Now it is updated every 2 minutes, and it shows the currently blocked hosts.
These blocked hosts could be blocked for a few reasons.
Its cool!
[link|http://www.gregfolkert.net/stats/uptime.html|New and Improved UPTIME for Kannigette!]
Hosts are listed in this order:
- Trying to use a feature that isn't there (300 class of errors in apache)
- Trying to get something that doesn't exist, or won't succeed (400 class of errors in apache)
- Authorization failure, for Apache, SSH or E-mail.
So, then I'll have to worry about the greater than 20 minute failing 3 times people. Down the line. Seeing as this stuff is automated already.
I also had an interesting ICQ chat with an operator of one zombie network. Seems he is a bit agitated that I discovered him and his matrix of websites used in discovery of Open Proxies. Then the machines used in PPC Fraud and his (Pharma and pr0n) Websites he operates with tons of banner ads.
Personally, I was shaking myself with adrenaline. Now... if it takes me only a short amount of research to find them with public tools available already (Google, whois, DNS resolution, redirect cleaning and other tools) I wonder why law enforcement can't do the same. Total time invested in analyzing - 15 minutes. Total time ICQ chatting with the Operator... 30 minutes.
To start all I had was 20 weeks of 3M hits per week, apache logs. I found many interesting patterns once I shredded (analyzed) the data properly.
Oh, sent those logs off to that guy in Alabama, that does the working with the FBI thing. Hi first response was basically: "Muahahahaha!"