[Dxspider-support] badspotter badwords

Erwin Fiten erwin.fiten at gmail.com
Wed Sep 14 14:52:51 BST 2022


Great job, looks good. I will test it also.
I had to install the IP module with :

sudo apt-get install -y libnetaddr-ip-perl

Erwin de ON8AR

Op wo 14 sep. 2022 om 15:16 schreef Joaquin via Dxspider-support <
dxspider-support at tobit.co.uk>:

> Hi all,
>
> For those who want to do tests, and I'm sure it can be improved a lot.
>
> * bad_spotter.pl beta testing procedure
>
> 1. Download TOR and Proxies IP list, first time:
>
> curl -o /spider/local_data/tor-proxies.txt
> https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt
> curl -o /spider/local_data/proxies-exits.txt
> https://lists.fissionrelays.net/tor/relays-ipv4.txt
> cat /spider/local_data/proxies-exits.txt >
> /spider/local_data/tor-proxies.txt
> sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt
>
> 2. Copy the bad_spotter.pl script to: /spider/local_cmd/bad_spotter.pl
> 3. Run chmod +x /spider/local_cmd/bad_spotter.pl
> 4. Add in /spider/local_cmd/crontab:
>
> # Bad spotter
> 0 0 * * *  spawn('pkill -f "/usr/bin/perl -w /spider/local_cmd/
> bad_spotter.pl"')
> 1 0 * * *  spawn("/usr/bin/perl -w /spider/local_cmd/bad_spotter.pl")
> 30 * * * * spawn('curl -o /spider/local_data/tor-proxies.txt
> https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt')
> 31 * * * * spawn('curl -o /spider/local_data/proxies-exits.txt
> https://lists.fissionrelays.net/tor/relays-ipv4.txt')
> 32 * * * * spawn('cat /spider/local_data/proxies-exits.txt >
> /spider/local_data/tor-proxies.txt')
> 33 * * * * spawn('sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt')
>
>
> 4. Make sure the directory is created: /spider/cmd_import , if not:
> mkdir /spider/cmd_import
>
> 5. Make log directory:
> mkdir /spider local_data/bad_spotter
>
> 6. The first time you want to run it, from the prompt:
>
> /usr/bin/perl -w /spider/local_cmd/bad_spotter.pl &
>
> # End
>
> Example tail -f /spider local_data/bad_spotter/log.txt
>
> 2022-09-12T14:01:53 [N9KT-2, RA1AL, 185.220.101.79, Politics and HAMSPIRIT
> no mix!]
> 2022-09-12T14:54:41 [N9KT-2, RA3ATX, 185.129.61.129, RU will liberate the
> world!]
> 2022-09-13T17:52:58 [PI4CC, PA2A, 77.171.80.188, ]
>
> Do not forget that it is a development version.
>
> 73 de Kin
>
> Sysop EA3CV-2 & EA4URE-2,3,5
>
> El 14/09/2022 a las 14:54, David Spoelstra escribió:
>
> Joaquin-
> Yes, please, send me the script.
> -David, N9KT
>
> On Wed, Sep 14, 2022 at 8:51 AM Joaquin via Dxspider-support <
> dxspider-support at tobit.co.uk> wrote:
>
>> Hi David,
>>
>> You have two more options:
>>
>> 1. Enable for everyone:
>> set/register
>> set/password
>>
>> 2. If you want I can send you a small script that will automatically
>> block any callsign that comes from the TOR network or is using a PROXY.
>> The script runs the set/bad/spotter command and logs the callsign that
>> has been blocked.
>> It is a help, but it is not the definitive solution.
>>
>> Regards.
>>
>> Kin EA3CV
>>
>> El 14/09/2022 a las 14:35, David Spoelstra via Dxspider-support escribió:
>> > Seems like my cluster is being used for propaganda. I've spent the
>> > morning running "set/badspotter" and "set/badword" commands. Is there
>> > anything else I should be doing?
>>
>> _______________________________________________
>> Dxspider-support mailing list
>> Dxspider-support at tobit.co.uk
>> https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support
>>
> _______________________________________________
> Dxspider-support mailing list
> Dxspider-support at tobit.co.uk
> https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.tobit.co.uk/pipermail/dxspider-support/attachments/20220914/0922bee0/attachment.htm>


More information about the Dxspider-support mailing list