On 5/20/21 1:29 PM, tastytea wrote: > On 2021-05-20 11:20-0600 the...@sys-concept.com wrote: > >> It seems to me IPv4 is broken beyond repair. >> I'm trying to block spammers but they rewrite the source IP (that is not >> checked) so it is impossible to block them. Example below is from a >> single source: >> >> 189.142.216.209 - - [20/May/2021:09:49:29 -0600] "GET /contact_us.php >> HTTP/1.0" 200 25552 82.79.97.137 - - [20/May/2021:09:49:31 -0600] >> "GET /vvc_display.php?vvc= HTTP/1.0" 200 4149 202.138.252.59 - - >> [20/May/2021:09:49:33 -0600] "POST /contact_us.php?action=send >> HTTP/1.0" 302 13 91.235.177.140 - - [20/May/2021:09:49:35 -0600] "GET >> /contact_us.php?action=success HTTP/1.0" 200 24031 41.82.36.214 - - >> [20/May/2021:09:49:37 -0600] "GET /contact_us.php HTTP/1.0" 200 25725 > > As long as the website is find-able by search engines, it doesn't > matter if it is IPv4 or IPv6. > A good measure against non-targeted spam is a hidden input field with > the name “url”. If the bot put anything in that field, throw it out. > Simple math captchas (like “what is 2 + 3?”) work well too. > If the spam is targeted, you'll probably need a more advanced captcha > solution. > > See also: > <https://nearcyan.com/you-probably-dont-need-recaptcha/> > > <https://www.nfriedly.com/techblog/2009/11/how-to-build-a-spam-free-contact-forms-without-captchas/> > > Kind regards, tastytea >
Simple math captchas might work, but I have to find out how to implement it into current php e-mail form.