| 
		
			
			
				
			
			
				 
			
			
				
			
		 | 
		
			
			
				 
			
				
			
		 | 
	||||
| 
				Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.  You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us.  | 
		
		 
		![]()  | 
	
		
			
  | 	
	
	
		
		|||||||
| Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. | 
| 
		 | 
	Thread Tools | 
| 
			
			 | 
		#1 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Jan 2012 
				Location: NC 
				
				
					Posts: 7,683
				 
				
				
				
				 | 
	
	
	
	
		
			
			 
				
				i need help in finding ip of website
			 
			ok some website is reverse proxying using nginx to my website. 
		
	
		
		
		
		
			how can i find its ip address ? current servers setup is like this. stealer -> my front end box -> my backend box i tried accessing phpinfo (); from his website, and got bunch of ip addresses, but none of them is his server ip what should i do ? Thanks for your time. is there some script/code if i put it on my backend box , and access it from stealer 's website, i will get his server's ip address ? thanks 
				__________________ 
		
		
		
		
	
	SSD Cloud Server, VPS Server, Simple Cloud Hosting | DigitalOcean 
			 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#2 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Join Date: Dec 2006 
				
				
				
					Posts: 1,497
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 1. put up some shit html page only you know on your site like: 
		
	
		
		
		
		
			http://www.your site.com/ lets-see-the-hacker.html 2. access that html on copycat site www.copycatsite.com/lets-see-the-hacker.html 3. check IP in server logs 
				__________________ 
		
		
		
		
	
	¤´¨) ¸.•´¸.•*´¨) ¸.•*¨) (¸.•´ (¸.•`¤ICQ:491 496 482  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#3 | |
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Jan 2012 
				Location: NC 
				
				
					Posts: 7,683
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 thanks, 
				__________________ 
		
		
		
		
	
	SSD Cloud Server, VPS Server, Simple Cloud Hosting | DigitalOcean 
			 | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#4 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Join Date: Dec 2006 
				
				
				
					Posts: 1,497
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 you can look around the forum (I wrote more on this issue..) 
		
	
		
		
		
		
			my problem is that a shitload of clone sites copy my shit and spoof shit around, and even though I'm pretty sure they are doing damage to me (google..) - there is no real way to combat it problem being, by the time you figure out you've been copied, google has already indexed the shit out of it and it is pretty much stuck in their system as duplicate content and so on and so on...... tldr - no real way to combat it, it is up to google to finally decide to start rewarding ORIGINAL (first instance) content, instead of "strongest" (most backlinks and shit) but anyway, good luck 
				__________________ 
		
		
		
		
	
	¤´¨) ¸.•´¸.•*´¨) ¸.•*¨) (¸.•´ (¸.•`¤ICQ:491 496 482  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#5 | |
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Jan 2012 
				Location: NC 
				
				
					Posts: 7,683
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 
				__________________ 
		
		
		
		
	
	SSD Cloud Server, VPS Server, Simple Cloud Hosting | DigitalOcean 
			 | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#6 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Join Date: Dec 2006 
				
				
				
					Posts: 1,497
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 1. if your site is using cloudflare - stop using it 
		
	
		
		
		
		
			2. blacklist all cloudflare ips on your server 
				__________________ 
		
		
		
		
	
	¤´¨) ¸.•´¸.•*´¨) ¸.•*¨) (¸.•´ (¸.•`¤ICQ:491 496 482  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#7 | |
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Jan 2012 
				Location: NC 
				
				
					Posts: 7,683
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 what i need to do is install Module ngx_http_realip_module then i can see real ips in my server logs instead of cloudflare ips . 
				__________________ 
		
		
		
		
	
	SSD Cloud Server, VPS Server, Simple Cloud Hosting | DigitalOcean 
			 | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#8 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Jan 2012 
				Location: NC 
				
				
					Posts: 7,683
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 okay, iset up custom log format in nginx and restarted nginx and boom, found his ip address 
		
	
		
		
		
		
			Code: 
	log_format main '$http_x_forwarded_for - $remote_user [$time_local] "$host" "$request" '
            '$status $body_bytes_sent "$http_referer" '
            '"$http_user_agent" $request_time';
Code: 
	access_log /var/logs/nginx/access.log main; 
				__________________ 
		
		
		
		
	
	SSD Cloud Server, VPS Server, Simple Cloud Hosting | DigitalOcean 
			 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#9 | 
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Jan 2012 
				Location: NC 
				
				
					Posts: 7,683
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 motherfucker using 100+ ips to send curl requests.,  
		
	
		
		
		
		
			so far i have banned 90 ips , and found 100 new ips. looks like he is rotating 1k+ proxy ip addresss to scrape my site. 
				__________________ 
		
		
		
		
	
	SSD Cloud Server, VPS Server, Simple Cloud Hosting | DigitalOcean 
			 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#10 | |
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Join Date: Dec 2006 
				
				
				
					Posts: 1,497
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 like I said earlier, I'm having this problem for years and years now and I took a lot of fuckers down through various tricks but I am yet to discover a 100% solution to it I even tried asking prominent googlers on twitter and such about that issue (10+ questions) and they ignored every single one of them. THEY KNOW about that issue, they just can't fix it, not with current way google works 
				__________________ 
		
		
		
		
	
	¤´¨) ¸.•´¸.•*´¨) ¸.•*¨) (¸.•´ (¸.•`¤ICQ:491 496 482  | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#11 | 
| 
			
			
			
			 Too lazy to set a custom title 
			
		
			
			
			Join Date: Mar 2002 
				Location: Australia 
				
				
					Posts: 17,393
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 If you want to more aggressively block IPs, you can find a number of lists here: 
		
	
		
		
		
		
		
	
	FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation Be aware that there's going to be some collateral damage - for example, it's going to catch legit surfers using a VPN that also funnels a lot of abuse - but if you block aggressively for a few days it may be enough to make the cloner decide to move on. Another option is to look at a much lower level to find patterns in the request headers. Most scrapers don't bother to perfectly mimic a browser, so they stand out like a sore thumb when you view the complete HTTP request.  | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#12 | 
| 
			
			
			
			 Confirmed User 
			
		
			
			
			Industry Role:  
				Join Date: Oct 2017 
				
				
				
					Posts: 302
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Since you are using cloudflare, you should enable "I'm under attack" mode, which will show a captcha for proxy/VPN ips and all other unusual requests. 
		
	
		
		
		
		
			
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#13 | 
| 
			
			
			
			 Too lazy to set a custom title 
			
		
			
			
			Join Date: Mar 2002 
				Location: Australia 
				
				
					Posts: 17,393
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 One other tip regarding HTTP headers. If the scraper is using assorted open proxies, some of those proxies will leak the real IP of the server via headers such as X-Forwarded-For, X-Real-IP, Client-IP, etc. Since the IP of the server is unique the presence of this can be used to automatically ban proxies. 
		
	
		
		
		
		
		
	
	 | 
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 | 
| 
			
			 | 
		#14 | |
| 
			
			
			
			 Confirmed User 
			
		
			
				
			
			
			Industry Role:  
				Join Date: Jan 2012 
				Location: NC 
				
				
					Posts: 7,683
				 
				
				
				
				 | 
	
	
	
	
		
		
		
		 Quote: 
	
 thanks. 
				__________________ 
		
		
		
		
	
	SSD Cloud Server, VPS Server, Simple Cloud Hosting | DigitalOcean 
			 | 
|
| 
		 | 
	
	
	
		
                 
		
		
		
		
		
		
		
			
			
		
	 |