Stories
Slash Boxes
Comments
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

use Perl Log In

Log In

[ Create a new account ]

jjohn (22)

jjohn
  (email not shown publicly)
http://taskboy.com/
AOL IM: taskboy3000 (Add Buddy, Send Message)

Perl hack/Linux buff/OSS junkie.

Journal of jjohn (22)

Monday July 07, 2003
04:42 PM

Who listens to my music?

[ #13310 ]

Long-time readers of this journal will note that I record my own music. I don't get a lot of feedback on this forum about my music and, really, why would I? Since I'm on vacation, have a internet connection and a lot of time to kill, I decided to grep through the apache logs of taskboy and see who, if anyone else, is listening to my music.

The results surprised me.

Here are the hostnames/IP addresses of my "fans". Some of them are clearly robots (which is expected since I use a lot of synth vox). Others a personal friends whom I badger into listening to my stuff. The rest are complete strangers. The number to the right indicates the number of time that host has downloaded mp3 files from taskboy.

      p50802BA7.dip0.t-ipconnect.de   7
                      66.208.20.199   8
              gate2.progressive.com   8
                     209.232.145.10   8
            ncgent02.telenet-ops.be   8
                     gw.exalead.com   9
pool-162-83-159-64.ny5030.east.verizon.net   9
AToulouse-201-2-1-131.w193-251.abo.wanadoo.fr   9
                     211.101.236.79  10
bgp530310bgs.ebrnsw01.nj.comcast.net  10
ma-plymouthcenter4a-a-57.albyny.adelphia.net  12
        inktomi3-pop.server.ntl.com  12
                atrax0.pa-x.dec.com  14
                      intout.cbc.ca  14
adaroknas01-pool0-a8.adarok.tds.net  16
          extractor.singingfish.com  16
                      80.88.199.158  17
c-24-147-209-83.ne.client2.attbi.com  18
ma-plymouthcenter4a-a-101.albyny.adelphia.net  18
h0001026eb619.ne.client2.attbi.com  18
dsl093-004-058.det1.dsl.speakeasy.net  21
c-24-118-186-83.mn.client2.attbi.com  22
            crawler1.crawler918.com  22
                dialip191.spinn.net  22
cpe.atm4-0-51291.0x50c6d2f6.bynxx8.customer.tele.dk  25
cpe.atm2-0-5152.0x50c6e6ba.bynxx10.customer.tele.dk  26
                  drunkenwhores.com  26
     d226-105-211.home.cgocable.net  28
cpe.atm4-0-51458.0x50c7669a.bynxx8.customer.tele.dk  29
h005004190393.ne.client2.attbi.com  29
                     213.215.133.19  38
             n186175.ap.plala.or.jp  39
          validator.singingfish.com  45
  cr005r01-test.sac2.fastsearch.net  59
       mp3cr001.sac2.fastsearch.net 438

It appears I'm big in Germany, a nation known for their love of irony and a strong, driving beat. Also notice that DrunkenWhores.com is way into my stuff and who can blame them?

Here's the one-liner I used to extract this information from my 25M access log:

bash-2.03$ cat access.log | grep "mp3" | perl -MSocket -lane '$ip{$F[0]}++; END{ for(sort{$ip{$a} <=> $ip{$b}} keys %ip){ next if $ip{$_} < 5; printf "%15s %3d\n", (gethostbyaddr(inet_aton($_), AF_INET) || $_), $ip{$_}}}'

Yes, I know that one-arg cat(1) is evil, but it works.

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
 Full
 Abbreviated
 Hidden
More | Login | Reply
Loading... please wait.