16:05:25 I have been looking into this issue: https://github.com/monero-project/monero/issues/9496 16:05:27 I noticed in one of the logs a node sent a P2P message that wouldn't ever be sent if the nodes were both running default monerod. Sadly they seemed to have fixed that information leak. However I managed to find another information leak to tell their custom software apart from monerod. 16:05:29 I made a network scanner (using cuprate's p2p stack :D) to find nodes displaying this behavior and I have a list of 300+ IP addresses that are running bad monero nodes, probably apart of LinkingLion. What is the process on getting these nodes into the ban list? 16:07:19 (thanks to SyntheticBird for help checking nodes) 16:08:55 some of those IP addresses are running multiple nodes over different ports aswell 16:11:03 chaining DNS ban list entries will have to be implemented eventually to increase the ban list size 16:11:58 selsta: ^ 16:14:12 boog900: any idea what they are doing with RPC calls? 16:14:48 my best guess: https://github.com/monero-project/monero/issues/9496#issuecomment-2395469805 16:15:17 also can you check how many of the IPs are in here? https://gui.xmr.pm/files/block.txt 16:15:40 at some point these included all LinkingLion IPs either a different entity or they got fresh IPs 16:16:36 almost none of them - although a lot share subnets 16:19:21 there is also not a lot of overlap with the IPs here: https://github.com/monero-project/monero/issues/9496#issuecomment-2413759442 16:19:53 which makes me think they are using separate IPs for their noisy RPC traffic 16:30:49 so how do we know it's the sane entity? some do overlap? 16:30:51 same 16:37:38 yes 16:38:10 3 of them 16:40:04 also this is one of the IPs in my list: `162.218.65.67` which is linking lion 16:47:11 FWIW that one is already in the ban list, my tool caught it as well though 23:00:47 here are the IPs: https://paste.debian.net/hidden/1fa6bb72/ 23:02:07 I recommend people ban these nodes, especially if they are running public nodes. These "nodes" are proxying requests to other public nodes 23:02:45 but are doing some processing of messages to make themselves seem unique 23:03:28 cc Siren would you be interested in some OSINT on these IPs ? I've limited knowledge on how to do it but on two IPs i checked the companies behind were very sus/facade like. 23:04:23 boog900: How can they be banned from RPC queries? 23:05:03 I'm not sure but ban them from P2P as that's what I think they are using 23:05:32 If plowsof is around they used your nodes a couple times if you keep logs? 23:05:44 so we can see what requests they were sending 23:12:00 these were the IPs that used your node plowsof: 23:12:01 ``` 23:12:03 192.99.8.110 23:12:05 139.59.27.56 23:12:07 65.21.157.23 23:12:09 167.235.72.103 23:12:11 ``` 23:14:06 wait I didn't mean to include that first IP, only the last 3 did (the first IP is _not_ a bad node) 23:22:37 Banned 💥 23:27:31 nice, we should probably have some sort of default ban list 23:32:36 Sure, I will scan them. About those companies, have you seen a chinese/taiwanese isp page? 23:34:46 Nope. english page, all I saw where Fork Networking, CastleVPN and RiverBlackCapita all extremely sus. 23:34:52 were*