[TAC] Fool Bot Honey Pot

[TAC] Fool Bot Honey Pot [Paid] 3.0.32

No permission to buy ($29.00)
Thanks. What mechanism did FBHP use to capture this registration, that XF's user registration timer (I have 10 sec's) would not have?

Code:
FoolBotHoneyPot Logs
Delete...
Registration Too Fast, Bot detection by Browser Mechaisms,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
19 minutes ago : 203.45.150.77:51539
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36 Edge/14.14393
Time taken to register: 0 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 0
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: flash=24
Bot Detected On StopBotters: FALSE
Code:
FoolBotHoneyPot Log
sf_log_info
Registration Too Fast, Bot detection by Browser Mechaisms, FoolBotHoneyPot: Detected As A Bot - Registration Blocked
22 minutes ago
IP Address: 203.45.150.77:51539
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36 Edge/14.14393
Basic Proxy Detection: No Proxy Detected
JavaScript Enabled: TRUE
Browser Plugins Detected: flash=24
Altered Hidden Fields
Registration Errors
0 => sorry_you_must_wait_longer_to_create_account
fbhp_sec2 => foolbothoneypot_sorry_youve_been_detected_as_an_automated_program secret ingredient 2
 
Many of fbhp mechanisms wont be discussed publicly (ever again). I do not want the core (or anyone else) to copy me again, for the sake of stopping spam progressing (and my own efforts being wasted).

Time taken to register: 0 (that is the core catching it, not fbhp)
Bot detection by Browser Mechanisms (that's fbhp catching it with browser based mechanims)

If you click that user and send me a message via pm, posting the fingerprint, I should be able to tell you why it was caught (0 secs suggest it was obviously correct to catch it).

It's a js enabled bot, and bypasses classical honeypots, so it's one I would be interested in (these types usually get pass the core timer too, but not fbhp non classical mechanisms)

It's also been picked up on project honey pot
https://www.google.co.uk/webhp?sour...30&ion=1&espv=2&ie=UTF-8#q=ip+203.45.150.77&*

(this might be a logging issue that I need to fix "Detected as Browser Bot: FALSE").

"Detected as Browser Bot" is a whole bunch of unique mechanisms, I do not look at the registration timer or classical honeypots to detect these types of bots
 
Last edited:
Ah ha, found the logging issue (and the typo, thanks)

Bot detection by Browser Mechaisms ... will still work, it's just it will report it in the log as:
Detected as Browser Bot: FALSE

(I was setting it to the value of Detected as Semi Automation), but it's only a logging issue, no need for an immediate fix (You can tell it's getting caught by Browser Mechanisms from the title)
 
Finding the FPHB logs very confusing.

This appears to show a user initially allowed, and then blocked 7 times immediately afterwards. Why firstly allowed and then blocked? No user account exists for the initially allowed registration.
Code:
Hidden Fields Modifed,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 18:06 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 20 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 5
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

Hidden Fields Modifed,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 18:06 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 28 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 6
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

Hidden Fields Modifed,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 18:05 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 26 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 5
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

Hidden Fields Modifed,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 18:05 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 52 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 6
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

Hidden Fields Modifed,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 18:04 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 26 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 6
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

Hidden Fields Modifed,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 18:04 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 39 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 5
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

Hidden Fields Modifed,
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 18:03 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 32 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 6
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

No Bot Triggers Found
FoolBotHoneyPot: Detected As Human - Registration Allowed
Today at 18:02 : 58.106.194.58:51239
Username: SirPavlova
Email: gt@avolvapris.info
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time taken to register: 44 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 0
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

This appears to show a user initially blocked, and then allowed 3 times immediately afterwards. Why firstly blocked and then allowed? No user account exists for the allowed registrations.
Code:
No Bot Triggers Found
FoolBotHoneyPot: Detected As Human - Registration Allowed
Today at 17:55 : 14.200.55.190:60951
User Agent: Mozilla/5.0 (Linux; Android 4.4.4; SM-G7508Q Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Mobile Safari/537.36
Time taken to register: 75 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 0
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

No Bot Triggers Found
FoolBotHoneyPot: Detected As Human - Registration Allowed
Today at 17:54 : 14.200.55.190:60951
Username: Anwar123l
Email: h14haidaralijagori@hotmail.com
User Agent: Mozilla/5.0 (Linux; Android 4.4.4; SM-G7508Q Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Mobile Safari/537.36
Time taken to register: 30 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 0
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

No Bot Triggers Found
FoolBotHoneyPot: Detected As Human - Registration Allowed
Today at 17:53 : 14.200.55.190:60951
Username: Mohammad
Email: h14haidaralijagori@hotmail.com
User Agent: Mozilla/5.0 (Linux; Android 4.4.4; SM-G7508Q Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Mobile Safari/537.36
Time taken to register: 50 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 0
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE

Hidden Fields Modifed, 
FoolBotHoneyPot: Detected As A Bot - Registration Blocked
Today at 17:53 : 14.200.55.190:60951
Username: Mohammad
Email: h14haidaralijagori@hotmail.com
User Agent: Mozilla/5.0 (Linux; Android 4.4.4; SM-G7508Q Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Mobile Safari/537.36
Time taken to register: 42 (seconds)
JavaScript Enabled Browser: TRUE
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE
Core Classical Honeypots: 0
FBHP Classical Honeypots: 1
Basic Proxy Detection: No Proxy Detected
Browser Plugins Detected: None
Bot Detected On StopBotters: FALSE
 
Just because it is allowed, it doesn't mean that it got in (for instance, it may have not completed the registration form)

Also, if it is not detected as a bot, I can't log the captcha process.
If it is bot detected, I can log the captcha process.

Once it has triggered enough flags, only then can I lock it out of the system, for instance:
Code:
($isBot != false || $isBotSec1 != false || $isBotSec2 != false || $isBotSec3 != false) && (count($isBot) > 6 || $timeTakeToRegister < 25 ))
            ||
            (($isBotSec1 != false || $isBotSec2 != false || $isBotSec3 != false) && ($isBot || !$javascript_enabled))
- I might lock this down further once we have more info about the new bots.

So they have to trigger one of the new bot detection mechanisms and (either 6 hidden fields, less that 25 secs or no javascript)
The combination of these really tells me its a bot, so I can lock it out of the system
- I do not ever want to lock out real human users, so I have to be very sure... this was far easier in the past


The First Bot


So the first bot you mentioned, is a js enabled bot
at first it got caught by fghp honeypots:
FBHP Classical Honeypots: 5
... but, it is js enabled, bypassed the core honeypots, and bypassed the registration timer, and gets passed APIs

.. These bots to me are the most fascinating, they are part of the new wave of bots.... but I sniff them and learn from them (you need to send me the finger print)

We never new these bots existed, not for certain, not until I started logging them. Now we have proof, bots exists that are js enbabled, bypass the reg timer, bypass apis and bypass core honepots
- This should worry you. and rightly so

It has also got passed
Detected as Non Browser Bot
Detected as Browser Bot
Detected as Semi Automation


But the finger print will tell us more, if you send me the finger print of that 1st bot, we can lock it out for everyone by adding its information to one of these:
Detected as Non Browser Bot
Detected as Browser Bot
Detected as Semi Automation


You understand, I can not lock bots out even if I catch them, I have to be sure..... with the logging information and fingerprint, I can be sure
I do not ever want to hit false positives, especially false positives that prevent the user from contacting you.
At the moment, if ever there is a false positive (there wont be), the user can still get to the contact form and let you know, and you can then let me know, this is how we can be certain that we never run into false positives (that re-attempting password manager user was a good example of that, if I had locked them out, they would not have been able to turn their password manager off and reattempt).

The Second Bot

Firstly, what proof do you have that it really is a second bot
Botters have thousands of IP addresses at their disposal, infinite emails and usernames (that they spin)


see ip address at 2:37, and spun usernames at 2:13
To view this content we will need your consent to set third party cookies.
For more detailed information, see our cookies page.

But lets for argument sake, say it is a second bot (it's strategy seems to suggest it is)

It's first few strategies are fairly good strategies, it's not getting picked up by core or my honeypots, its bypassing the reg timer, avoids apis is js enabled and is looking at the form for responses
- I guess you could call it a smart bot

Its testing the system, playing with it, touching the fields and trying to figure out from the responses where it should place its values
It's not a stupid bot that just splats the values anywhere, it also seems to be cautious (and rightly so, since If I catch it, it gets locked out).

If you click on each of those logs, you might find that it is still triggering errors, like (has not completed the username)
- if no errors, then what it is failing on is the captcha, which I have no way of recording for bots that don't get detected.


Eventually, from trial and error, it does get picked up by one of my honeypots

-Both of these bots I can learn from, both of these bots are highly interesting to me, please send the fingerprints to me for both, we can then lock them out in the future.
if you have bots that bypass these
Detected as Non Browser Bot: FALSE
Detected as Browser Bot: FALSE
Detected as Semi Automation: FALSE

Always send the finger prints to me, i have methods of improving way beyond ever before, but I do need these fingerprint logs



There are many bots in the wild, the most prolific ones are GSA and Xrumer, but there are a vast number of headless browsers, selenium and custom made bots
Different bots have different strategies, This is why you are seeing different things happen with different bots (it is not a fault of the logging process, various bots just do different things)

...I am investigating them all.
 
Last edited:
Just picked up and detected an new type of bot, one that I didn't know about until now:

This is a js enabled browser based bot, avoids the core honey pots and avoids the registration timer:

ubot: https://ubotstudio.com/site/

We were already detecting it with a general FBHP mechanism, now we have a more direct detection mechanism and can tell exactly what bot it is

If anyone has a lot of bot logs (espcailly from js enabled bots) and wouldn't mind gving me access to look at the logs, it would probably really help.


_ I'll added the ubot direct detection into the next version
 
Last edited:
I'm starting to find a lot of real users are getting caught on the latest version. Even tested it myself and got caught:

Code:
Bot detection by Non Browser Mechaisms, FoolBotHoneyPot: Detected As A Bot - Registration Blocked
15 minutes ago
generated_by_username_attempt: SnookTEST
generated_by_email_attempt: info@[domain removed]
IP Address: 0.0.0.0:24141  [IP Blanked]
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36
Time Taken To Register: 49 (seconds)
Basic Proxy Detection: Proxy Headers Found: $_SERVER[HTTP_X_FORWARDED_FOR]: 0.0.0.0
JavaScript Enabled: TRUE
Browser Plugins Detected: flash=24

Is it possible its a bit over sensitive? Any settings recommend to tweak?

Code:
Windows Width: 1355
Windows Height: 1050
Platform: Win32
appCodeName: Mozilla
onLine: true
Form Char Count: 36
Password Count: 0
JS userAgent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/56.0.2924.87 Safari/537.36

Mar 14, 2017 :
clickcount: 2
tapcount: 0
keypresscount: 27
keyupcount: 29
mousemovecount: 74

1489514744464 mousemove:577/587
1489514744472 mousemove:573/590
1489514744478 mousemove:570/592
1489514744486 mousemove:566/594
1489514744495 mousemove:564/596
1489514744503 mousemove:562/596
1489514744512 mousemove:560/598
1489514744518 mousemove:558/599
1489514744529 mousemove:554/600
1489514744587 mousemove:553/600
1489514744592 mousemove:552/600
1489514744599 mousemove:551/600
1489514744606 mousemove:547/602
1489514744631 mousemove:546/602
1489514744637 mousemove:544/602
1489514744645 mousemove:543/603
1489514744653 mousemove:542/604
1489514744661 mousemove:540/605
1489514744678 mousemove:540/606
1489514744686 mousemove:538/607
1489514744694 mousemove:538/609
1489514744702 mousemove:536/611
1489514744710 mousemove:535/614
1489514744718 mousemove:534/616
1489514744727 mousemove:532/618
1489514744741 mousemove:532/620
1489514744744 mousemove:532/623
1489514744751 mousemove:532/624
1489514744761 mousemove:532/626
1489514744767 mousemove:531/627
1489514744775 mousemove:531/629
1489514744783 mousemove:531/630
1489514744791 mousemove:531/631
1489514744799 mousemove:531/631
1489514745097 mousemove:531/631
1489514745103 click:[object HTMLInputElement]
1489514745106 mousemove:531/632
1489514745776 keypress:x
1489514745919 key_up:y
1489514745920 keypress:x
1489514746037 key_up:y
1489514746106 keypress:x
1489514746207 key_up:y
1489514746993 keypress:x
1489514747105 key_up:y
1489514747327 keypress:x
1489514747468 key_up:y
1489514747531 key_up:y
1489514747839 keypress:x
1489514747942 keypress:x
1489514747963 key_up:y
1489514748030 key_up:y
1489514748171 keypress:x
1489514748225 key_up:y
1489514748334 keypress:x
1489514748391 keypress:x
1489514748438 key_up:y
1489514748504 key_up:y
1489514748567 keypress:x
1489514748656 key_up:y
1489514748687 keypress:x
1489514748814 key_up:y
1489514748816 keypress:x
1489514748894 key_up:y
1489514749012 keypress:x
1489514749106 keypress:x
1489514749126 key_up:y
1489514749224 key_up:y
1489514749256 keypress:x
1489514749339 keypress:x
1489514749358 key_up:y
1489514749423 key_up:y
1489514749441 keypress:x
1489514749539 keypress:x
1489514749566 key_up:y
1489514749623 key_up:y
1489514749719 keypress:x
1489514749824 key_up:y
1489514749879 keypress:x
1489514749957 key_up:y
1489514749988 keypress:x
1489514750072 key_up:y
1489514750103 keypress:x
1489514750189 key_up:y
1489514750273 keypress:x
1489514750372 key_up:y
1489514750388 keypress:x
1489514750472 key_up:y
1489514750487 keypress:x
1489514750589 key_up:y
1489514750807 key_up:y
1489514752774 mousemove:531/635
1489514752784 mousemove:531/639
1489514752791 mousemove:533/645
1489514752800 mousemove:534/652
1489514752807 mousemove:536/659
1489514752808 mousemove:539/672
1489514752824 mousemove:540/677
1489514752840 mousemove:542/682
1489514752847 mousemove:544/686
1489514752856 mousemove:545/691
1489514752863 mousemove:547/695
 
Last edited:
okay, that non browser based mechanism wont be possible to get triggered by humans in the next version (it's a bit strange its getting triggered at all), it's the issue I mentioned to @Mouth in pms ( I thought it was extremely rare, no idea how this is reproducible).

I've added an extra condition for the browser based detection, it makes it no less sensitive to bots, but should be impossible for humans to get detected by it

I wanted to catch a few more different types of bots before sending out the next version, but I'll send out the update now
 
Last edited:
tenants updated FoolBotHoneyPot Bot Killer: Spam Combat with a new update entry:

improved non browser bot detection, re-added registration error logs, password managers, new mechs

* Turned off non browser bot detection for js enabled users. Non browser bots are never js enabled and this solves an issue seen with McAfee IP Masking.
* Found out why registration errors weren't always logged .. fixed
* Added an option to add password managers (but the core might still have issues with these)
* Started added new mechanisms to target particular bots (not just general mechanism)

Read the rest of this update entry...
 
That will fix it,

update is here:
http://www.surreyforum.co.uk/thread...th-a-custom-registration-page.1621/#post-2400

how on earth you triggered the "Non Browser Mechaism" is beyond me, I'll look at it a bit closer, but that should be "impossible" to do with a browser...

I now just avoid this detection method for any users with js enabled, non browser based bots are always js disabled, I'll still have a tinker with it to see if it needs improving, if only I could give the details, things would be a lot easier.

There are lots of mechanisms for these new js enabled bots, the js disabled bots a very easy to catch anyway, the new bots are a lot harder
 
@Snook looks like that version of fbhp you were using is a few versions old (pre 3.1.17), I think I'll start adding the fbhp version in the logs to make things a bit easier for me.


I'm not a fan of tweaking settings and scoring values, we either have a good mechanism that works or we have one that only sometimes works and sometimes produces false positives, the later is almost pointless.

The intention of fbhp is for it to work without tweaking, produce no false positives, catch 100% of bots and not be noticeable by humans. All of these mechanism should be impossible to hit by humans, for instance, in your above examples, since you have no password set, I wouldn't even bother doing the check for browser based mechanisms (and you wouldn't have been caught by that detection mechanism anyway)

I still have a bit of work to do (like fixing the above issue, avoiding it for js users goes quite a way for this), but I'm getting there (It was so much easier before the core plumped part of the old version of this plugin into the core).
 
Last edited:
We are getting an unusually high amount of human spammers. About 5 spammers a day go on a spree. They wait until no staff is online. We never had this on vbulletin.

Feature requests:
  1. Statistics: Spam Cleaner use
    This will let us compare how much is getting through and how much is getting caught.
  2. re-Check new accounts with SFS after X days.
    They are using clean accounts for mass registration and start spamming with those accounts later. We need a periodic scan for accounts with less than X posts against the SFS database.
 
Are you using stopHumanSpam... it's pretty good a stopping human spam, looking for things like links / "sneaky" urls by scanning their content, and optionaly prevents them from adding sneaky account links (which isn't always noticed by forum admin)
FoolBotHoneyPot targets bots

However, this holding back for x days is something bots are doing now to avoid APIs,
I hate to ask it, since I know you are using FBHP, but are you certain they are human?

Usually people argue that their mechanism is so good, it cant possible be a bot, but this new wave of bots are very tricky, I'm not putting anything pass them yet, I've still work to do until I'm certain FBHP is back up to it peak. FBHP does a lot, the level of checking is deep, and the number of mechanisms is growing, the different types of bots it catches with genral mechanims is wide, and I'm adding to the spercific mechanims the more I learn about them, but I have a certain level of respect for these new bots, they are nothing like the old bots
 
Last edited:
We do manual moderation of all new accounts. Our non-standard Profile fields need to describe specific niche related details. All accounts that are not approved are deleted or deferred. We are not seeing a pattern in it. (yet)
On vb practically nothing got through.
Spam is very much niche specific. Its definitely automated, but it seems human due to them getting the profile fields right and are putting unique details in there that aligns with niche slang.
 
@Alfa1
It's not a vb vs xf thing, it this last few months, bots have evolved quite a leap since Jan 2017, I thought it would take 3-6 months for people to start noticing, and here we are at 3 months, I think people have started to noticed but not realised that they are seeing bots. This was the reason for me bring back fbhp to life, I know I have a lot of anti-bot experience to beat them (I have a lot of automation experience... all white hat of course).

If you can send me the logs of these suspect human spammers, I might be able to tell you if they are bots and thus improve fbhp, I might never be able to confirm they are definitely human
PM me the fingerprints, they are really very useful to me

Logging here is essential, there are so many types of bots, my forums don't catch them all
The latest version fbhp 1.3.20 tells me a lot more than earlier versions, but fingerprints from earlier version might go some way to help

To current date, for spam, it is more likely and thus better to assume bot first, and prove human if you can (even if they get pass unique / hard captcha, it does not prove they are not bots)
 
Last edited:
We do not use the Likes function. We use a reputation system instead.
It seems this addon will stop internal links as well.

Thats all optional, you can use it to stop new users links, or certain words, or just stop new users with low posts / date since reg / (likes for people that do use) from laying links (of any type) or adding links to their account, try the free version in the pack and see if it helps, not having likes might make it less useful, but there are still things you can use
 
Top Bottom