![]() |
Source of a lot of garbage, Host 85.88.2.200 Everyone block Host Number 85.88.2.200. This a vandal clogging up results constantly. Can we not kick this person off somehow? |
Why don't you post the portnumber as well so people can see for themselves. Or are we just suppose to take your word for it ??? And FYI a poll usually has options to vote both ways ;) |
2 for Germany, one for Switzerland. Sounds european but proxies can change all that logic. A step by step test is required then which I haven't run. If you feel so strongly about it, then ban that address. You can do that in your filters. It may well be a dynamic address, which means next week that user may have a different address. Perhaps totally different if via proxy. But then some sucker who adopts that address in turn finds they can't connect to many hosts because the ip they adopted for the week or few days is banned by many hosts. It's not as simple as it 1st seems. |
$ telnet -N 85.88.2.200 6346 Trying 85.88.2.200... Connected to 85.88.2.200. Escape character is '^]'. HEAD / HTTP/1.0 HTTP/1.1 200 OK Server: Shareaza 2.2.1.0 Remote-IP: x.x.x.x Connection: Keep-Alive Accept-Ranges: bytes X-PerHost: 5 X-Nick: Jironimo Content-Type: text/html Content-Length: 51324 'nuff said. |
Like the poll much better now :rofl: What to pick...hmm I do like Pizza ;) and the poll makes a little more sense now ;) And HyperKun I have no idea what the result of that was. Are you running Shareaza ? is He/they running Shareaza ? Tried that port in direct connect in Limewire (didn't work ???) Come Baack. Not nuff said :sos: |
Me running Shareaza? Are you trying to offend me? Why don't you Yahoogle for Jironimo? |
Not in any way trying to offend you :) Ty for the hint, so now it's clear that SnakefingerFan was kinda right in ranting a bit about that IP and setting up that onesided poll ;) |
Here are the ping results for the host. Don't know if this will do any good. Pinging 85.88.2.200 with 32 bytes of data: Reply from 85.88.2.200: bytes=32 time=142ms TTL=119 Reply from 85.88.2.200: bytes=32 time=141ms TTL=119 Reply from 85.88.2.200: bytes=32 time=166ms TTL=119 Reply from 85.88.2.200: bytes=32 time=154ms TTL=119 Ping statistics for 85.88.2.200: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss) |
Quote:
trivia for the day: what's that? (hint: I've been known to do it to ppl I'm really p!ssed at!) ***edit***ok, so I'm bored...tried the above, and no go...hmmmm...oh yeah, turns out this IP is already on my firewall's blocklist...roflmao..so it is safe (as far as I'm concerned) to assume this IP belongs to a father raping, seven fathered son of a wh0re... |
Oh the ping helps a lot! Somehow in some way. Or maybe not. Blocking this host in your firewall might not be a bad idea but it doesn't really help to filter the results from this host one bit. That's why using PeerGuardian is fairly useless for Gnutella (and just opens another can of worms). It's about time that the LimeWire developers return from hybernation and add such (unfortunately) essential features as *internal* support for IP block lists. And I'm not talking about such bullshit as "Right-Click->Block Host". If you wonder "why?". Simple, would you let a vet anyway near your guts? I, for one, wouldn't. The right solutions for the wrong problem never work. |
well...actually I was referring to my real firewall, not PG2...and said IP addy is already in there (for what reason, I surely don't remember, but its there)...so, I for one assume I manually put it there for some good reason at some point in time... as far as PG2, well it seems to do some good for me, at least as far as connections go..sure, if I'm sharing the bad guys get results with my IP addy, but I'm more concerned with blocking them from getting connected to my box in any way, at the very least as a download source for their version of the file (which I'm sure is corrupted)... and yes, the internal ability to create your own blocklist would be grand...though I'm not sure that would stop search results from being seen by the bad guys.. |
"search results being seen by the bad guys"? Huh, completely different movie. That's not my problem at all. I don't want to see or route results *from* the bad guys. The former isn't possible at all in Gnutella without a lot of modifications to the protocol and even then you can hardly expect to know all addresses of the "bad guys". I guess everybody has his own set of "bad guys" but with respect to this thread, your set has nothing to do with the issue at hand. What I wanted to say is that there are several ways to apply IP address filters and most of them are inappropriate. The problem with LimeWire is that it doesn't even block the most obvious spam. Other programs do a great job eradicating virtually 90% of all spam not for themselves (in the GUI) but for the whole network - without resorting to arcane, draconian filters causing tons of casualties that occur if you leave this task to the common user who does and does not have to have a clue how the protocol works. This may be an arms race, however, there's really nothing to lose but a lot to win. |
Here are the trace route results Tracing route to 85.88.2.200 over a maximum of 30 hops 1 23 ms 15 ms 15 ms 64.203.233.1.dial-pool-10.pool.hargray.net [64.2 03.233.1] 2 63 ms 67 ms 141 ms 64.203.253.9.unassigned-253.pool.hargray.net [64 .203.253.9] 3 273 ms 58 ms 59 ms 209.221.47.153 4 112 ms 259 ms * 209.221.47.10 5 * 69 ms 82 ms 4.78.210.25 6 121 ms 107 ms 200 ms ae-1-51.bbr1.Atlanta1.Level3.net [4.68.103.1] 7 136 ms 196 ms 140 ms ae-1-0.bbr1.Frankfurt1.Level3.net [212.187.128.3 0] 8 162 ms 132 ms 124 ms ae-22-52.car2.Frankfurt1.Level3.net [4.68.118.48 ] 9 147 ms 181 ms 211 ms 62.67.38.22 10 156 ms 153 ms 148 ms core-sto1-p1.netcologne.de [81.173.192.1] 11 196 ms 158 ms 162 ms rtgeman-sto1-g01.netcologne.de [81.173.192.114] 12 161 ms 180 ms 213 ms ge-bb-dea1.netcologne.de [81.173.192.166] 13 197 ms 327 ms 154 ms 195.14.228.42 14 170 ms 137 ms 136 ms backbone3-cgn.surfplanet.de [85.88.0.38] 15 160 ms 181 ms * 85.88.2.200 16 185 ms 183 ms 177 ms 85.88.2.200 Trace complete. |
The IP blocklist capability is now working in the LimeWire 4.13.0 Beta. Just drop the Fullsize Hostiles List into your .limewire folder. I've had 85.88.2.193-85.88.2.255 blocked since a major spammer moved there in November of 2005. :xeri_ok1ani: |
All times are GMT -7. The time now is 07:59 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
SEO by vBSEO 3.6.0 ©2011, Crawlability, Inc.
Copyright © 2020 Gnutella Forums.
All Rights Reserved.