Pleased to share a page and explainer for the AI tarpit project Science is Poetry, with legal statement, rationale(s), and a few deployment notes:

https://julianoliver.com/projects/science-is-poetry/

The page may grow a bit. Just wanted to get it out the door.

#AI #bigtech

Science is Poetry

If you're interested in learning more about implementations of resistance in this era of unchecked Big AI, direct action strategies and the techno-politics therein, be sure to check out ASRG's site (https://algorithmic-sabotage.gitlab.io/asrg/) and give them a follow here on Mastodon (@[email protected]).

They've put a lot of heartbeats and neurons - human stuff - into this area.

ASRG

Algorithmic Sabotage Research Group (ASRG)

ASRG

A newcomer frantically lost in the Caves of Babble.

----
3.215.221.125 - - [16/Apr/2026:06:14:25 +0200] "GET /noodles/images/primigenous/orchiepididymitis/Lord/havent.png HTTP/1.1" 200 111459 "-" "Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot) Chrome/119.0.6045.214 Safari/537.36" "-"
----

About AmazonBot

Customer facing page of Amazonbot crawler which all web content publishers can refer to.

Developer Portal Master

Do you have an unused domain that you would be happy to donate to a counter-offensive against unchecked & unregulated AI crawlers that scrape human-made content to simulate & deceive for profit?

If so, pls reply to this post. Your domain would become an entrypoint to the AI tarpit & Poison-as-a-Service project below, allowing concerned public to choose to use it on their sites, helping make the project more resilient to blacklisting.

https://julianoliver.com/projects/science-is-poetry/

#ai #bigtech #tacticalmedia

Science is Poetry

A bit over half a million page reads a day by crawlers rn. Just to say the server is doing some good work.
Thanks all for the fine domains! I've decided to spin up a new VM and do all the site configs and TLS chain for them at once - more efficient, less prone to error. I will get onto that on my tomorrow and report back here.
SEANCE IS POTTERY

I have only linked them here and on the landing page, and already it's gone nuts.

These are *solely* the new domains you've donated, all in one log. These do not pertain to the project domain.

I've started to harvest a list of AI crawler endpoint addrs for your blacklisting pleasure.

I'll try to keep it updated. I've been fastidious with ensuring I'm only pulling those related to the known user agent, so as not to have any false positives

https://scienceispoetry.net/files/parasites.txt

It is at the same path for all contributed domains.

For instance:

https://carrot.mro1.de/files/parasites.txt

It's approaching DoS at this point. This just one of the VMs, and just OpenAI's parasite.

Threading's holding up but need some more tuning of rate limits and burst. Trying sending 429's now to ask them to play nice.

To think the www was built for people.

And here we are

Even faster now.

Again, these pages are randomly generated, and each line is a page request from a crawler.

To think of the energy expended at a global scale, the waste. All the money, water & minerals thrown at this. These AI companies are near DoS'ing the human web as they deep-sea trawl our content.

Computationally, infrastructurally, & culturally, it's an obscenity,

- Mum, if you made a chain out of all the endpoint addresses of AI crawlers, how far would it reach?

- All the way to the moon, darling. All the way to the moon.

https://scienceispoetry.net/files/parasites.txt

Here's a thing I did in a couple of mins to ban all IPs in the parasites.txt serverside. You could ofc REJECT rather than DROP to send a message.

---
#!/bin/bash

while read parasite;
do
if [[ "$parasite" == *"."* ]]; then
iptables -I INPUT -s "$parasite" -j DROP
elif [[ "$parasite" == *":"* ]]; then
ip6tables -I INPUT -s "$parasite" -j DROP
fi
done < /path/to/parasites.txt
---

Actual hits dropping slightly, but more data is pulled from the tarpit day on day. This is reflected by a higher proportion of HTTP 200's - so less bad req's. Less reaching for what isn't there, just want the madness.

Unclear why this has changed.

My log analysis shows that what these AI crawlers do is swarm content to get around rate limiting; with many end-points each can be limited to sane human defaults and their automation can still harvest content at massive scales from the same source in little time.

I noticed however that (for unknown reasons) Anthropic started reducing the number of crawler endpoints, tapering down traffic from them. So I doubled the rate to 2/s. This added over 100k hits to the logs in a day.

Nearly a month later you would've thought that the crawlers would've given up by now, dropped off, blacklisted the IPs, or perhaps even the domains themselves.

And yet no. As I tentatively guessed, thanks to your donated domains (and the people linking them in their sites) it has only grown.

I don't expect it to run this hot for the long term, but yesterday's hit count (these are almost 100% reads of randomly generated pages by AI crawlers) was near 1M.

For any naysayers out there as to how effective all this is, or could be, some recent research shows you can do a lot with a little:

https://arxiv.org/abs/2510.07192

Researchers found that a very small corpora of poison content has largely the same impact, regardless of the size of the data in the model itself:

"We find that 250 poisoned documents similarly compromise models across all model and dataset sizes, despite the largest models training on more than 20 times more clean data."

Poisoning Attacks on LLMs Require a Near-constant Number of Poison Samples

Poisoning attacks can compromise the safety of large language models (LLMs) by injecting malicious documents into their training data. Existing work has studied pretraining poisoning assuming adversaries control a percentage of the training corpus. However, for large models, even small percentages translate to impractically large amounts of data. This work demonstrates for the first time that poisoning attacks instead require a near-constant number of documents regardless of dataset size. We conduct the largest pretraining poisoning experiments to date, pretraining models from 600M to 13B parameters on chinchilla-optimal datasets (6B to 260B tokens). We find that 250 poisoned documents similarly compromise models across all model and dataset sizes, despite the largest models training on more than 20 times more clean data. We also run smaller-scale experiments to ablate factors that could influence attack success, including broader ratios of poisoned to clean data and non-random distributions of poisoned samples. Finally, we demonstrate the same dynamics for poisoning during fine-tuning. Altogether, our results suggest that injecting backdoors through data poisoning may be easier for large models than previously believed as the number of poisons required does not scale up with model size, highlighting the need for more research on defences to mitigate this risk in future models.

arXiv.org

Ye gads it's gone absolutely silly.

I spent a good part of my morning trying to work out if it was a veiled DoS or actual harvesting while keeping the thing up. Status codes are good, 96.5% are real page reads from the usual AI crawler suspects.

A big network in Singapore with "www.google.com" (but not GoogleBot) User Agent string is responsible for some of it. But the rest is just frantic feeding.

Server is running hot. To keep it up I'm having to further tune ratelimiting, bursts etc.

I've added these kindly donated new domains to the ridiculous landing page at https://scienceispoetry.net/

- poesie.kornshell.xyz
- whatthefuckisgoingonwithmyhorroscope.today
- poetry.danielarmengol.com
- poetry.usolab.com
- poetry.pinchito.com
- poetry.interactionphilia.com

SEANCE IS POTTERY

I've done the log analysis and the two biggest contributors that brought the AI crawler hits up to 2 million in a day, a 4x increase on a week prior, are ByteSpider (Singapore networks) and especially AppleBot (used for Siri and other Apple products).

The parasites.txt is now >4500 lines long:

https://scienceispoetry.net/files/parasites.txt

I'm glad to share the traffic summary from the 1st month of Science is Poetry. It has been wild, & I've learned a lot!

Things started to get quite silly on the 7th, when AppleBot (Siri, other products) joined the fray, adding 2k+ endpoints to the list & feeding so fast I had to shape them down to keep the server up.

Then came the 8th, which legit looked like DoS from a network in Singapore sending a 'www.google.com' UA, despite evidently not being GG. 3.8M page requests in one day, gulp.

For those curious, here's a line from the logs from one of the endpoints in the mysterious Singapore swarm:

---

47.79.192.138 - - [10/May/2026:07:23:11 +0200] "GET /noodles/polycladose/some_unyouthful HTTP/1.1" 200 13906 "https://www.google.com/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36" "-"

---

That is one of 1,993,530 hits from that 47.79.0.0/16 network, in those 24hrs.

EDIT: GG url in string wants to preview.

Google

As of today, AI crawlers from Apple, Anthropic, OpenAI, Amazon, Meta, ByteSpider and Google are all still feeding manically on the endlessly generated babble, totally captive to it.

They could stop, but are instead dedicating an enormous amount of resources. They show no signs of slowing, with the exception of Apple whom had a pathological day 1 honeymoon period, before settling in with the others.

PerplexityBot has dropped off for now. I'd really like to know why, but figure I never will.

@JulianOliver Under which condition, would you reckon, are they gonna try to avoid or recognize and skip tarpits like yours

@pratched I thought they would have given up on the project's destination IP, or even the canonical domain, long ago. And yet they just keep going, and at a rate that even increases.

My emerging belief is that - for all their billions of dollars - this scraping is entirely automated, with next to no oversight. At least for now.

@JulianOliver Apart from skipping the IP, what would be the easiest way to detect and avoid tarpits like yours, if they would pop up all over the net?
@pratched I'm not going to share my theories here, as I hope they do pop up all over the net.
@JulianOliver Fair enough, that seems reasonable :D