←back to thread

597 points classichasclass | 1 comments | | HN request time: 0s | source
Show context
Etheryte ◴[] No.45010574[source]
One starts to wonder, at what point might it be actually feasible to do it the other way around, by whitelisting IP ranges. I could see this happening as a community effort, similar to adblocker list curation etc.
replies(9): >>45010597 #>>45010603 #>>45010604 #>>45010611 #>>45010624 #>>45010757 #>>45010872 #>>45010910 #>>45010935 #
bobbiechen ◴[] No.45010611[source]
Unfortunately, well-behaved bots often have more stable IPs, while bad actors are happy to use residential proxies. If you ban a residential proxy IP you're likely to impact real users while the bad actor simply switches. Personally I don't think IP level network information will ever be effective without combining with other factors.

Source: stopping attacks that involve thousands of IPs at my work.

replies(2): >>45011304 #>>45011308 #
throwawayffffas ◴[] No.45011304[source]
> If you ban a residential proxy IP you're likely to impact real users while the bad actor simply switches.

Are you really? How likely do you think is a legit customer/user to be on the same IP as a residential proxy? Sure residential IPS get reused, but you can handle that by making the block last 6-8 hours, or a day or two.

replies(3): >>45011693 #>>45014079 #>>45057280 #
1. micahdeath ◴[] No.45057280[source]
We blocked AT&T Mobile once... You get lots of complaints that way and we only blocked them for an hour.