On 5/20/21 1:29 PM, tastytea wrote:
> On 2021-05-20 11:20-0600 the...@sys-concept.com wrote:
> 
>> It seems to me IPv4 is broken beyond repair.
>> I'm trying to block spammers but they rewrite the source IP (that is not
>> checked) so it is impossible to block them. Example below is from a
>> single source:
>>
>> 189.142.216.209 - - [20/May/2021:09:49:29 -0600] "GET /contact_us.php
>> HTTP/1.0" 200 25552 82.79.97.137 - - [20/May/2021:09:49:31 -0600]
>> "GET /vvc_display.php?vvc= HTTP/1.0" 200 4149 202.138.252.59 - -
>> [20/May/2021:09:49:33 -0600] "POST /contact_us.php?action=send
>> HTTP/1.0" 302 13 91.235.177.140 - - [20/May/2021:09:49:35 -0600] "GET
>> /contact_us.php?action=success HTTP/1.0" 200 24031 41.82.36.214 - -
>> [20/May/2021:09:49:37 -0600] "GET /contact_us.php HTTP/1.0" 200 25725
> 
> As long as the website is find-able by search engines, it doesn't
> matter if it is IPv4 or IPv6.
> A good measure against non-targeted spam is a hidden input field with
> the name “url”. If the bot put anything in that field, throw it out.
> Simple math captchas (like “what is 2 + 3?”) work well too.
> If the spam is targeted, you'll probably need a more advanced captcha
> solution.
> 
> See also:
>   <https://nearcyan.com/you-probably-dont-need-recaptcha/>
>   
> <https://www.nfriedly.com/techblog/2009/11/how-to-build-a-spam-free-contact-forms-without-captchas/>
> 
> Kind regards, tastytea
> 

Simple math captchas  might work, but I have to find out how to implement it 
into current php e-mail form.

Reply via email to