Open Proxy Abusers - tuesday 2005-03-01 0600 | last modified 2005-03-01 1716 |
Categories: Nerdy | |
TrackBacks Sent: None | |
Between June, 2004, and the middle of January, 2005, I had our server mistakenly configured to act as an open proxy. Various domains were made victim: andersonsrace.org cbpastors.org darkclan.net mitacf.org ryanlee.org yopenguin.darkclan.net 1180 separate IPs made use of the open proxy for 180,343 requests totalling 2646900227 bytes (2.47 GB) transferred. I've put together a list of the IPs. Abusers generally seemed to use the proxy as a method of posting spam to blogs and other comment-able services and as 'unique' hits for increasing their own advertising revenue; of the 180,343 hits, there were 67,977 unique requests to 4,750 valid domains. It is likely these businesses were not aware of the proxy abusers behavior, and it would probably be far more interesting to see which businesses the requested ads are attached to. The most frequently requested advertising domains, with an approximate hit count (not taking into account possible domain name variations) were: 971 www.engine54.com 1025 www.blowsearch.com 1164 www.abcsearch.com 1172 t.trafficmp.com 1232 partners.mygeek.com 1322 www.searchyourpockets.com 1422 pagead2.googlesyndication.com 2003 focusin.ads.targetnet.com 2864 www.seek99.com 3448 www.kanoodle.com 4359 oz.valueclick.com Further analysis is entirely possible - one could run the list of IPs through ARIN and its associated IP block assignment agencies to uncover zombied PCs or more insidious or ignorant hosting facilities. The businesses linked to the advertising comapnies could also be extracted by manual lookup. If you're interested in pursuing some sort of legal action requiring the evidence I might be able to provide, please contact me; I don't have the time to follow these leads right now. |
|
You must login to leave a comment |
|
TrackBacks
No TrackBacks for this entry.