General question: What can be done to prevent Tor or Anonymeister users from hitting my site?

Posted on 2010-01-12
Medium Priority
Last Modified: 2013-11-16
Does anyone know the server addresses for the service called Anonymeister or the Tor? I basically want to block anyone that uses their servers to hide their IPs from accessing my systems. I don't need cyber criminals and their friends.



Question by:Sarge516
LVL 14

Assisted Solution

top_rung earned 200 total points
ID: 26301014
I think you are going to have a hard time at this, but at the least, this information might help...


and the blacklist offered at the bottom of that page is ...

LVL 66

Accepted Solution

btan earned 800 total points
ID: 26301380
This article will cover your queries (and more). See the section on "How to block TOR" and "How to block Port Proxies or SOCKS proxies"

@ http://success.grownupgeek.com/index.php/2009/08/22/how-block-proxies/

Probably for suspected IP's you can do a whois on the IP they're coming from. If the IP shows as being owned by valid ISPs, the chances are low that it is a web-proxy. If the whois says the IP belongs to a server, or a hosting company, chances are high, it is a web-proxy. The link shared by top_rung has good resource on the web proxy.

More useful ref to blacklisting
1) Identifying the TOR exit node @ http://stackoverflow.com/questions/1000924/ may help too by .
2) use DNSBL @ http://www.sectoor.de/tor.php#en-usage

Author Closing Comment

ID: 31676503
I appreciate the info. Thanks!

Featured Post

SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

616 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question