite pre-join 100 times a day with a username & password from the same IP coming through different affiliate links... all the passwords are the same "super123" and all IP's are from China, and there's never an attempt to use a credit card... just entering user/passes into the NATS DB. Since it's coming from different legit affiliate links on different sites, he's obviously crawling the web for join codes... totally nuts.
Am I the only one? Can anyone think of any point in doing this? This bot comes and goes every couple months for the past year, I just blocked all of China's IPs to get rid of him permanently, just curious as hell what the point is to do this for a year? Any insite appreciated... NATS 3 owners check your member's database for any user with the password "super123" I think you will be suprised.. found 3 others that had the same deal. |
have you gotten the IP and then grep'd your apache logs to see what else he is doing on your servers?
|
how you know his pass? i have been thinking it is crypted in nats, is it there plain? are you kidding me?
|
Quote:
|
Quote:
|
Install mod_geoip
SetEnvIf GEOIP_COUNTRY_CODE CN BlockCountry Deny from env=BlockCountry Tons of problems instantly go away |
Quote:
|
Quote:
|
If you catch him in the act, temporarily turn on post logging. Might be trying an evil null, sql infection or similar. Since it continues and since he's crawling for NATS links, he's obviously trying something.specific.
|
we fixed this problem but we had to disable it to keep our liscense. /:
ds |
Quote:
|
Is it worth blocking over 1 Billion potential customers to slow(they could still find a way around) something that wasn't causing any real harm anyway?
Strange stuff it is, but would need some deeper analysis to figure out what they're trying to accomplish. Could be some kind of "smart" bot that tries to sign up to any site it finds, to do spamming or whatever. I found this: https://www.dlitz.net/blog/2011/10/m...mmon-losenord/ and it looks alot that it's the same guy/bot there too. |
Quote:
|
Same here, did the prejoin about a dozen times between November and today on various sites of mine, I also have a few legit surfers using that password lol.
Check out the comments here: http://whatismyipaddress.com/ip/117.41.184.199 |
Quote:
Quote:
|
Quote:
Maybe the bot is just looking for forms with a user/pass field and a submit button and either isn't smart enough to detect actual community sites or else just hoping to get lucky. |
Quote:
|
Thanks, we did have him in our database, but had taken care of him last year.
He joined via the following IP if it helps. 99.62.117.195 |
Quote:
ds |
Quote:
|
Quote:
|
All times are GMT -7. The time now is 05:44 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123