EFFECTIVE JANUARY 1, 2024 ------------------------- Because of the proliferation of web-gopher proxies that don't gate bots, and because operating the site costs us money directly in bandwidth, we're forced to crack down. We get literally tens of thousands of requests a day often from single IP addresses or networks. This isn't acceptable anymore and is a cost we cannot meaningfully sustain. We want bots spidering gopherspace to generate publicly accessible indexes that people can search over Gopher. This is a good use of community resources. Those sorts of spiders, assuming they obey restrictions and keep their access rates reasonable, are to be encouraged. We will support them. Bots that generate publicly accessible snapshots also fall in this group. On the other hand, spidering away to generate a private index basically costs us and other sites money for something that doesn't improve general gopherspace, and those spiders will be banned. Similarly, misdirected bots that index through misconfigured proxies generate useless traffic, and we may prevent those proxies from accessing Floodgap altogether until this is fixed. You're welcome to disagree, but you don't pay the bills. Nothing personal. ARE YOU HERE BECAUSE YOUR SITE IS BLOCKED? See the list at the end. Contact us at gopher@floodgap.com if you want to be unblocked. Be prepared to explain your bot's or proxy's activities, and do note that we reserve the right to keep it blocked. REQUIREMENTS FOR SPIDERS: - If your site is determined to be spidering, the IP you use for spidering must be accessible on port 70 so we can confirm you are a gopher server. Ideally your index should also be publicly searchable. - If you cannot do this, but have a reason to be white-listed, please E-mail gopher@floodgap.com with a contact person and an explanation. IPs or netblocks will be blocked WITHOUT WARNING (either at the protocol or the packet filter level) unless either or both of these conditions are met. Talk to us first before firing up your bot. BLOCKED SITES LIST This list contains date they were listed, the IP, and the hostname (if relevant). Patterns may appear for complete blocks if activity came from multiple locations. Blocked from portions of Floodgap Groundhog (due to ignoring robots.txt) (all below as of 2026-04-23) *.obulou.org *.0x1bi.* *.amazonaws.* *.codevoid.* *.linode.* *.meulie.* *.nonic.cloud *.pongonova.* *.projectsegfau.lt *.titmouse.* *.veloxzone.com.br vulpes.* *.z3bra.* *.codemadness.org 23.119.120.152 23-119-120-152.lightspeed.sntcca.sbcglobal.net. 46.44.40.97 47.35.88.61 047-035-088-061.res.spectrum.com. 89.163.145.170 envs.net. 93.157.51.111 155.133.142.66 gw3.sd6.gpaas.net. 198.251.84.158 freeirc.org. 159.196.9.199 159-196-9-199.9fc409.mel.nbn.aussiebb.net. 159.196.36.43 164.90.232.244 198.50.210.248 tilde.team. 205.166.94.4 rie.sdf.org. Blocked from Floodgap entirely (at packet filter level) (all below as of 2026-04-22) 8.219.197.148 43.157.*.* 45.78.*.* 47.79.*.* 47.82.*.* 52.169.181.227 57.141.14.* 57.141.20.* 64.124.8.* 101.47.*.* 104.250.*.* 104.28.152.* 104.28.153.* 104.28.154.* 104.28.155.* 104.28.156.* 104.28.157.* 104.28.158.* 104.28.161.* 104.42.73.* 116.179.32.* 116.179.33.* 119.249.100.* 134.122.133.* 202.46.62.* 207.166.*.* 210.71.213.29 220.181.108.* 220.181.51.* generated by lsfilt | grep Source.Address | awk '{print $4}' | grep -v '0.0.0.0' | sed 's/\.0/\.\*/g' | sort -n .