<div dir="ltr">Great job, looks good. I will test it also.<br>I had to install the IP module with : <div><br></div><div>sudo apt-get install -y libnetaddr-ip-perl<br></div><div><br></div><div>Erwin de ON8AR</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">Op wo 14 sep. 2022 om 15:16 schreef Joaquin via Dxspider-support <<a href="mailto:dxspider-support@tobit.co.uk">dxspider-support@tobit.co.uk</a>>:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<div>
<p><font size="2" face="Courier New">Hi all,<br>
<br>
For those who want to do tests, and I'm sure it can be improved
a lot.<br>
<br>
* <a href="http://bad_spotter.pl" target="_blank">bad_spotter.pl</a> beta testing procedure<br>
<br>
1. Download TOR and Proxies IP list, first time:<br>
<br>
curl -o /spider/local_data/tor-proxies.txt
<a href="https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt" target="_blank">https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt</a><br>
curl -o /spider/local_data/proxies-exits.txt
<a href="https://lists.fissionrelays.net/tor/relays-ipv4.txt" target="_blank">https://lists.fissionrelays.net/tor/relays-ipv4.txt</a> <br>
cat /spider/local_data/proxies-exits.txt >
/spider/local_data/tor-proxies.txt<br>
sed -i "s|$|/32|" /spider/local_data/tor-proxies.txt<br>
<br>
2. Copy the <a href="http://bad_spotter.pl" target="_blank">bad_spotter.pl</a> script to:
/spider/local_cmd/<a href="http://bad_spotter.pl" target="_blank">bad_spotter.pl</a><br>
3. Run chmod +x /spider/local_cmd/<a href="http://bad_spotter.pl" target="_blank">bad_spotter.pl</a><br>
4. Add in /spider/local_cmd/crontab:<br>
<br>
# Bad spotter<br>
0 0 * * * spawn('pkill -f "/usr/bin/perl -w
/spider/local_cmd/<a href="http://bad_spotter.pl" target="_blank">bad_spotter.pl</a>"')<br>
1 0 * * * spawn("/usr/bin/perl -w
/spider/local_cmd/<a href="http://bad_spotter.pl" target="_blank">bad_spotter.pl</a>")<br>
30 * * * * spawn('curl -o /spider/local_data/tor-proxies.txt
<a href="https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt" target="_blank">https://raw.githubusercontent.com/X4BNet/lists_torexit/main/ipv4.txt</a>')<br>
31 * * * * spawn('curl -o /spider/local_data/proxies-exits.txt
<a href="https://lists.fissionrelays.net/tor/relays-ipv4.txt" target="_blank">https://lists.fissionrelays.net/tor/relays-ipv4.txt</a>')<br>
32 * * * * spawn('cat /spider/local_data/proxies-exits.txt >
/spider/local_data/tor-proxies.txt')<br>
33 * * * * spawn('sed -i "s|$|/32|"
/spider/local_data/tor-proxies.txt')<br>
<br>
<br>
4. Make sure the directory is created: /spider/cmd_import , if
not:<br>
mkdir /spider/cmd_import<br>
<br>
5. Make log directory:<br>
mkdir /spider local_data/bad_spotter <br>
<br>
6. The first time you want to run it, from the prompt:<br>
<br>
/usr/bin/perl -w /spider/local_cmd/<a href="http://bad_spotter.pl" target="_blank">bad_spotter.pl</a> &<br>
<br>
# End<br>
<br>
Example tail -f /spider local_data/bad_spotter/log.txt<br>
<br>
2022-09-12T14:01:53 [N9KT-2, RA1AL, 185.220.101.79, Politics and
HAMSPIRIT no mix!]<br>
2022-09-12T14:54:41 [N9KT-2, RA3ATX, 185.129.61.129, RU will
liberate the world!]<br>
2022-09-13T17:52:58 [PI4CC, PA2A, 77.171.80.188, ]<br>
<br>
Do not forget that it is a development version.<br>
<br>
73 de Kin<br>
<br>
Sysop EA3CV-2 & EA4URE-2,3,5</font><br>
<br>
</p>
<div>El 14/09/2022 a las 14:54, David
Spoelstra escribió:<br>
</div>
<blockquote type="cite">
<div dir="ltr">Joaquin-
<div>Yes, please, send me the script.</div>
<div>-David, N9KT</div>
</div>
<br>
<div class="gmail_quote">
<div dir="ltr" class="gmail_attr">On Wed, Sep 14, 2022 at 8:51
AM Joaquin via Dxspider-support <<a href="mailto:dxspider-support@tobit.co.uk" target="_blank">dxspider-support@tobit.co.uk</a>>
wrote:<br>
</div>
<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi
David,<br>
<br>
You have two more options:<br>
<br>
1. Enable for everyone:<br>
set/register<br>
set/password<br>
<br>
2. If you want I can send you a small script that will
automatically <br>
block any callsign that comes from the TOR network or is using
a PROXY.<br>
The script runs the set/bad/spotter command and logs the
callsign that <br>
has been blocked.<br>
It is a help, but it is not the definitive solution.<br>
<br>
Regards.<br>
<br>
Kin EA3CV<br>
<br>
El 14/09/2022 a las 14:35, David Spoelstra via
Dxspider-support escribió:<br>
> Seems like my cluster is being used for propaganda. I've
spent the <br>
> morning running "set/badspotter" and "set/badword"
commands. Is there <br>
> anything else I should be doing?<br>
<br>
_______________________________________________<br>
Dxspider-support mailing list<br>
<a href="mailto:Dxspider-support@tobit.co.uk" target="_blank">Dxspider-support@tobit.co.uk</a><br>
<a href="https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support" rel="noreferrer" target="_blank">https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support</a><br>
</blockquote>
</div>
</blockquote>
</div>
_______________________________________________<br>
Dxspider-support mailing list<br>
<a href="mailto:Dxspider-support@tobit.co.uk" target="_blank">Dxspider-support@tobit.co.uk</a><br>
<a href="https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support" rel="noreferrer" target="_blank">https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support</a><br>
</blockquote></div>