diff --git a/www.i2p2/pages/i2cp_spec.html b/www.i2p2/pages/i2cp_spec.html
index dc267d47..9541a9a4 100644
--- a/www.i2p2/pages/i2cp_spec.html
+++ b/www.i2p2/pages/i2cp_spec.html
@@ -789,7 +789,7 @@ As of release 0.7.1.
Tell the other party (client or router) that they are under attack, potentially with reference to a
particular messageId. If the router is under attack, the client may decide to
migrate to another router, and if a client is under attack, the router may rebuild
-its routers or shitlist some of the peers that sent it messages delivering the attack.
+its routers or banlist some of the peers that sent it messages delivering the attack.
Sent either from router to client or from client to router.
Contents
diff --git a/www.i2p2/pages/performance-history.html b/www.i2p2/pages/performance-history.html
index a65fe726..458dcef5 100644
--- a/www.i2p2/pages/performance-history.html
+++ b/www.i2p2/pages/performance-history.html
@@ -54,7 +54,7 @@ going through the full (expensive) Diffie-Hellman handshaking to negotiate a
private session key. This means that if someone's clock is really wrong, or
their NAT/firewall/etc is improperly configured (or they're just running an
incompatible version of the router), they're going to consistently (though not
-constantly, thanks to the shitlist) cause a futile expensive cryptographic
+constantly, thanks to the banlist) cause a futile expensive cryptographic
operation on all the peers they know about. While we will want to keep some
verification/validation within the encryption boundary, we'll want to update the
protocol to do some of it first, so that we can reject them cleanly
diff --git a/www.i2p2/pages/ratestats.html b/www.i2p2/pages/ratestats.html
index e51b0c01..44adb58b 100644
--- a/www.i2p2/pages/ratestats.html
+++ b/www.i2p2/pages/ratestats.html
@@ -135,7 +135,7 @@ netDb.writeOut
netDb.writePending
netDb.writeTime
ntcp.accept
-ntcp.attemptShitlistedPeer
+ntcp.attemptBanlistedPeer
ntcp.attemptUnreachablePeer
ntcp.bidRejectedLocalAddress
ntcp.bidRejectedNoNTCPAddress
@@ -288,7 +288,7 @@ swarm." + getConnectionId() + ".totalReceived
transport.bidFailAllTransports
transport.bidFailNoTransports
transport.bidFailSelf
-transport.bidFailShitlisted
+transport.bidFailBanlisted
transport.expiredOnQueueLifetime
transport.getBidsJobTime
transport.noBidsYetNotAllUnreachable
@@ -304,7 +304,7 @@ transport.sendMessageMedium
transport.sendMessageSize
transport.sendMessageSmall
transport.sendProcessingTime
-transport.shitlistOnUnreachable
+transport.banlistOnUnreachable
tunnel.acceptLoad
tunnel.batchCount
tunnel.batchDelay