frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Owner of 'US 8964' licence plate faced police scrutiny and a year of harassment

https://hongkongfp.com/2025/08/24/driven-out-why-the-owner-of-us-8964-licence-plate-faced-police-...
1•baylearn•2m ago•0 comments

VLF Plotter

https://www.skyandsolar.com/plotter
1•austinallegro•2m ago•0 comments

I built a Task manager to prevent developer Burnout

1•BlogCat•2m ago•1 comments

Ask HN: How can I recover and run my old mobile game from the 2010s?

1•diasks2•3m ago•0 comments

Zero Ethics AI [video]

https://www.youtube.com/watch?v=kboTCBHyYd0
1•frag•3m ago•0 comments

Google: Was 1995 30 years ago?

https://imgur.com/a/2bQot5i
3•scarface_74•6m ago•0 comments

Founders of This New Development Say You Must Be White to Live There

https://www.nytimes.com/2025/08/19/realestate/arkansas-white-housing-return-to-land.html
2•belter•8m ago•0 comments

What Are OKLCH Colors?

https://jakub.kr/components/oklch-colors
13•tontonius•12m ago•3 comments

Show HN: Discover, share, and collaborate on effective coding prompts

https://www.aitmpl.com/
1•alexander2002•14m ago•0 comments

A comprehensive list of 2025 tech layoffs

https://techcrunch.com/2025/08/15/tech-layoffs-2025-list/
1•bbzjk7•15m ago•0 comments

Buypass Discontinues Issuance of TLS/SSL Certificates

https://www.buypass.com/products/tls-ssl-certificates/discontinues-issuance-of-tls-ssl-certificates
1•gpi•16m ago•0 comments

Joey Hess

https://joeyh.name
1•keepamovin•19m ago•0 comments

Chinese property giant Evergrande delisted after fall

https://www.bbc.com/news/articles/c14g7r44566o
1•yusufaytas•21m ago•0 comments

Violence and the Sacred: College as an incubator of Girardian terror (2017)

https://danwang.co/college-girardian-terror/
1•stopachka•33m ago•0 comments

Guess the Pin

https://www.guessthepin.com
2•LostMyLogin•37m ago•0 comments

Next-generation JavaScript analysis tooling

https://github.com/google/jsir
1•selvan•39m ago•0 comments

Ban passengers playing loud music on public transport, say Tories

https://news.sky.com/story/ban-passengers-playing-loud-music-on-public-transport-say-tories-13417519
2•austinallegro•41m ago•1 comments

iDAI.field: software for the documentation of archaeological fieldwork

https://github.com/dainst/idai-field
1•yorwba•42m ago•0 comments

The First 1k Days

https://williamjbarry.substack.com/p/the-first-1000-days
1•wjb3•43m ago•0 comments

Reverse-engineering the Globus INK, a Soviet spaceflight navigation computer

https://www.righto.com/2023/03/reverse-engineering-globus-ink-soviet.html
2•trymas•49m ago•0 comments

Apple Helped China Become a Tech Superpower

https://prospect.org/culture/books/2025-08-01-how-apple-helped-china-become-tech-superpower/
4•N_A_T_E•49m ago•0 comments

Show HN: InterceptSuite – MitM proxy that handles StartTLS upgrades

https://github.com/InterceptSuite/InterceptSuite
1•anof-cyber•50m ago•0 comments

AetherCode: Evaluating LLMs' Ability to Win in Premier Programming Competitions

https://arxiv.org/abs/2508.16402
1•limoce•1h ago•0 comments

Share temporary links for Laravel models, routes, and files

https://github.com/Grazulex/laravel-sharelink
1•grazulex•1h ago•1 comments

Show HN: VigyanVerse – A structured knowledge app for learning via topic cards

https://vigyanverse.netlify.app/
1•manjusg•1h ago•0 comments

MCP Gateway and Registry

https://github.com/IBM/mcp-context-forge
10•nikhilk218•1h ago•1 comments

Purism Librem Post Quantum Cryptography Encryptor

https://puri.sm/posts/introducing-the-librem-pqc-encryptor/
2•m463•1h ago•0 comments

Capture Checking in Scala

https://nrinaudo.github.io/articles/capture_checking.html
1•nrinaudo•1h ago•0 comments

Show HN: Timep – A next-gen profiler and flamegraph-generator for bash code

https://github.com/jkool702/timep
2•jkool702•1h ago•0 comments

Macrohard, Elon Musk's AI Simulation of Microsoft

https://www.windowscentral.com/microsoft/meet-macrohard-elon-musks-ai-simulation-of-microsoft-foc...
2•aard•1h ago•1 comments
Open in hackernews

Bro, ban me at the IP level if you don't like me

https://boston.conman.org/2025/08/21.1
127•classichasclass•2h ago

Comments

_def•1h ago
I've seen blocks like that for e.g. alibaba cloud. It's sad indeed, but it can be really difficult to handle aggressive scrapers.
Etheryte•1h ago
One starts to wonder, at what point might it be actually feasible to do it the other way around, by whitelisting IP ranges. I could see this happening as a community effort, similar to adblocker list curation etc.
worthless-trash•1h ago
I admin a few local business sites.. I whitelist all the countries isps and the strangeness in the logs and attack counts have gone down.

Google indexes in country, as does a few other search engines..

Would recommend.

coffee_am•59m ago
Is there a public curated list of "good ips" to whitelist ?
partyguy•12m ago
> Is there a public curated list of "good ips" to whitelist ?

https://github.com/AnTheMaker/GoodBots

ygritte•59m ago
Came here to say something similar. The sheer amount of IP addresses one has to block to keep malware and bots at bay is becoming unmanageable.
bobbiechen•57m ago
Unfortunately, well-behaved bots often have more stable IPs, while bad actors are happy to use residential proxies. If you ban a residential proxy IP you're likely to impact real users while the bad actor simply switches. Personally I don't think IP level network information will ever be effective without combining with other factors.

Source: stopping attacks that involve thousands of IPs at my work.

delusional•54m ago
At that point it almost sounds like we're doing "peering" agreements at the IP level.

Would it make sense to have a class of ISPs that didn't peer with these "bad" network participants?

JimDabell•49m ago
If this didn’t happen for spam, it’s not going to happen for crawlers.
shortrounddev2•39m ago
Why not just ban all IP blocks assigned to cloud providers? Won't halt botnets but the IP range owned by AWS, GCP, etc is well known
lxgr•31m ago
Many US companies do it already.

It should be illegal, at least for companies that still charge me while I’m abroad and don’t offer me any other way of canceling service or getting support.

partyguy•13m ago
That's what I'm trying to do here, PRs welcome: https://github.com/AnTheMaker/GoodBots
friendzis•8m ago
It's never either/or: you don't have to choose between white and black lists exclusively and most of the traffic is going to come from grey areas anyway.

Say you whitelist an address/range and some systems detect "bad things". Now what? You remove that address/range from whitelist? Doo you distribute the removal to your peers? Do you communicate removal to the owner of unwhitelisted address/range? How does owner communicate dealing with the issue back? What if the owner of the range is hosting provider where they don't proactively control the content hosted, yet have robust anti-abuse mechanisms in place? And so on.

Whitelist-only is a huge can of worms and whitelists works best with trusted partner you can maintain out-of-band communication with. Similarly blacklists work best with trusted partners, however to determine addresses/ranges that are more trouble than they are worth. And somewhere in the middle are grey zone addresses, e.g. ranges assigned to ISPs with CGNATs: you just cannot reliably label an individual address or even a range of addresses as strictly troublesome or strictly trustworthy by default.

Implement blacklists on known bad actors, e.g. the whole of China and Russia, maybe even cloud providers. Implement whitelists for ranges you explicitly trust to have robust anti-abuse mechanisms, e.g. corporations with strictly internal hosts.

jampa•5m ago
The Pokémon Go company tried that shortly after launch to block scraping. I remember they had three categories of IPs:

- Blacklisted IP (Google Cloud, AWS, etc), those were always blocked

- Untrusted IPs (residential IPs) were given some leeway, but quickly got to 429 if they started querying too much

- Whitelisted IPs (IPV4 addresses are used legitimately by many people), for example, my current data plan tells me my IP is from 5 states over, so anything behind a CGNAT.

You can probably guess what happens next. Most scrapers were thrown out, but the largest ones just got a modem device farm and ate the cost. They successfully prevented most users from scraping locally, but were quickly beaten by companies profiting from scraping.

I think this was one of many bad decisions Pokémon Go made. Some casual players dropped because they didn't want to play without a map, while the hardcore players started paying for scraping, which hammered their servers even more.

lwansbrough•49m ago
We solved a lot of our problems by blocking all Chinese ASNs. Admittedly, not the friendliest solution, but there were so many issues originating from Chinese clients that it was easier to just ban the entire country.

It's not like we can capitalize on commerce in China anyway, so I think it's a fairly pragmatic approach.

lxgr•34m ago
Why stop there? Just block all non-US IPs!

If it works for my health insurance company, essentially all streaming services (including not even being able to cancel service from abroad), and many banks, it’ll work for you as well.

Surely bad actors wouldn’t use VPNs or botnets, and your customers never travel abroad?

lwansbrough•28m ago
Don't care, works fine for us.
yupyupyups•18m ago
And that's perfectly fine. Nothing is completely bulletproof anyway. If you manage to get rid of 90% of the problem then that's a good thing.
lxgr•13m ago
And if your competitor manages to do so without annoying the part of their customer base that occasionally leaves the country, everybody wins!
raffraffraff•27m ago
And across the water, my wife has banned US IP addresses from her online shop once or twice. She runs a small business making products that don't travel well, and would cost a lot to ship to the US. It's a huge country with many people. Answering pointless queries, saying "No, I can't do that" in 50 different ways and eventually dealing with negative reviews from people you've never sold to and possibly even never talked to... Much easier to mass block. I call it network segmentation. She's also blocked all of Asia, Africa, Australia and half of Europe.

The blocks don't stay in place forever, just a few months.

silisili•18m ago
Google Shopping might be to blame here, and I don't at all blame the response.

I say that because I can't count how many times Google has taken me to a foreign site that either doesn't even ship to the US, or doesn't say one way or another and treat me like a crazy person for asking.

lxgr•15m ago
As long as your customer base never travels and needs support, sure, I guess.

The only way of communicating with such companies are chargebacks through my bank (which always at least has a phone number reachable from abroad), so I’d make sure to account for these.

silisili•26m ago
I'm not precisely sure the point you're trying to make.

In my experience running rather lowish traffic(thousands hits a day) sites, doing just that brought every single annoyance from thousands per day to zero.

Yes, people -can- easily get around it via various listed methods, but don't seem to actually do that unless you're a high value target.

lxgr•4m ago
It definitely works, since you’re externalizing your annoyance to people you literally won’t ever hear from because you blanket banned them based. Most of them will just think your site is broken.
mort96•14m ago
The percentage of US trips abroad which are to China must be minuscule, and I bet nobody in the US regularly uses a VPN to get a Chinese IP address. So blocking Chinese IP addresses is probably going to have a small impact on US customers. Blocking all abroad IP addresses, on the other hand, would impact people who travel abroad or use VPNs. Not sure what your point is or why you're comparing these two things.
thrown-0825•12m ago
If you are traveling without a vpn then you are asking for trouble
mvdtnz•7m ago
You think all streaming services have banned non US IPs? What world do you live in?
sugarpimpdorsey•26m ago
There's some weird ones you'd never think of that originate an inordinate amount of bad traffic. Like Seychelles. A tiny little island nation in the middle of the ocean inhabited by... bots apparently? Cyprus is another one.

Re: China, their cloud services seem to stretch to Singapore and beyond. I had to blacklist all of Alibaba Cloud and Tencent and the ASNs stretched well beyond PRC borders.

seanhunter•10m ago
The Seychelles has a sweetheart tax deal with India such that a lot of corporations who have an India part and a non-India part will set up a Seychelles corp to funnel cash between the two entities. Through the magic of "Transfer Pricing"[1] they use this to reduce the amount of tax they need to pay.

It wouldn't surprise me if this is related somehow. Like maybe these are Indian corporations using a Seychelles offshore entity to do their scanning because then they can offset the costs against their tax or something. It may be that Cyprus has similar reasons. Istr that Cyprus was revealed to be important in providing a storefront to Russia and Putin-related companies and oligarchs.[2]

So Seychelles may be India-related bots and Cyprus Russia-related bots.

[1] https://taxjustice.net/faq/what-is-transfer-pricing/#:~:text...

[2] Yup. My memory originated in the "Panama Papers" leaks https://www.icij.org/investigations/cyprus-confidential/cypr...

thrown-0825•13m ago
Block Russia too, thats where i see most of my bot traffic coming from
ta8645•42m ago
If ipv6 ever becomes a thing, it'll make blocking all that much harder.
snerbles•30m ago
For ipv6 you just start nuking /64s and /48s if they're really rowdy.
rnhmjoj•17m ago
No, it's really the same thing with just different (and more structured) prefix lengths. In IPv4 you usually block a single /32 address first, then a /24 block, etc. In IPv6 you start with a single /128 address, a single LAN is /64, an entire site is usually /56 (residential) or /48 (company), etc.
firefoxd•42m ago
Since I posted an article here about using zip bombs [0], I'm flooded with bots. I'm constantly monitoring and tweaking my abuse detector, but this particular bot mentioned in the article seemed to be pointing to an RSS reader. I white listed it at first. But now that I gave it a second look, it's one of the most rampant bot on my blog.

[0]: https://news.ycombinator.com/item?id=43826798

PeterStuer•14m ago
FAFO from both sides. Not defending this bot at all. That said, the shenanigans some rogue or clueless webmasters are up to blocking legitimate and non intrusive or load causing M2M trafic is driving some projects into the arms of 'scrape services' that use far less considerate nor ethical means to get to the data you pay them for.

IP blocking is useless if your sources are hundreds of thousands of people worldwide just playing a "free" game on their phone that once in a while on wifi fetches some webpages in the background for the game publisher's scraping as a service side revenue deal.

phplovesong•10m ago
We block China and Russia. DDOS attacks and other hack attempts went down by 95%.

We have no chinese users/customers so in theory this does not effect business at all. Also russia is sanctioned and our russian userbase does not actually live in russia, so blocking russia did not effect users at all.

mavamaarten•5m ago
Same here. It sucks. But it's just cost vs reward at some point.