473,387 Members | 1,365 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

How do I find out who is posting to my form?

JJ
Hi,

I have a web page, where users fill out their name and address, and I send
them a free catalog.

The problem is that someone is filling my form out about 100 times a day
throughout the day with peoples information, who don't want the catalog!

I have tracked the ip address (all different) and the http referrer, which
doesn't really tell me much. and looked in the iis logs, which lists the
ipaddresses.

How can I find out who is posting to my form???
I think it is spam related or something.

Any Ideas Appreciated.

Thanks

JJ
Jul 19 '05 #1
2 1858
You can't. You can report the abuse to the netblock owners of the IPs, but
they're probably open proxies if all the IPs are different or something.

You could setup an e-mail verification for the catalog requests, although
the abuser could setup multiple e-mail accounts and still harass you if he's
that motivated.

You could also monitor for time periods that have exceptionally large
numbers of requests.

Ray at work

"JJ" <nospam> wrote in message
news:3f***********************@news.dial.pipex.com ...
Hi,

I have a web page, where users fill out their name and address, and I send
them a free catalog.

The problem is that someone is filling my form out about 100 times a day
throughout the day with peoples information, who don't want the catalog!

I have tracked the ip address (all different) and the http referrer, which
doesn't really tell me much. and looked in the iis logs, which lists the
ipaddresses.

How can I find out who is posting to my form???
I think it is spam related or something.

Any Ideas Appreciated.

Thanks

JJ

Jul 19 '05 #2
In news:%2****************@TK2MSFTNGP09.phx.gbl,
Ray at <%=sLocation%> <%=sLocation%> typed:
: You can't. You can report the abuse to the netblock owners of the
: IPs, but they're probably open proxies if all the IPs are different
: or something.
:
: You could setup an e-mail verification for the catalog requests,

I.E
User Fills out the form, including email address
User Submits Form
You write it to a server side database with a requestid, requestdate,
requesttime
Send an email with a link it in (for example) to the email address
http://www.example.com/confirm.asp?requestid=1234

When the user clicks on the link (or manually enters it) you then mark the
catalog request as confirmed and proceed as you did before.

Delete any requests that haven't been confirmed for n days.
: although the abuser could setup multiple e-mail accounts and still
: harass you if he's that motivated.
:
: You could also monitor for time periods that have exceptionally large
: numbers of requests.
:
: Ray at work
:
: "JJ" <nospam> wrote in message
: news:3f***********************@news.dial.pipex.com ...
:: Hi,
::
:: I have a web page, where users fill out their name and address, and
:: I send them a free catalog.
::
:: The problem is that someone is filling my form out about 100 times a
:: day throughout the day with peoples information, who don't want the
:: catalog!
::
:: I have tracked the ip address (all different) and the http referrer,
:: which doesn't really tell me much. and looked in the iis logs, which
:: lists the ipaddresses.
::
:: How can I find out who is posting to my form???
:: I think it is spam related or something.
::
:: Any Ideas Appreciated.
::
:: Thanks
::
:: JJ
Jul 19 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: nc | last post by:
My iterator can find my collection when my Action class calls my jsp directly, however when my Action class calls an html file that is set up with IFrames (one of which is loading that same jsp), I...
11
by: JoshuaF | last post by:
hello everyone i am very new to postgresql 7.3.3 and am using it on my mac G4 OS X and i am having some trouble which i hope you can help me out with some answers to my questions: 1.) How can I...
5
by: Tim Eliot | last post by:
Just wondering if anyone has hit the following issue and how you might have sorted it out. I am using the command: DoCmd.TransferText acExportMerge, , stDataSource, stFileName, True after...
3
by: Josh Armstrong | last post by:
I have a dropbox (cboReasons) in a form, when the user selects a reason from the dropbox the form needs to look in another table (lvsn_DefaultSettings) and see if there is a entry for that reason...
2
by: KnightWolfJK | last post by:
I'm working with a form and need some help customizing the results of a find query. I dug thru the archives and used this post...
3
by: Bob C. | last post by:
When I migrated my tables to SQL Server I needed a way to overcome the slow performance of the Find method on my recordsets. Although this can be done by accessing the table directly using dao and...
25
by: Neo Geshel | last post by:
This works: <form> <asp:TextBox id="name" /> <%= name.ClientID %> </form> But this DOES NOT work: <form>
1
by: MuZZy | last post by:
Hi, I'm trying to find a way to find out a form menu height/color as i think it changes depending on various Windows settings. I need to create a form of height/color of form menu so that i can...
9
by: Tony Girgenti | last post by:
Hello. I'm developing and testing a web application using VS.NET 2003, VB, .NET Framework 1.1.4322, ASP.NET 1.1.4322 and IIS5.1 on a WIN XP Pro, SP2 computer. I'm using a web form. For a...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.