Postback security with AstroProxy

Postback security with AstroProxy

My article on how to properly kill affiliate networks with a DDoS attack will be released soon. It is better to prepare in advance and protect your network in the most non-obvious direction – to hide the real source of your postback requests.

Postback protection

  1. Let’s go to register at AstroProxy.com. Why AstroProxy? No, are you serious? They have a cat in a spacesuit on the main page! But seriously, you can take another service.
  2. Go to the “My proxies” section – this is the second button in the navigation bar. There we press on “Add port”.
  3. Set the network type to “Hosting”. It is the cheapest.
  4. Country, city and operator – “Any”. Linking to GEO is not critical in our case.
  5. Enable changing the external IP address by time once an hour. It can be more often, it can be less often, once an hour is optimal. Per request – not recommended.
  6. We use the “Prepaid traffic” tariff with a volume of 100-500 MB and auto-renewal for the same volume.
  7. Click “Create” and get a ready-made port for work. From it we will need an IP address, HTTP(S) port, login and password.
  8. Open your favorite affiliate network. Go to “Management – Settings”, there “Advanced settings” and go down to the very bottom.
  9. Check the “Use proxy for postbacks and ads” checkbox, specify our IP and port separated by a colon in the “Address” field (for example, 193.23.50.56:10555), and in the “Login and password” field – our login and password separated by a colon (for example, yayebu:babuyagu).
  10. Save, relax rolls. Or do we relax? More on that in the next issue!

For those who do not understand the text, there are funny pictures:

Bonus: integration protection

There will be no funny pictures with integrations, only harsh code. You can add it to the “Request preprocessing” field in each block of suspicious integrations:

$cc['proxy'] = '193.23.50.56:10555';
$cc['pauth'] = 'yayebu:babuyagu';