Blocklist scraping by fash 

So this has been an ongoing issue, would love it if people found the earlier threads about it for more context cause I don't have the spoons right now

Originally written by "mint", hosted on the kiwifarms git is a tool that continuously scrapes publicized instance blocklists to allow searching who has you blocked (resulting in emails like uwu we did nothing wrong how dare you block our instance)

Through correlation, turns out the main IP being used by fba.ryona.agency is `54.37.233.246`. Blocking that at the firewall level prevents them from getting any new data.

Other instances exist too though, being hosted on
`23.24.204.110`, `45.86.70.49`, `88.65.6.124`, `187.190.192.31`

the drow.be / bka.li / teleyal.blog / mooneyed.de "kromonos" user has their own version, that feeds an API that gives your instance a highscore for blocking their shit, scrapes from `185.244.192.119`, with user agents presenting as random instances

These, and other scrapish ip's are also listed in git.pixie.town/f0x/nixos/src/b

Follow

:boosts_ok_gay:​ toot/blocklist scraping info request 

can other server admins grep their logs for `159.196.229.70`, they seem to be doing mass scraping of public timelines, toots and blocklists.
from an Australian residential ip?

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

also `2a01:4f8:162:6027::2`, with user-agents "Ruby, mastodon 0.1.1" or "mastodon_stream v0.1"

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

If so, you can send an abuse report to abuse@aussiebroadband.com.au, regarding ips `159.196.229.70` and `2a01:4f8:162:6027::2`. One of my servers shows scraping access logs going back to at least December 2022

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

@f0x I see both here - not a lot of requests per day, but I'm a single-user instance and I haven't checked if they just scrape any of my posts.

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

@f0x Wasn't there someone out there actively mapping scrapers? Unfortunately I don't remember who that was and finding things in Mastodon ... oh well.

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

@f0x It's been a couple of days since that reply, but I just now remembered that ScraperSnitch was what I was thinking of: bentasker.co.uk/posts/blog/sec

(Note that @scrapersnitch posts as followers-only, so there's nothing to be seen on the public profile.)

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

@f0x Looks like AbuseIPDB has quite a few reports from 3 months ago. https://www.abuseipdb.com/check/1...

As for my own instance (Akkoma 3.9.3-28), I don't see any connections from there but I will be keeping an eye out for connections from "AS4764 WIDEBAND-AS-AP Aussie Broadband" :googlebear:

re: :boosts_ok_gay:​ toot/blocklist scraping info request 

@f0x I'm getting a few hits from that IP every day of the last week or so, user agent "Ruby, mastodon 0.1.1" and always for URL /api/v1/statuses/110575362477129505 (which is, ironically enough, a post about blocking.) Not enough to suggest reporting abuse from my side.

Sign in to participate in the conversation
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.