I’ve added the worlds first HTTP blacklist to this website.
DNS mail servers have been using IP blacklists for awhile now. If a know spammer IP address sends an email, a DNS mail server would reject any mail sent from that IP address. Due to this websites standing with Project Honey Pot (I’ll explain what this is later) we are eligible for the BETA for the HTTP:BL.
What HTTP:BL (stands for Hypertext Transfer Protocol : Black List) does it it checks your IP address (kind of like an house address for your computer on the internet) against a known list of Spammers, Hackers or other suspicious IPs. If your IP address is found to appear on the list AND it has a high probability of abuse then it doesn’t allow you to access this website.
But as a disadvantage every time you log onto the website it checks your IP against the list from a separate server. I’ve been told that this shouldn’t slow the website down any as HTTP:BL is still in BETA (hence not many people use it) and the HTTP:BL server is a dedicated server that is used only to check IP addresses.
But you never know…
Project Honey Pot is a neat little program designed to stop spammers before they even get your email address. The way it works is it battles with what is called “Spam Crawlers”. What those are is programs that are designed to go through the whole of the internet and find email addresses or other venues they can use to post spam (such as Wiki based dictionaries or blog comment sections). You can volunteer in various ways. If you have a website you can set up your own honey pot, if you have internet hosting, you can set up MX (mail exchange) entries. If you have neither of these you are given a website link that you post to wherever. Like it’ll work well in a message board as part of your signature as the code it uses makes it invisible to humans. In fact, in this page, the one you are reading this from, there is a link to
A honey pot is the bread of this operation. It is a website that is set up for the purpose of a spam crawler logging into it and finding an email (the MX entry) set up specifically for spammers to find. When they find the email address and send spam to it, Project Honey Pot knows which IP address got that specific email address and adds it to a list of spamming IPs, which goes to the HTTP:BL.
If your interested in what a Honey Pot looks like click here to find out. This is just a sample as our websites honey pot is hidden. It needs to stay somewhat hidden because we don’t want to have a large amount of traffic on it. But it’s set up the exact same, except the email address is hidden inside the source code of the website and the little graphic on the bottom doesn’t exist (because spammers could see the graphic and be programmed to skip that page).
If the honey pot is the bread of the operation, the MX entry would be the butter. What I’ve done is set up an email address (it’s some random text that the project decides each time @mini.perpliesfamily.info) that immediately forwards all received email to the Project Honey Pot server for IP identification.
But in any case, I’m all excited about it. We haven’t caught any spammers yet (it’s only been active for about 5 days) but I’ll let you know when we do.
And as I stated above, if the website seems particularly slow, let me know.