- cross-posted to:
- techtakes@awful.systems
- cross-posted to:
- techtakes@awful.systems
I, for one, am enjoying this new game of cat and mouse.
On my main domain I employ a tarpit that triggers on 404 and returns 200 so the bot doesn’t think it was a 404. It then prints a bunch of unique links that go nowhere (404, so loops back to itself) and starts very slowly printing a 13 megabyte string of base64. If your bot can deal with all of this, go ahead man. You can have it.
I have a honeypot on one of my lesser domains which simply takes incoming IPs and scans them for the usual HTTP ports. I’m gonna be careful what I say in public but 80% of traffic are scanners that identify themselves and 19% are unknown, likely scrapers, and 1% are unknown, likely still scrapers, that for some reason have open admin interfaces with default logins. Do what you want with this information.
User and Pass bound to an difficile setup process are an answer; after that you can limit access easily per user. And a very tiny login page so that even the highest number of queries can easily be bounced.
The future of the internet is tiny login pages. Ah least the crypto bros got rich.