GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    anime graf mays ?️? (graf@poa.st)'s status on Wednesday, 06-Dec-2023 20:10:26 JSTanime graf mays ?️?anime graf mays ?️?
    • นาตาลี :bellsystem:
    • Dave Rand
    sharing this in the event some of you instance admins haven't seen it. i checked ours, he's using the user agent string "unshortenit 0.4.0" and has been hammering at the rate of 5r/s since 01/Dec/2023:00 :28:46 +0000

    ive blocked the user agent string and blackholed the ip. apparently this guy @Drand was given grant money to do this and is conducting himself in a malicious manner. perhaps some of that grant money should be given to instance operators

    RT: https://nya.social/notes/818c3d1bdb3e20788eb08e25
    In conversationWednesday, 06-Dec-2023 20:10:26 JST from poa.stpermalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: nya.social
      anatil e\x9f\xf0\xbc\xa5n lu\x00l (@natalie)
      there is currently a bot inside MIT IP space, address `18[.]4[.]38[.]176`, scanning fedi at large. i have confirmed this with 5+ unrelated instance admins, large and small instances, across mastodon/misskey/pleroma/akkoma. the bot is poorly behaved. i have observed it making repeated requests, multiple times per second, for the exact same paths (the paths being, generally: user profiles, specific posts, and sometimes following links in posts). returning 403s does not stop this activity. one of my domains received hundreds of additional requests despite replying with 403 to all of them. i have also seen it make requests for paths containing html tags - seems like a badly written parser. the purpose of these requests and what data is being gathered is unclear. PTR on the ip returns `sts-drand03.mit.edu`. a quick web search for "mit drand" brings back https://mitsloan.mit.edu/faculty/directory/david-g-rand and his personal website: https://davidrand-cooperation.com/ (note: other IPs in the /24 also have names in the PTR which match up with names of MIT faculty, but only the .176 IP appears to be involved in this activity). seems he's doing research into "misinformation" and "fake news" on social media. he also appears to be on fedi! so @Drand@techhub.social, given this activity is sourced from an IP with your name on it, could you share the purpose of this traffic? what data is being collected and how is it being used? do you plan to respect robots.txt or identify yourself in your useragent? is there a process for instance admins to opt out of this activity other than blocking the source IP?
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.