General question: What can be done to prevent Tor or Anonymeister users from hitting my site?

Posted on 2010-01-12
Medium Priority
Last Modified: 2013-11-16
Does anyone know the server addresses for the service called Anonymeister or the Tor? I basically want to block anyone that uses their servers to hide their IPs from accessing my systems. I don't need cyber criminals and their friends.



Question by:Sarge516
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 14

Assisted Solution

top_rung earned 200 total points
ID: 26301014
I think you are going to have a hard time at this, but at the least, this information might help...


and the blacklist offered at the bottom of that page is ...

LVL 64

Accepted Solution

btan earned 800 total points
ID: 26301380
This article will cover your queries (and more). See the section on "How to block TOR" and "How to block Port Proxies or SOCKS proxies"

@ http://success.grownupgeek.com/index.php/2009/08/22/how-block-proxies/

Probably for suspected IP's you can do a whois on the IP they're coming from. If the IP shows as being owned by valid ISPs, the chances are low that it is a web-proxy. If the whois says the IP belongs to a server, or a hosting company, chances are high, it is a web-proxy. The link shared by top_rung has good resource on the web proxy.

More useful ref to blacklisting
1) Identifying the TOR exit node @ http://stackoverflow.com/questions/1000924/ may help too by .
2) use DNSBL @ http://www.sectoor.de/tor.php#en-usage

Author Closing Comment

ID: 31676503
I appreciate the info. Thanks!

Featured Post

Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Read about achieving the basic levels of HRIS security in the workplace.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question