Long-time readers of this journal will note that I record my own music. I don't get a lot of feedback on this forum about my music and, really, why would I? Since I'm on vacation, have a internet connection and a lot of time to kill, I decided to grep through the apache logs of taskboy and see who, if anyone else, is listening to my music.
The results surprised me.
Here are the hostnames/IP addresses of my "fans". Some of them are clearly robots (which is expected since I use a lot of synth vox). Others a personal friends whom I badger into listening to my stuff. The rest are complete strangers. The number to the right indicates the number of time that host has downloaded mp3 files from taskboy.
p50802BA7.dip0.t-ipconnect.de 7 66.208.20.199 8 gate2.progressive.com 8 209.232.145.10 8 ncgent02.telenet-ops.be 8 gw.exalead.com 9 pool-162-83-159-64.ny5030.east.verizon.net 9 AToulouse-201-2-1-131.w193-251.abo.wanadoo.fr 9 211.101.236.79 10 bgp530310bgs.ebrnsw01.nj.comcast.net 10 ma-plymouthcenter4a-a-57.albyny.adelphia.net 12 inktomi3-pop.server.ntl.com 12 atrax0.pa-x.dec.com 14 intout.cbc.ca 14 adaroknas01-pool0-a8.adarok.tds.net 16 extractor.singingfish.com 16 80.88.199.158 17 c-24-147-209-83.ne.client2.attbi.com 18 ma-plymouthcenter4a-a-101.albyny.adelphia.net 18 h0001026eb619.ne.client2.attbi.com 18 dsl093-004-058.det1.dsl.speakeasy.net 21 c-24-118-186-83.mn.client2.attbi.com 22 crawler1.crawler918.com 22 dialip191.spinn.net 22 cpe.atm4-0-51291.0x50c6d2f6.bynxx8.customer.tele.dk 25 cpe.atm2-0-5152.0x50c6e6ba.bynxx10.customer.tele.dk 26 drunkenwhores.com 26 d226-105-211.home.cgocable.net 28 cpe.atm4-0-51458.0x50c7669a.bynxx8.customer.tele.dk 29 h005004190393.ne.client2.attbi.com 29 213.215.133.19 38 n186175.ap.plala.or.jp 39 validator.singingfish.com 45 cr005r01-test.sac2.fastsearch.net 59 mp3cr001.sac2.fastsearch.net 438
It appears I'm big in Germany, a nation known for their love of irony and a strong, driving beat. Also notice that DrunkenWhores.com is way into my stuff and who can blame them?
Here's the one-liner I used to extract this information from my 25M access log:
bash-2.03$ cat access.log | grep "mp3" | perl -MSocket -lane '$ip{$F[0]}++; END{ for(sort{$ip{$a} <=> $ip{$b}} keys %ip){ next if $ip{$_} < 5; printf "%15s %3d\n", (gethostbyaddr(inet_aton($_), AF_INET) || $_), $ip{$_}}}'
Yes, I know that one-arg cat(1) is evil, but it works.
You're HUGE in Helsinki!
I remember distinctly listening to a song of yours playing randomly from my mp3 directory and wondering why I could not remember what this neat stuff was. Before you ask, I don't remember which song it was, and I can't access the playlist from here.