mirror of
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker.git
synced 2025-09-02 18:50:13 +00:00
V3.2017.07.751 [ci skip]
This commit is contained in:
parent
e90fb4ff9d
commit
44643037e5
42 changed files with 13896 additions and 24 deletions
40
.dev-tools/_conf_files_test1/bots.d/bad-referrer-words.conf
Normal file
40
.dev-tools/_conf_files_test1/bots.d/bad-referrer-words.conf
Normal file
|
@ -0,0 +1,40 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO ADD OR REMOVE ANY BAD WORDS YOU WANT TO SCAN FOR ###
|
||||
|
||||
# This is merely an example and gets auto included as since Version 2.2017.07 introduced on 2017-04-20
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# For all intensive purpose you can delete everything inside this file and leave it
|
||||
# completely blank if you do not want your Nginx Blocker to include scanning for bad words within urls or referrer string
|
||||
# Only add one entry per line
|
||||
|
||||
# *******************************
|
||||
# !!! WARNING WARNING WARNING !!!
|
||||
# *******************************
|
||||
|
||||
# ***************************************
|
||||
# PLEASE BE VERY CAREFUL HOW YOU USE THIS
|
||||
# ***************************************
|
||||
# Here is an example of how one supposed bad word can cause your whole site to go down.
|
||||
# An issue was logged where the users own domain name was specialisteparquet.com
|
||||
# Because this list contained the word "cialis" it was detected within his domain name causing
|
||||
# his entire site to go down and not server any assets.
|
||||
# That one entry would even cause any site containing a word like "specialist" anywhere in any
|
||||
# of their sites pages to cause them to be blocked and whitelisting your own domain name in the
|
||||
# whitelist-domains.conf file will not even bypass this, SO BE CAREFUL PLEASE
|
||||
|
||||
# Think very carefully before you add any word here
|
||||
|
||||
"~*adultgalls" 1;
|
||||
"~*amateurxpass" 1;
|
||||
"~*bigblackbooty" 1;
|
||||
"~*blacktits" 1;
|
||||
"~*cookie\-law\-enforcement" 1;
|
||||
"~*free\-share\-buttons" 1;
|
||||
"~*free\-social\-buttons" 1;
|
||||
"~*fuck\-paid\-share\-buttons" 1;
|
||||
"~*ilovevitaly" 1;
|
||||
"~*law\-enforcement\-bot" 1;
|
||||
"~*law\-enforcement\-check" 1;
|
||||
"~*share\-buttons\-for\-free" 1;
|
||||
"~*webfuck" 1;
|
||||
"~*xxxrus" 1;
|
||||
"~*zeroredirect" 1;
|
180
.dev-tools/_conf_files_test1/bots.d/blacklist-ips.conf
Normal file
180
.dev-tools/_conf_files_test1/bots.d/blacklist-ips.conf
Normal file
|
@ -0,0 +1,180 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO ADD OR REMOVE ANY BAD IP ADDRESSES OR IP RANGES YOU WANT TO BLOCK ###
|
||||
|
||||
# This is merely an example and gets auto included as since Version 2.2017.07 introduced on 2017-04-20
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# For all intensive purpose you can delete everything inside this file and leave it
|
||||
# completely blank if you do not want your Nginx Blocker to do any blocking of bad IP's
|
||||
|
||||
104.223.37.150 1;
|
||||
104.5.92.27 1;
|
||||
107.150.63.170 1;
|
||||
109.236.83.247 1;
|
||||
137.74.49.205 1;
|
||||
137.74.49.208 1;
|
||||
146.0.74.150 1;
|
||||
148.251.54.44 1;
|
||||
149.56.151.180 1;
|
||||
149.56.232.146 1;
|
||||
150.70.0.0/16 1;
|
||||
151.80.27.90 1;
|
||||
151.80.99.90 1;
|
||||
151.80.99.91 1;
|
||||
154.16.199.144 1;
|
||||
154.16.199.34 1;
|
||||
154.16.199.48 1;
|
||||
154.16.199.78 1;
|
||||
158.69.142.34 1;
|
||||
166.62.80.172 1;
|
||||
173.212.192.219 1;
|
||||
173.234.11.105 1;
|
||||
173.234.153.106 1;
|
||||
173.234.153.30 1;
|
||||
173.234.175.68 1;
|
||||
173.234.31.9 1;
|
||||
173.234.38.25 1;
|
||||
176.126.245.213 1;
|
||||
178.238.234.1 1;
|
||||
185.35.63.128 1;
|
||||
185.100.87.238 1;
|
||||
185.115.125.99 1;
|
||||
185.119.81.11 1;
|
||||
185.119.81.63 1;
|
||||
185.119.81.77 1;
|
||||
185.119.81.78 1;
|
||||
185.130.225.65 1;
|
||||
185.130.225.66 1;
|
||||
185.130.225.83 1;
|
||||
185.130.225.90 1;
|
||||
185.130.225.94 1;
|
||||
185.130.225.95 1;
|
||||
185.130.226.105 1;
|
||||
185.153.197.103 1;
|
||||
185.159.36.6 1;
|
||||
185.47.62.199 1;
|
||||
185.62.190.38 1;
|
||||
185.70.105.161 1;
|
||||
185.70.105.164 1;
|
||||
185.85.239.156 1;
|
||||
185.85.239.157 1;
|
||||
185.86.13.213 1;
|
||||
185.86.5.199 1;
|
||||
185.86.5.212 1;
|
||||
185.92.72.88 1;
|
||||
185.93.185.11 1;
|
||||
185.93.185.12 1;
|
||||
188.209.52.101 1;
|
||||
190.152.223.27 1;
|
||||
191.96.249.29 1;
|
||||
192.69.89.173 1;
|
||||
193.201.224.205 1;
|
||||
195.154.183.190 1;
|
||||
195.229.241.174 1;
|
||||
210.212.194.60 1;
|
||||
216.218.147.194 1;
|
||||
220.227.234.129 1;
|
||||
23.253.230.158 1;
|
||||
23.89.159.176 1;
|
||||
31.170.160.209 1;
|
||||
45.32.186.11 1;
|
||||
45.76.21.179 1;
|
||||
46.249.38.145 1;
|
||||
46.249.38.146 1;
|
||||
46.249.38.148 1;
|
||||
46.249.38.149 1;
|
||||
46.249.38.150 1;
|
||||
46.249.38.151 1;
|
||||
46.249.38.152 1;
|
||||
46.249.38.153 1;
|
||||
46.249.38.154 1;
|
||||
46.249.38.159 1;
|
||||
51.255.172.22 1;
|
||||
5.39.218.232 1;
|
||||
5.39.219.24 1;
|
||||
5.39.222.18 1;
|
||||
5.39.223.134 1;
|
||||
54.213.16.154 1;
|
||||
54.213.9.111 1;
|
||||
62.210.146.49 1;
|
||||
62.210.88.4 1;
|
||||
65.98.91.181 1;
|
||||
69.162.124.237 1;
|
||||
69.64.147.24 1;
|
||||
72.8.183.202 1;
|
||||
77.247.178.191 1;
|
||||
77.247.178.47 1;
|
||||
77.247.181.219 1;
|
||||
78.31.184.0/21 1;
|
||||
78.31.211.0/24 1;
|
||||
80.87.205.10 1;
|
||||
80.87.205.11 1;
|
||||
85.17.230.23 1;
|
||||
85.17.26.68 1;
|
||||
91.185.190.172 1;
|
||||
91.200.12.0/22 1;
|
||||
91.200.12.15 1;
|
||||
91.200.12.49 1;
|
||||
91.200.12.91 1;
|
||||
92.222.66.137 1;
|
||||
93.238.198.203 1;
|
||||
93.238.196.48 1;
|
||||
93.104.209.11 1;
|
||||
93.158.200.103 1;
|
||||
93.158.200.105 1;
|
||||
93.158.200.115 1;
|
||||
93.158.200.124 1;
|
||||
93.158.200.126 1;
|
||||
93.158.200.66 1;
|
||||
93.158.200.68 1;
|
||||
|
||||
# Cyveillance / Qwest Communications
|
||||
# **********************************
|
||||
# I am extensively researching this subject - appears to be US government involved
|
||||
# and also appears to be used by all sorts of law enforcement agencies. For one they
|
||||
# do not obey robots.txt and continually disguise their User-Agent strings. Time will
|
||||
# tell if this is all correct or not.
|
||||
# For now see - https://en.wikipedia.org/wiki/Cyveillance
|
||||
|
||||
# IMPORTANT UPDATE ON Cyveillance / Qwest Communications !!!
|
||||
# **********************************************************
|
||||
# I have done a lot of research on Cyveillance now and through monitoring my logs I know
|
||||
# for sure what companies are using them and what they are actually looking for.
|
||||
# My research has led me to understand that Cyveillance services are used by hundreds
|
||||
# of companies to help them dicsover theft of copyrighted materials like images, movies
|
||||
# music and other materials. I personally believe a lot of block lists who originally recommended
|
||||
# blocking Cyveillance have done so to protect their torrent or p2p sites from being scanned.
|
||||
# I personally have now unblocked them as image theft is a big problem of mine but if you
|
||||
# do want to block Cyveillance you can simply modify the entries in the block below from "0" to "1"
|
||||
# Getty Images is one such company who appears to use Cyveillance to help monitor for copyright theft.
|
||||
|
||||
# If you really do want to block them change all the 0's below to 1.
|
||||
|
||||
38.100.19.8/29 0;
|
||||
38.100.21.0/24 0;
|
||||
38.100.41.64/26 0;
|
||||
38.105.71.0/25 0;
|
||||
38.105.83.0/27 0;
|
||||
38.112.21.140/30 0;
|
||||
38.118.42.32/29 0;
|
||||
63.144.0.0/13 0;
|
||||
65.112.0.0/12 0;
|
||||
65.213.208.128/27 0;
|
||||
65.222.176.96/27 0;
|
||||
65.222.185.72/29 0;
|
||||
|
||||
# ****************
|
||||
# Berkely Scanner
|
||||
# ****************
|
||||
|
||||
# The Berkeley University has a scanner testing all over the web sending a complex
|
||||
# payload an expecting a reply from servers who are infected or who just respond to such
|
||||
# a payload. The payload looks similar to this
|
||||
# "$\xC9\xE1\xDC\x9B+\x8F\x1C\xE71\x99\xA8\xDB6\x1E#\xBB\x19#Hx\xA7\xFD\x0F9-"
|
||||
# and is sometime VERY long. You may have noticed this in your logs.
|
||||
# I support research projects and all my servers respond with an error to this type of
|
||||
# string so I do not block them but if you want to block just uncomment the following line
|
||||
# or email them asking them not to scan your server. They do respond.
|
||||
# Visit http://169.229.3.91/ for more info
|
||||
|
||||
# If you really do want to block them change all the 0 below to 1.
|
||||
|
||||
169.229.3.91 0;
|
|
@ -0,0 +1,41 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO BLACKLIST OR WHITELIST ANY BAD USER-AGENT STRINGS YOU WANT TO SCAN FOR
|
||||
# ****************************************************************************************************
|
||||
|
||||
# Add One Entry Per Line - List all the extra bad User-Agents you want to permanently block or whitelist.
|
||||
|
||||
# This is for User-Agents that are not included in the main list of the bot blocker
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# This allows you finer control of keeping certain bots blocked and automatic updates will
|
||||
# Never be able to remove this custom list of yours
|
||||
|
||||
# Please note this include file loads first before any of the already whitelisted User-Agents
|
||||
# in the bad bot blocker. By loading first in line it over-rides anything below it so for instance
|
||||
# if you want to block Baidu, Google or Bing for any reason you add them to this file which loads
|
||||
# first and takes precedence over anything below it. This now allows even finer control over the
|
||||
# bad bot blocker. Enjoy !!!
|
||||
|
||||
# Even though this file is called blacklist-user-agents, as mentioned it can also be used to whitelist user agents
|
||||
# By adding them below and setting the 3; to 0; this will permanently whitelist the User-Agent.
|
||||
|
||||
# Make sure any words that contain special characters are escaped and include word boundaries as per the Regex examples below.
|
||||
|
||||
# Example the User-Agent name "someverybaduseragentname1" is entered as "\bsomeverybaduseragentname1\b"
|
||||
# Example the User-Agent name "some-very-bad-useragentname2" is entered as "\bsome\-very\-bad\-useragentname1\b"
|
||||
# the "\b" are word boundaries which prevents partial matching and false positives.
|
||||
|
||||
# *********************
|
||||
# WHITELISTING EXAMPLES
|
||||
# *********************
|
||||
|
||||
"~*\bsomeverygooduseragentname1\b" 0;
|
||||
"~*\bsomeverygooduseragentname2\b" 0;
|
||||
"~*\bsome\-very\-good\-useragentname2\b" 0;
|
||||
|
||||
# *********************
|
||||
# BLACKLISTING EXAMPLES
|
||||
# *********************
|
||||
|
||||
"~*\bsomeverybaduseragentname1\b" 3;
|
||||
"~*\bsomeverybaduseragentname2\b" 3;
|
||||
"~*\bsome\-very\-bad\-useragentname2\b" 3;
|
||||
|
45
.dev-tools/_conf_files_test1/bots.d/blockbots.conf
Normal file
45
.dev-tools/_conf_files_test1/bots.d/blockbots.conf
Normal file
|
@ -0,0 +1,45 @@
|
|||
#######################################################################
|
||||
|
||||
# Author: Mitchell Krog <mitchellkrog@gmail.com> - https://github.com/mitchellkrogza/
|
||||
|
||||
# Include this in a vhost file within a server {} block using and include statement like below
|
||||
|
||||
# server {
|
||||
# #Config stuff here
|
||||
# include /etc/nginx/bots.d/blockbots.conf
|
||||
# include /etc/nginx/bots.d/ddos.conf
|
||||
# #Other config stuff here
|
||||
# }
|
||||
|
||||
#######################################################################
|
||||
|
||||
# BOTS
|
||||
# ****
|
||||
#limit_conn bot1_connlimit 100;
|
||||
limit_conn bot2_connlimit 10;
|
||||
#limit_req zone=bot1_reqlimitip burst=50;
|
||||
limit_req zone=bot2_reqlimitip burst=10;
|
||||
if ($bad_bot = '3') {
|
||||
return 444;
|
||||
}
|
||||
|
||||
# BAD REFER WORDS
|
||||
# ***************
|
||||
if ($bad_words) {
|
||||
return 444;
|
||||
}
|
||||
|
||||
|
||||
# REFERERS
|
||||
# ********
|
||||
if ($bad_referer) {
|
||||
return 444;
|
||||
}
|
||||
|
||||
# IP BLOCKS
|
||||
# *********
|
||||
if ($validate_client) {
|
||||
return 444;
|
||||
}
|
||||
|
||||
#######################################################################
|
|
@ -0,0 +1,15 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO ADD ANY ADDITIONAL BAD REFERRER DOMAINS YOU WANT TO SCAN FOR ###
|
||||
|
||||
# This is merely an example and gets auto included as since Version 2.2017.07 introduced on 2017-04-20
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# Only add one entry per line
|
||||
|
||||
# Make sure any domains have dots and special characters escaped as per the Regex examples below.
|
||||
# For example some-veryvery-randomwebsitename-thatdoesnotexist4.com should be entered as
|
||||
# some\-veryvery\-randomwebsitename\-thatdoesnotexist4\.com
|
||||
|
||||
"~*someveryveryrandomwebsitenamethatdoesnotexist1\.com" 1;
|
||||
"~*someveryveryrandomwebsitenamethatdoesnotexist2\.com" 1;
|
||||
"~*someveryveryrandomwebsitenamethatdoesnotexist3\.com" 1;
|
||||
"~*some\-veryvery\-randomweb\-sitenamethatdoesnotexist4\.com" 1;
|
||||
|
17
.dev-tools/_conf_files_test1/bots.d/ddos.conf
Normal file
17
.dev-tools/_conf_files_test1/bots.d/ddos.conf
Normal file
|
@ -0,0 +1,17 @@
|
|||
#######################################################################
|
||||
|
||||
# Author: Mitchell Krog <mitchellkrog@gmail.com> - https://github.com/mitchellkrogza/
|
||||
|
||||
# Include this in a vhost file within a server {} block using and include statement like below
|
||||
|
||||
# server {
|
||||
# #Config stuff here
|
||||
# include /etc/nginx/bots.d/blockbots.conf
|
||||
# include /etc/nginx/bots.d/ddos.conf
|
||||
# #Other config stuff here
|
||||
# }
|
||||
|
||||
#######################################################################
|
||||
|
||||
limit_conn addr 200;
|
||||
limit_req zone=flood burst=200 nodelay;
|
13
.dev-tools/_conf_files_test1/bots.d/whitelist-domains.conf
Normal file
13
.dev-tools/_conf_files_test1/bots.d/whitelist-domains.conf
Normal file
|
@ -0,0 +1,13 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO WHITELIST YOUR OWN DOMAIN NAMES AND SPARE THEM FROM ANY REFERRER CHECKING ###
|
||||
|
||||
# Add One Entry Per Line - List all your own domains of the sites you host on the server
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# Automatic updates will never be able to remove this custom list of yours
|
||||
# Add One Entry Per Line
|
||||
|
||||
# Make sure any domains have dots and special characters escaped as per the Regex examples below.
|
||||
# For example myfirstowndomainname.com should be entered as myfirstowndomainname\.com
|
||||
# and my-second-owndomainname.com should be entered as my\-second\-owndomainname\.com
|
||||
|
||||
"~*myfirstowndomainname\.com" 0;
|
||||
"~*my\-second\-owndomainname\.com" 0;
|
10
.dev-tools/_conf_files_test1/bots.d/whitelist-ips.conf
Normal file
10
.dev-tools/_conf_files_test1/bots.d/whitelist-ips.conf
Normal file
|
@ -0,0 +1,10 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO WHITELIST ALL YOUR IP ADDRESSES AND IP RANGES ###
|
||||
|
||||
# Add One Entry Per Line - List all your IP's and IP Ranges you want to whitelist
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# Automatic updates will never be able to remove this custom list of yours
|
||||
# Add One Entry Per Line - No need to include 127.0.0.1 as it is covered elsewhere
|
||||
# Only add actual IP addresses and ranges here
|
||||
|
||||
111.111.111.111 0;
|
||||
35.184.196.49 0;
|
|
@ -0,0 +1,4 @@
|
|||
server_names_hash_bucket_size 64;
|
||||
server_names_hash_max_size 4096;
|
||||
limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
|
||||
limit_conn_zone $binary_remote_addr zone=addr:50m;
|
6571
.dev-tools/_conf_files_test1/conf.d/globalblacklist.conf
Normal file
6571
.dev-tools/_conf_files_test1/conf.d/globalblacklist.conf
Normal file
File diff suppressed because it is too large
Load diff
40
.dev-tools/_conf_files_test2/bots.d/bad-referrer-words.conf
Normal file
40
.dev-tools/_conf_files_test2/bots.d/bad-referrer-words.conf
Normal file
|
@ -0,0 +1,40 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO ADD OR REMOVE ANY BAD WORDS YOU WANT TO SCAN FOR ###
|
||||
|
||||
# This is merely an example and gets auto included as since Version 2.2017.07 introduced on 2017-04-20
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# For all intensive purpose you can delete everything inside this file and leave it
|
||||
# completely blank if you do not want your Nginx Blocker to include scanning for bad words within urls or referrer string
|
||||
# Only add one entry per line
|
||||
|
||||
# *******************************
|
||||
# !!! WARNING WARNING WARNING !!!
|
||||
# *******************************
|
||||
|
||||
# ***************************************
|
||||
# PLEASE BE VERY CAREFUL HOW YOU USE THIS
|
||||
# ***************************************
|
||||
# Here is an example of how one supposed bad word can cause your whole site to go down.
|
||||
# An issue was logged where the users own domain name was specialisteparquet.com
|
||||
# Because this list contained the word "cialis" it was detected within his domain name causing
|
||||
# his entire site to go down and not server any assets.
|
||||
# That one entry would even cause any site containing a word like "specialist" anywhere in any
|
||||
# of their sites pages to cause them to be blocked and whitelisting your own domain name in the
|
||||
# whitelist-domains.conf file will not even bypass this, SO BE CAREFUL PLEASE
|
||||
|
||||
# Think very carefully before you add any word here
|
||||
|
||||
"~*adultgalls" 1;
|
||||
"~*amateurxpass" 1;
|
||||
"~*bigblackbooty" 1;
|
||||
"~*blacktits" 1;
|
||||
"~*cookie\-law\-enforcement" 1;
|
||||
"~*free\-share\-buttons" 1;
|
||||
"~*free\-social\-buttons" 1;
|
||||
"~*fuck\-paid\-share\-buttons" 1;
|
||||
"~*ilovevitaly" 1;
|
||||
"~*law\-enforcement\-bot" 1;
|
||||
"~*law\-enforcement\-check" 1;
|
||||
"~*share\-buttons\-for\-free" 1;
|
||||
"~*webfuck" 1;
|
||||
"~*xxxrus" 1;
|
||||
"~*zeroredirect" 1;
|
180
.dev-tools/_conf_files_test2/bots.d/blacklist-ips.conf
Normal file
180
.dev-tools/_conf_files_test2/bots.d/blacklist-ips.conf
Normal file
|
@ -0,0 +1,180 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO ADD OR REMOVE ANY BAD IP ADDRESSES OR IP RANGES YOU WANT TO BLOCK ###
|
||||
|
||||
# This is merely an example and gets auto included as since Version 2.2017.07 introduced on 2017-04-20
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# For all intensive purpose you can delete everything inside this file and leave it
|
||||
# completely blank if you do not want your Nginx Blocker to do any blocking of bad IP's
|
||||
|
||||
104.223.37.150 1;
|
||||
104.5.92.27 1;
|
||||
107.150.63.170 1;
|
||||
109.236.83.247 1;
|
||||
137.74.49.205 1;
|
||||
137.74.49.208 1;
|
||||
146.0.74.150 1;
|
||||
148.251.54.44 1;
|
||||
149.56.151.180 1;
|
||||
149.56.232.146 1;
|
||||
150.70.0.0/16 1;
|
||||
151.80.27.90 1;
|
||||
151.80.99.90 1;
|
||||
151.80.99.91 1;
|
||||
154.16.199.144 1;
|
||||
154.16.199.34 1;
|
||||
154.16.199.48 1;
|
||||
154.16.199.78 1;
|
||||
158.69.142.34 1;
|
||||
166.62.80.172 1;
|
||||
173.212.192.219 1;
|
||||
173.234.11.105 1;
|
||||
173.234.153.106 1;
|
||||
173.234.153.30 1;
|
||||
173.234.175.68 1;
|
||||
173.234.31.9 1;
|
||||
173.234.38.25 1;
|
||||
176.126.245.213 1;
|
||||
178.238.234.1 1;
|
||||
185.35.63.128 1;
|
||||
185.100.87.238 1;
|
||||
185.115.125.99 1;
|
||||
185.119.81.11 1;
|
||||
185.119.81.63 1;
|
||||
185.119.81.77 1;
|
||||
185.119.81.78 1;
|
||||
185.130.225.65 1;
|
||||
185.130.225.66 1;
|
||||
185.130.225.83 1;
|
||||
185.130.225.90 1;
|
||||
185.130.225.94 1;
|
||||
185.130.225.95 1;
|
||||
185.130.226.105 1;
|
||||
185.153.197.103 1;
|
||||
185.159.36.6 1;
|
||||
185.47.62.199 1;
|
||||
185.62.190.38 1;
|
||||
185.70.105.161 1;
|
||||
185.70.105.164 1;
|
||||
185.85.239.156 1;
|
||||
185.85.239.157 1;
|
||||
185.86.13.213 1;
|
||||
185.86.5.199 1;
|
||||
185.86.5.212 1;
|
||||
185.92.72.88 1;
|
||||
185.93.185.11 1;
|
||||
185.93.185.12 1;
|
||||
188.209.52.101 1;
|
||||
190.152.223.27 1;
|
||||
191.96.249.29 1;
|
||||
192.69.89.173 1;
|
||||
193.201.224.205 1;
|
||||
195.154.183.190 1;
|
||||
195.229.241.174 1;
|
||||
210.212.194.60 1;
|
||||
216.218.147.194 1;
|
||||
220.227.234.129 1;
|
||||
23.253.230.158 1;
|
||||
23.89.159.176 1;
|
||||
31.170.160.209 1;
|
||||
45.32.186.11 1;
|
||||
45.76.21.179 1;
|
||||
46.249.38.145 1;
|
||||
46.249.38.146 1;
|
||||
46.249.38.148 1;
|
||||
46.249.38.149 1;
|
||||
46.249.38.150 1;
|
||||
46.249.38.151 1;
|
||||
46.249.38.152 1;
|
||||
46.249.38.153 1;
|
||||
46.249.38.154 1;
|
||||
46.249.38.159 1;
|
||||
51.255.172.22 1;
|
||||
5.39.218.232 1;
|
||||
5.39.219.24 1;
|
||||
5.39.222.18 1;
|
||||
5.39.223.134 1;
|
||||
54.213.16.154 1;
|
||||
54.213.9.111 1;
|
||||
62.210.146.49 1;
|
||||
62.210.88.4 1;
|
||||
65.98.91.181 1;
|
||||
69.162.124.237 1;
|
||||
69.64.147.24 1;
|
||||
72.8.183.202 1;
|
||||
77.247.178.191 1;
|
||||
77.247.178.47 1;
|
||||
77.247.181.219 1;
|
||||
78.31.184.0/21 1;
|
||||
78.31.211.0/24 1;
|
||||
80.87.205.10 1;
|
||||
80.87.205.11 1;
|
||||
85.17.230.23 1;
|
||||
85.17.26.68 1;
|
||||
91.185.190.172 1;
|
||||
91.200.12.0/22 1;
|
||||
91.200.12.15 1;
|
||||
91.200.12.49 1;
|
||||
91.200.12.91 1;
|
||||
92.222.66.137 1;
|
||||
93.238.198.203 1;
|
||||
93.238.196.48 1;
|
||||
93.104.209.11 1;
|
||||
93.158.200.103 1;
|
||||
93.158.200.105 1;
|
||||
93.158.200.115 1;
|
||||
93.158.200.124 1;
|
||||
93.158.200.126 1;
|
||||
93.158.200.66 1;
|
||||
93.158.200.68 1;
|
||||
|
||||
# Cyveillance / Qwest Communications
|
||||
# **********************************
|
||||
# I am extensively researching this subject - appears to be US government involved
|
||||
# and also appears to be used by all sorts of law enforcement agencies. For one they
|
||||
# do not obey robots.txt and continually disguise their User-Agent strings. Time will
|
||||
# tell if this is all correct or not.
|
||||
# For now see - https://en.wikipedia.org/wiki/Cyveillance
|
||||
|
||||
# IMPORTANT UPDATE ON Cyveillance / Qwest Communications !!!
|
||||
# **********************************************************
|
||||
# I have done a lot of research on Cyveillance now and through monitoring my logs I know
|
||||
# for sure what companies are using them and what they are actually looking for.
|
||||
# My research has led me to understand that Cyveillance services are used by hundreds
|
||||
# of companies to help them dicsover theft of copyrighted materials like images, movies
|
||||
# music and other materials. I personally believe a lot of block lists who originally recommended
|
||||
# blocking Cyveillance have done so to protect their torrent or p2p sites from being scanned.
|
||||
# I personally have now unblocked them as image theft is a big problem of mine but if you
|
||||
# do want to block Cyveillance you can simply modify the entries in the block below from "0" to "1"
|
||||
# Getty Images is one such company who appears to use Cyveillance to help monitor for copyright theft.
|
||||
|
||||
# If you really do want to block them change all the 0's below to 1.
|
||||
|
||||
38.100.19.8/29 0;
|
||||
38.100.21.0/24 0;
|
||||
38.100.41.64/26 0;
|
||||
38.105.71.0/25 0;
|
||||
38.105.83.0/27 0;
|
||||
38.112.21.140/30 0;
|
||||
38.118.42.32/29 0;
|
||||
63.144.0.0/13 0;
|
||||
65.112.0.0/12 0;
|
||||
65.213.208.128/27 0;
|
||||
65.222.176.96/27 0;
|
||||
65.222.185.72/29 0;
|
||||
|
||||
# ****************
|
||||
# Berkely Scanner
|
||||
# ****************
|
||||
|
||||
# The Berkeley University has a scanner testing all over the web sending a complex
|
||||
# payload an expecting a reply from servers who are infected or who just respond to such
|
||||
# a payload. The payload looks similar to this
|
||||
# "$\xC9\xE1\xDC\x9B+\x8F\x1C\xE71\x99\xA8\xDB6\x1E#\xBB\x19#Hx\xA7\xFD\x0F9-"
|
||||
# and is sometime VERY long. You may have noticed this in your logs.
|
||||
# I support research projects and all my servers respond with an error to this type of
|
||||
# string so I do not block them but if you want to block just uncomment the following line
|
||||
# or email them asking them not to scan your server. They do respond.
|
||||
# Visit http://169.229.3.91/ for more info
|
||||
|
||||
# If you really do want to block them change all the 0 below to 1.
|
||||
|
||||
169.229.3.91 0;
|
|
@ -0,0 +1,41 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO BLACKLIST OR WHITELIST ANY BAD USER-AGENT STRINGS YOU WANT TO SCAN FOR
|
||||
# ****************************************************************************************************
|
||||
|
||||
# Add One Entry Per Line - List all the extra bad User-Agents you want to permanently block or whitelist.
|
||||
|
||||
# This is for User-Agents that are not included in the main list of the bot blocker
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# This allows you finer control of keeping certain bots blocked and automatic updates will
|
||||
# Never be able to remove this custom list of yours
|
||||
|
||||
# Please note this include file loads first before any of the already whitelisted User-Agents
|
||||
# in the bad bot blocker. By loading first in line it over-rides anything below it so for instance
|
||||
# if you want to block Baidu, Google or Bing for any reason you add them to this file which loads
|
||||
# first and takes precedence over anything below it. This now allows even finer control over the
|
||||
# bad bot blocker. Enjoy !!!
|
||||
|
||||
# Even though this file is called blacklist-user-agents, as mentioned it can also be used to whitelist user agents
|
||||
# By adding them below and setting the 3; to 0; this will permanently whitelist the User-Agent.
|
||||
|
||||
# Make sure any words that contain special characters are escaped and include word boundaries as per the Regex examples below.
|
||||
|
||||
# Example the User-Agent name "someverybaduseragentname1" is entered as "\bsomeverybaduseragentname1\b"
|
||||
# Example the User-Agent name "some-very-bad-useragentname2" is entered as "\bsome\-very\-bad\-useragentname1\b"
|
||||
# the "\b" are word boundaries which prevents partial matching and false positives.
|
||||
|
||||
# *********************
|
||||
# WHITELISTING EXAMPLES
|
||||
# *********************
|
||||
|
||||
"~*\bsomeverygooduseragentname1\b" 0;
|
||||
"~*\bsomeverygooduseragentname2\b" 0;
|
||||
"~*\bsome\-very\-good\-useragentname2\b" 0;
|
||||
|
||||
# *********************
|
||||
# BLACKLISTING EXAMPLES
|
||||
# *********************
|
||||
|
||||
"~*\bsomeverybaduseragentname1\b" 3;
|
||||
"~*\bsomeverybaduseragentname2\b" 3;
|
||||
"~*\bsome\-very\-bad\-useragentname2\b" 3;
|
||||
|
45
.dev-tools/_conf_files_test2/bots.d/blockbots.conf
Normal file
45
.dev-tools/_conf_files_test2/bots.d/blockbots.conf
Normal file
|
@ -0,0 +1,45 @@
|
|||
#######################################################################
|
||||
|
||||
# Author: Mitchell Krog <mitchellkrog@gmail.com> - https://github.com/mitchellkrogza/
|
||||
|
||||
# Include this in a vhost file within a server {} block using and include statement like below
|
||||
|
||||
# server {
|
||||
# #Config stuff here
|
||||
# include /etc/nginx/bots.d/blockbots.conf
|
||||
# include /etc/nginx/bots.d/ddos.conf
|
||||
# #Other config stuff here
|
||||
# }
|
||||
|
||||
#######################################################################
|
||||
|
||||
# BOTS
|
||||
# ****
|
||||
#limit_conn bot1_connlimit 100;
|
||||
limit_conn bot2_connlimit 10;
|
||||
#limit_req zone=bot1_reqlimitip burst=50;
|
||||
limit_req zone=bot2_reqlimitip burst=10;
|
||||
if ($bad_bot = '3') {
|
||||
return 444;
|
||||
}
|
||||
|
||||
# BAD REFER WORDS
|
||||
# ***************
|
||||
if ($bad_words) {
|
||||
return 444;
|
||||
}
|
||||
|
||||
|
||||
# REFERERS
|
||||
# ********
|
||||
if ($bad_referer) {
|
||||
return 444;
|
||||
}
|
||||
|
||||
# IP BLOCKS
|
||||
# *********
|
||||
if ($validate_client) {
|
||||
return 444;
|
||||
}
|
||||
|
||||
#######################################################################
|
|
@ -0,0 +1,15 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO ADD ANY ADDITIONAL BAD REFERRER DOMAINS YOU WANT TO SCAN FOR ###
|
||||
|
||||
# This is merely an example and gets auto included as since Version 2.2017.07 introduced on 2017-04-20
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# Only add one entry per line
|
||||
|
||||
# Make sure any domains have dots and special characters escaped as per the Regex examples below.
|
||||
# For example some-veryvery-randomwebsitename-thatdoesnotexist4.com should be entered as
|
||||
# some\-veryvery\-randomwebsitename\-thatdoesnotexist4\.com
|
||||
|
||||
"~*someveryveryrandomwebsitenamethatdoesnotexist1\.com" 1;
|
||||
"~*someveryveryrandomwebsitenamethatdoesnotexist2\.com" 1;
|
||||
"~*someveryveryrandomwebsitenamethatdoesnotexist3\.com" 1;
|
||||
"~*some\-veryvery\-randomweb\-sitenamethatdoesnotexist4\.com" 1;
|
||||
|
17
.dev-tools/_conf_files_test2/bots.d/ddos.conf
Normal file
17
.dev-tools/_conf_files_test2/bots.d/ddos.conf
Normal file
|
@ -0,0 +1,17 @@
|
|||
#######################################################################
|
||||
|
||||
# Author: Mitchell Krog <mitchellkrog@gmail.com> - https://github.com/mitchellkrogza/
|
||||
|
||||
# Include this in a vhost file within a server {} block using and include statement like below
|
||||
|
||||
# server {
|
||||
# #Config stuff here
|
||||
# include /etc/nginx/bots.d/blockbots.conf
|
||||
# include /etc/nginx/bots.d/ddos.conf
|
||||
# #Other config stuff here
|
||||
# }
|
||||
|
||||
#######################################################################
|
||||
|
||||
limit_conn addr 200;
|
||||
limit_req zone=flood burst=200 nodelay;
|
13
.dev-tools/_conf_files_test2/bots.d/whitelist-domains.conf
Normal file
13
.dev-tools/_conf_files_test2/bots.d/whitelist-domains.conf
Normal file
|
@ -0,0 +1,13 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO WHITELIST YOUR OWN DOMAIN NAMES AND SPARE THEM FROM ANY REFERRER CHECKING ###
|
||||
|
||||
# Add One Entry Per Line - List all your own domains of the sites you host on the server
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# Automatic updates will never be able to remove this custom list of yours
|
||||
# Add One Entry Per Line
|
||||
|
||||
# Make sure any domains have dots and special characters escaped as per the Regex examples below.
|
||||
# For example myfirstowndomainname.com should be entered as myfirstowndomainname\.com
|
||||
# and my-second-owndomainname.com should be entered as my\-second\-owndomainname\.com
|
||||
|
||||
"~*myfirstowndomainname\.com" 0;
|
||||
"~*my\-second\-owndomainname\.com" 0;
|
10
.dev-tools/_conf_files_test2/bots.d/whitelist-ips.conf
Normal file
10
.dev-tools/_conf_files_test2/bots.d/whitelist-ips.conf
Normal file
|
@ -0,0 +1,10 @@
|
|||
# EDIT THIS FILE AS YOU LIKE TO WHITELIST ALL YOUR IP ADDRESSES AND IP RANGES ###
|
||||
|
||||
# Add One Entry Per Line - List all your IP's and IP Ranges you want to whitelist
|
||||
# This file must exist on your system or Nginx will fail a reload due to a missing file
|
||||
# Automatic updates will never be able to remove this custom list of yours
|
||||
# Add One Entry Per Line - No need to include 127.0.0.1 as it is covered elsewhere
|
||||
# Only add actual IP addresses and ranges here
|
||||
|
||||
111.111.111.111 0;
|
||||
35.184.196.49 0;
|
|
@ -0,0 +1,4 @@
|
|||
server_names_hash_bucket_size 64;
|
||||
server_names_hash_max_size 4096;
|
||||
limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
|
||||
limit_conn_zone $binary_remote_addr zone=addr:50m;
|
6571
.dev-tools/_conf_files_test2/conf.d/globalblacklist.conf
Normal file
6571
.dev-tools/_conf_files_test2/conf.d/globalblacklist.conf
Normal file
File diff suppressed because it is too large
Load diff
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:29 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:29 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:29 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:29 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:29 SAST 2017
|
||||
|
||||
<?php
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:29 SAST 2017
|
||||
|
||||
<?php
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:32 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:32 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:32 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:32 SAST 2017
|
||||
|
||||
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||
Dload Upload Total Spent Left Speed
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:32 SAST 2017
|
||||
|
||||
<?php
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Last Tested: Tue Jul 25 12:04:18 SAST 2017
|
||||
Last Tested: Tue Jul 25 12:16:32 SAST 2017
|
||||
|
||||
<?php
|
||||
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
|
||||
### VERSION INFORMATION #
|
||||
###################################################
|
||||
### Version: V3.2017.07.750
|
||||
### Updated: Tue Jul 25 12:04:18 SAST 2017
|
||||
### Version: V3.2017.07.751
|
||||
### Updated: Tue Jul 25 12:16:33 SAST 2017
|
||||
### Bad Referrer Count: 5444
|
||||
### Bad Bot Count: 499
|
||||
###################################################
|
||||
|
|
Binary file not shown.
Binary file not shown.
|
@ -7,7 +7,7 @@
|
|||
##### Copyright Mitchell Krog <mitchellkrog@gmail.com>
|
||||
|
||||
_______________
|
||||
#### Version: V3.2017.07.750
|
||||
#### Version: V3.2017.07.751
|
||||
#### Bad Referrer Count: 5444
|
||||
#### Bad Bot Count: 499
|
||||
____________________
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
##### Copyright Mitchell Krog <mitchellkrog@gmail.com>
|
||||
|
||||
_______________
|
||||
#### Version: V3.2017.07.750
|
||||
#### Version: V3.2017.07.751
|
||||
#### Bad Referrer Count: 5444
|
||||
#### Bad Bot Count: 499
|
||||
____________________
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
##### The Ultimate Nginx Bad Bot, User-Agent, Spam Referrer Blocker, Adware, Malware and Ransomware Blocker, Clickjacking Blocker, Click Re-Directing Blocker, SEO Companies and Bad IP Blocker with Anti DDOS System, Nginx Rate Limiting and Wordpress Theme Detector Blocking
|
||||
|
||||
_______________
|
||||
#### Version: V3.2017.07.750
|
||||
#### Version: V3.2017.07.751
|
||||
#### Bad Referrer Count: 5444
|
||||
#### Bad Bot Count: 499
|
||||
____________________
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
# EASY CONFIGURATION INSTRUCTIONS FOR STOPPING GOOGLE ANALYTICS "GHOST" SPAM
|
||||
|
||||
_______________
|
||||
#### Version: V3.2017.07.750
|
||||
#### Version: V3.2017.07.751
|
||||
#### Bad Referrer Count: 5444
|
||||
#### Bad Bot Count: 499
|
||||
____________________
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
|
||||
### VERSION INFORMATION #
|
||||
###################################################
|
||||
### Version: V3.2017.07.750
|
||||
### Updated: Tue Jul 25 12:04:18 SAST 2017
|
||||
### Version: V3.2017.07.751
|
||||
### Updated: Tue Jul 25 12:16:33 SAST 2017
|
||||
### Bad Referrer Count: 5444
|
||||
### Bad Bot Count: 499
|
||||
###################################################
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
|
||||
### VERSION INFORMATION #
|
||||
###################################################
|
||||
### Version: V3.2017.07.750
|
||||
### Updated: Tue Jul 25 12:04:18 SAST 2017
|
||||
### Version: V3.2017.07.751
|
||||
### Updated: Tue Jul 25 12:16:33 SAST 2017
|
||||
### Bad Referrer Count: 5444
|
||||
### Bad Bot Count: 499
|
||||
###################################################
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
### Version Information #
|
||||
###################################################
|
||||
### Version: V3.2017.07.750
|
||||
### Updated: Tue Jul 25 12:04:19 SAST 2017
|
||||
### Version: V3.2017.07.751
|
||||
### Updated: Tue Jul 25 12:16:33 SAST 2017
|
||||
### Bad Bot Count: 499
|
||||
###################################################
|
||||
### Version Information ##
|
||||
|
|
Loading…
Add table
Reference in a new issue