Post B2NAIvKWI0U7o8Wjom by jwildeboer@social.wildeboer.net
 (DIR) More posts by jwildeboer@social.wildeboer.net
 (DIR) Post #B2NAIo0lV3WX6qEMYS by jwildeboer@social.wildeboer.net
       2026-01-17T09:09:03Z
       
       1 likes, 0 repeats
       
       After almost 9 months of observation, here's a "funny" correlation. Every time I post (and you good people like/boost) my blog post on "residential proxies" that really are just botnets for hire, some other folks decide to turn exactly these botnets on my mail server for a few days. So please, keep linking/boosting to make sure I can catch and block them all ;) The attached screenshots are around 25% from the list for today after I linked to my post in a reply yesterday.https://jan.wildeboer.net/2025/04/Web-is-Broken-Botnet-Part-2/
       
 (DIR) Post #B2NAIvKWI0U7o8Wjom by jwildeboer@social.wildeboer.net
       2026-01-17T09:19:26Z
       
       0 likes, 0 repeats
       
       And here is part one of that very short series: https://jan.wildeboer.net/2025/02/Blocking-Stealthy-Botnets/
       
 (DIR) Post #B2NAJ383IFGVzmktUm by jwildeboer@social.wildeboer.net
       2026-01-17T09:34:08Z
       
       0 likes, 0 repeats
       
       In the 9 months since, I have seen many posts by other people here, showing how some ruthless companies offer these botnets that abuse the network connection of unsuspecting home and mobile users through, IMHO, backdoor apps to serve as "alternative" for AI scraping and other nefarious uses when system administrators block the "official" scraping bots that also don't care about following any rules like robots.txt etc.