V4.2019.06.1645 [ci skip]

This commit is contained in:
Travis 2019-06-27 13:28:17 +02:00
parent b3601d427e
commit 8ff3b4c1fa
34 changed files with 2737 additions and 2377 deletions

View file

@ -33,4 +33,4 @@
# 111.111.111.111 0; # 111.111.111.111 0;
35.193.7.13 0; 35.202.145.110 0;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1644 ### Version: V4.2019.06.1645
### Updated: Thu Jun 27 13:12:21 SAST 2019 ### Updated: Thu Jun 27 13:24:55 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -33,4 +33,4 @@
# 111.111.111.111 0; # 111.111.111.111 0;
35.193.7.13 0; 35.202.145.110 0;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1644 ### Version: V3.2019.06.1645
### Updated: Thu Jun 27 13:12:23 SAST 2019 ### Updated: Thu Jun 27 13:24:56 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -1,2 +1,2 @@
35.192.85.2 1; 104.154.120.187 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
35.192.85.2 0; 104.154.120.187 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,16 +1,21 @@
### ********************************** ### -----------------------------------------------------------
### THE ULTIMATE NGINX BAD BOT BLOCKER ### THE NGINX ULTIMATE BAD BOT, BAD IP AND BAD REFERRER BLOCKER
### ********************************** ### -----------------------------------------------------------
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1643 ### Version: V3.2019.06.1645
### Updated: Thu Jun 27 12:59:42 SAST 2019 ### Updated: Thu Jun 27 13:24:56 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
### --------------------------------------------
### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
############################################################################## ##############################################################################
# _ __ _ # # _ __ _ #
# / |/ /__ _(_)__ __ __ # # / |/ /__ _(_)__ __ __ #
@ -28,12 +33,16 @@
### and also has rate limiting functionality for bad bots who you only want to rate limit ### and also has rate limiting functionality for bad bots who you only want to rate limit
### and not actually block out entirely. It is very powerful and also very flexible. ### and not actually block out entirely. It is very powerful and also very flexible.
### --------------------------------------------------------------------------
### Created By: https://github.com/mitchellkrogza/ ### Created By: https://github.com/mitchellkrogza/
### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker ### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
### Copyright Mitchell Krog - <mitchellkrog@gmail.com> ### Copyright Mitchell Krog - <mitchellkrog@gmail.com>
### Contributors: Stuart Cardall - https://github.com/itoffshore ### Contributors: Stuart Cardall - https://github.com/itoffshore
### --------------------------------------------------------------------------
### --------------------------------------------------------------------------
### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04) ### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04)
### --------------------------------------------------------------------------
### This list was developed and is in use on a live Nginx server running some very busy web sites. ### This list was developed and is in use on a live Nginx server running some very busy web sites.
### It was built from the ground up using real data from daily logs and is updated almost daily. ### It was built from the ground up using real data from daily logs and is updated almost daily.
@ -41,9 +50,9 @@
### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked ### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked
### before they are added. It is monitored extensively for any false positives. ### before they are added. It is monitored extensively for any false positives.
### ********* ### ---------
### Features: ### Features:
### ********* ### ---------
### Clear formatting for Ease of Maintenance. ### Clear formatting for Ease of Maintenance.
### Alphabetically ordered lists for Ease of Maintenance. ### Alphabetically ordered lists for Ease of Maintenance.
### Extensive Commenting for Ease of Reference. ### Extensive Commenting for Ease of Reference.
@ -54,40 +63,38 @@
### IP range blocking / whitelisting. ### IP range blocking / whitelisting.
### Rate Limiting Functions. ### Rate Limiting Functions.
### ************ ### ------------
### INSTALLATION ### INSTALLATION
### ************ ### ------------
### PLEASE use the install, setup and update scripts provided for you to ease your installation. ### PLEASE use the install, setup and update scripts provided for you to ease your installation.
### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files. ### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files.
### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore ### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore
### There are also manual configuration instructions provided for those not wishing to do an auto install. ### There are also manual configuration instructions provided for those not wishing to do an auto install.
### *********************************************** ### -----------------------------------------------
### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!! ### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!!
### *********************************************** ### -----------------------------------------------
### Note that: ### SETTINGS:
### ---------------------------------------------
### 0 = allowed - no limits ### 0 = allowed - no limits
### 1 = allowed or rate limited less restrictive ### 1 = allowed or rate limited less restrictive
### 2 = rate limited more ### 2 = rate limited more
### 3 = block completely ### 3 = block completely
### ---------------------------------------------
### ************************************************************ ### ------------------------------------------------------------
### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS ### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS
### ************************************************************ ### ------------------------------------------------------------
### For contributing, corrections or adding bots or referrers to this repo, ### For contributing, corrections or adding bots or referrers to this repo,
### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder ### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder
### All Pull Requests will be checked for accuracy before being merged. ### All Pull Requests will be checked for accuracy before being merged.
# ********************************* # -----------------------
# FIRST BLOCK BY USER-AGENT STRINGS
# *********************************
# ***********************
# !!!!! PLEASE TEST !!!!! # !!!!! PLEASE TEST !!!!!
# *********************** # -----------------------
# ALWAYS test any User-Agent Strings you add here to make sure you have it right # ALWAYS test any User-Agent Strings you add here to make sure you have it right
# Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your # Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your
@ -98,36 +105,46 @@
# curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client) # curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client)
# curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection) # curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection)
# In this section we allow/disallow specific User Agents / Bots.
# ********************************************************************* # =======================
# Now we map all good and bad user agents to a variable called $bad_bot # START BLOCKER FUNCTIONS
# ********************************************************************* # =======================
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# DO NOT EDIT ANYTHING BELOW THIS LINE !!!
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# =============================
# BEGIN SECTION 1 - USER-AGENTS
# =============================
# ALLOW / BLOCK User Agents / Bots
# -------------------------------------------------------------------
# Map all GOOD and BAD UA (User Agents) to a variable called $bad_bot
# -------------------------------------------------------------------
map $http_user_agent $bad_bot { map $http_user_agent $bad_bot {
default 0; default 0;
# *********************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# ***********************************************
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it, meaning you can over-ride anything in this blocker to your liking.
# ***********************************************************************************
# START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it.
# This include file alows you to over-ride any Bad / Good UA (Bot) declared in this blocker to your liking.
include /etc/nginx/bots.d/blacklist-user-agents.conf; include /etc/nginx/bots.d/blacklist-user-agents.conf;
# ********************************************************************************* # ---------------------------------------------------------------------------------
# END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************************* # ---------------------------------------------------------------------------------
# ********************************************* # --------------------------------------------------
# Bad User-Agent Strings That We Block Outright # BAD UA (User-Agent) Strings That We Block Outright
# ********************************************* # --------------------------------------------------
# START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)360Spider(?:\b|)" 3; "~*(?:\b)360Spider(?:\b|)" 3;
@ -688,9 +705,16 @@ map $http_user_agent $bad_bot {
"~*(?:\b)ZyBorg(?:\b|)" 3; "~*(?:\b)ZyBorg(?:\b|)" 3;
# END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *********************************************** # --------------------------------------------
# Allow Good User-Agent Strings We Know and Trust # GOOD UA User-Agent Strings We Know and Trust
# *********************************************** # --------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# If you think GoogleBot is bad you would simply add them to
# blacklist-user-agents.conf with a value of 1
# -----------------------------------------------------------------------
# START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)adidxbot(?:\b|)" 0; "~*(?:\b)adidxbot(?:\b|)" 0;
@ -727,12 +751,13 @@ map $http_user_agent $bad_bot {
"~*(?:\b)yahoo(?:\b|)" 0; "~*(?:\b)yahoo(?:\b|)" 0;
# END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *************************************************** # --------------------------------------------------------
# User-Agent Strings Allowed Through but Rate Limited # GOOD UA User-Agent Rate Limiting 1 - Disabled by Default
# *************************************************** # --------------------------------------------------------
# Some people block libwww-perl, it used widely in many valid (non rogue) agents # TO ACTIVATE THIS RATE LIMITING Uncomment these two lines in blockbots.conf
# I allow libwww-perl as I use it for monitoring systems with Munin but it is rate limited #limit_conn bot1_connlimit 100;
#limit_req zone=bot1_reqlimitip burst=50;
# START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)jetmon(?:\b|)" 1; "~*(?:\b)jetmon(?:\b|)" 1;
@ -743,9 +768,14 @@ map $http_user_agent $bad_bot {
"~*(?:\b)Wget/1.15(?:\b|)" 1; "~*(?:\b)Wget/1.15(?:\b|)" 1;
# END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# ************************************************************** # -------------------------------------------------------
# Rate Limited User-Agents who get a bit aggressive on bandwidth # GOOD UA User-Agent Rate Limiting 2 - Enabled by Default
# ************************************************************** # -------------------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# -----------------------------------------------------------------------
# START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)Alexa(?:\b|)" 2; "~*(?:\b)Alexa(?:\b|)" 2;
@ -769,162 +799,185 @@ map $http_user_agent $bad_bot {
} }
# ===========================
# END SECTION 1 - USER-AGENTS
# ===========================
# ***************************************** # =======================================
# SECOND BLOCK BY REFERRER STRINGS AND URLS # BEGIN SECTION 2 - REFERRERS AND DOMAINS
# ***************************************** # =======================================
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page
# curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page
# ------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit # Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit
# make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www. # make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www.
# and it also does not care if the referrer request was sent with http https or even ftp. # and it also does not care if the referrer request was sent with http https or even ftp.
# ------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # ----------------------------------------------------------------
# Now we map all bad referrer words below to a variable called $bad_words # Map all BAD referrer words below to a variable called $bad_words
# *********************************************************************** # ----------------------------------------------------------------
# --------------------------------
# START Bad Referrer Word Scanning
# --------------------------------
map $http_referer $bad_words { map $http_referer $bad_words {
default 0; default 0;
# ************************** # -------------------------------------------------------------------------------------------
# Bad Referrer Word Scanning
# **************************
# These are Words and Terms often found tagged onto domains or within url query strings. # These are Words and Terms often found tagged onto domains or within url query strings.
# Create and Customize Your Own Bad Referrer Words Here using the new Include File Method # Create and Customize Your Own Bad Referrer Words Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# customized list of bad referrer words are automatically now included for you # customized list of bad referrer words are automatically now included for you
# Read Comments inside bad-referrer-words.conf for customization tips. # Read Comments inside bad-referrer-words.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# BE VERY CAREFUL using the bad-referrer-words.conf file - please read the comment and # BE VERY CAREFUL using this bad-referrer-words.conf file - please read the comments and
# examples inside the include file for detailed explanations into how seriously this can # examples inside the include file for detailed explanations into how seriously this can
# affect your own site from serving assets or other innocent sites from accessing your site # affect your own site from serving assets or other innocent sites from accessing your site
# For safety sake the whitelist-domains.conf file is also loaded here before the bad-referrer-words.conf file. # For safety sake the whitelist-domains.conf file is also loaded here before the
# bad-referrer-words.conf file is loaded.
# -------------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# ****************************************************************************** # ------------------------------------------------------------------------------
# START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ****************************************************************************** # ------------------------------------------------------------------------------
include /etc/nginx/bots.d/bad-referrer-words.conf; include /etc/nginx/bots.d/bad-referrer-words.conf;
# **************************************************************************** # ----------------------------------------------------------------------------
# END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# **************************************************************************** # ----------------------------------------------------------------------------
} }
# --------------------------------
# END Bad Referrer Word Scanning
# --------------------------------
# *************************
# Bad Referrer Domain Names
# *************************
# Now a list of bad referrer urls these domains or any combination of them ie .com .net # ----------------------------------------
# will be blocked out. Doesn't matter if the protocol is http, https or even ftp # START Good and Bad Referrer Domain Names
# ----------------------------------------
# -------------------------------------------------------------------------------------
# Good and Bad referrer urls Doesn't matter if the protocol is http, https or even ftp
# -------------------------------------------------------------------------------------
# ----------------------
# This section includes: # This section includes:
# ********************** # ----------------------
# --------------------------------------------------------------------------------
# Blocking of SEO company Semalt.com (now merged into this one section) # Blocking of SEO company Semalt.com (now merged into this one section)
# MIRAI Botnet Domains Used for Mass Attacks # MIRAI Botnet Domains Used for Mass Attacks
# Other known bad SEO companies and Ad Hijacking Sites # Other known bad SEO companies and Ad Hijacking Sites
# Sites linked to malware, adware, clickjacking and ransomware # Sites linked to malware, adware, clickjacking and ransomware
# Domain names and referrers used in referrer spam and seo hijacking
# Whitelisting of your own GOOD domains / referrers
# Whitelisting of any other GOOD domains / referrers you want explicitly NOT block
# --------------------------------------------------------------------------------
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test. # Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test.
# ------------------------------------------------------------------------------------------------------------------------------------
# For Example any of the following variations below of 8gold.com will be detected and blocked # For Example any of the following variations below of 8gold.com will be detected and blocked
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# So if you see a bad referrer from wearegoogle.com and you want to block them just add # So if you see a bad referrer from wearegoogle.com and you want to block them just add
# them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will # them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will
# kill all your SEO in a week. # kill all your SEO in a week.
# ------------------------------------------------------------------------------------------------------------------------------------
# To add your own custom bad referrers use the custom include file # To add your own custom bad referrers use the custom include file
# /etc/nginx/bots.d/custom-bad-referrers.conf # /etc/nginx/bots.d/custom-bad-referrers.conf
# Or send a Pull Request to add it to the global blacklist for other users. # Or send a Pull Request to add it to the global blacklist for other users.
# In the bad referrers section I also include sites that hotlink images without permission. # In the bad referrers section I also include sites that hotlink images without permission.
# ------------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # --------------------------------------------------------------------
# Now we map all good & bad referrer urls to variable called #bad_referer # Map all good & bad referrer DOMAINS to a variable called bad_referer
# *********************************************************************** # --------------------------------------------------------------------
map $http_referer $bad_referer { map $http_referer $bad_referer {
hostnames; hostnames;
default 0; default 0;
# ************************************* # --------------------------------------------
# GOOD REFERRERS - Spared from Checking # GOOD REFERRER DOMAINS - Spared from Checking
# ************************************* # --------------------------------------------
# ---------------------------------------------------------------------------------------
# Add all your own web site domain names and server names in this section # Add all your own web site domain names and server names in this section
# WHITELIST Your Own Domain Names Here using the new Include File Method # WHITELIST Your Own Domain Names Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted domain names are automatically now included for you. # whitelisted domain names are automatically now included for you.
# Read Comments inside whitelist-domains.conf for customization tips. # Read Comments inside whitelist-domains.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# ---------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# *********************************** # -----------------------------------
# CUSTOM BAD REFERRERS - Add your Own # CUSTOM BAD REFERRERS - Add your Own
# *********************************** # -----------------------------------
# Add any extra bad referrers in the following include file to have them # Add any extra bad referrers in the following include file to have them
# permanently included and blocked - avoid duplicates in your custom file # permanently included and blocked - avoid duplicates in your custom file
# custom-bad-referrers.conf is BOTH a BLACKLIST AND WHITELIST
# custom-bad-referrers.conf ALLOWS complete over-riding of anything
# If you think google.com is bad you would simply add them to
# custom-bad-referrers.conf with a value of 1
# ************************************************************************* # -------------------------------------------------------------------------
# START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
include /etc/nginx/bots.d/custom-bad-referrers.conf; include /etc/nginx/bots.d/custom-bad-referrers.conf;
# *********************************************************************** # -----------------------------------------------------------------------
# END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************** # -----------------------------------------------------------------------
# START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)000free\.us(?:\b|)" 1; "~*(?:\b)000free\.us(?:\b|)" 1;
@ -7644,137 +7697,49 @@ map $http_referer $bad_referer {
# END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# =====================================
# END SECTION 2 - REFERRERS AND DOMAINS
# =====================================
# *********************************************** # ========================================================================
# WHITELISTING AND BLACKLISTING IP ADDRESS RANGES # BEGIN SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# *********************************************** # ========================================================================
# Geo directive to deny and also whitelist certain ip addresses # --------------------------------------------------------------------------------------
# Map all GOOD and BAD IP Addresses and Ranges to a variable called geo $validate_client
# --------------------------------------------------------------------------------------
geo $validate_client { geo $validate_client {
# ********************
# First Our Safety Net
# ********************
# Anything not matching our rules is allowed through with default 0;
default 0; default 0;
# *********************************** # ----------------------------------------------
# Whitelist all your OWN IP addresses # Whitelist all your OWN IP addresses and Ranges
# *********************************** # ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below. # WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you. # whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips. # Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# ************************************************************************** # --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************** # --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************ # ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
# **************** # -------------------------------------
# Google IP Ranges # BLOCK known Wordpress Theme Detectors
# **************** # -------------------------------------
# For Safety Sake all Google's Known IP Ranges are all white listed
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# **************
# Bing IP Ranges
# **************
# For Safety Sake all Bing's Known IP Ranges are all white listed
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ********************
# Cloudflare IP Ranges
# ********************
# For Safety Sake all Cloudflare's Known IP Ranges are all white listed
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# *************************
# Wordpress Theme Detectors
# *************************
# START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
@ -7818,10 +7783,11 @@ geo $validate_client {
89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector 89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector
# END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
# **************************************** # ----------------------------------------------
# NIBBLER - SEO testing and reporting tool # BLOCK NIBBLER - SEO testing and reporting tool
# **************************************** # ----------------------------------------------
# See - http://nibbler.silktide.com/ # See - http://nibbler.silktide.com/
# ----------------------------------------------
# START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
52.201.238.175 1; 52.201.238.175 1;
@ -7834,33 +7800,10 @@ geo $validate_client {
# END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
# **************************** # -----------------------------------------
# Known Bad IP's and IP Ranges # BLOCK KNOWN BAD IP ADDRESSES
# ************************************************* # Top known bad IP Adresses from abuseIPDB
# Blacklist IP addresses and IP Ranges Customizable # -----------------------------------------
# *************************************************
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# ********************************************************************
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************
include /etc/nginx/bots.d/blacklist-ips.conf;
# ******************************************************************
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ******************************************************************
# *********************************************************************************************
# KNOWN BAD IP ADDRESSES
# Source: https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
# A Reliable Daily Updated List Included Below of Known Bad IP Addresses, Snoopers and Sniffers
# *********************************************************************************************
# START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
193.32.163.89 1; 193.32.163.89 1;
@ -17864,33 +17807,176 @@ geo $validate_client {
46.101.115.65 1; 46.101.115.65 1;
# END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
# --------------------------
# WHITELIST Google IP Ranges
# --------------------------
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------
# WHITELIST Bing IP Ranges
# ------------------------
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------------
# WHITELIST Cloudflare IP Ranges
# ------------------------------
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# -------------------------------------------------
# BLACKLIST IP addresses and IP Ranges Customizable
# -------------------------------------------------
# --------------------------------------------------------------------------------------
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# Anything added to blacklist-ips.conf will over-ride anything whitelisted above
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------
include /etc/nginx/bots.d/blacklist-ips.conf;
# ------------------------------------------------------------------
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------
# ----------------------------------------------
# Whitelist all your OWN IP addresses and Ranges
# ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf;
# ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------------
} }
# --------------------------------------------------------------------------------------
# WHITELIST your own IPs from the DDOS Filter # WHITELIST your own IPs from the DDOS Filter
# Add your own IP addresses and ranges into the custom include file whitelist-ips.conf # Add your own IP addresses and ranges into the custom include file whitelist-ips.conf
# to spare them from the rate limiting DDOS filter. # to spare them from the rate limiting DDOS filter.
# This section includes the same / single whitelist-ips.conf file so you only # This section includes the same / single whitelist-ips.conf file so you only
# need to edit that include file and have it include here for you too. # need to edit that include file and have it include here for you too.
# --------------------------------------------------------------------------------------
geo $ratelimited { geo $ratelimited {
default 1; default 1;
# *************************************************************************** # ---------------------------------------------------------------------------
# START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *************************************************************************** # ---------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************* # -------------------------------------------------------------------------
# END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
} }
# ***************************************** # ======================================================================
# MAP BAD BOTS TO OUR RATE LIMITER FUNCTION # END SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# ***************************************** # ======================================================================
# ============================================
# BEGIN SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
# ============================================
# --------------------------------------------
# 1. MAP BAD BOTS TO OUR RATE LIMITER FUNCTION
# --------------------------------------------
map $bad_bot $bot_iplimit { map $bad_bot $bot_iplimit {
0 ""; 0 "";
@ -17898,30 +17984,31 @@ geo $ratelimited {
2 $binary_remote_addr; 2 $binary_remote_addr;
} }
# *********************** # --------------------------
# SET RATE LIMITING ZONES # 2. SET RATE LIMITING ZONES
# *********************** # --------------------------
# BAD BOT RATE LIMITING ZONE # BAD BOT RATE LIMITING ZONE
# limits for Zone $bad_bot = 1 # Rate limiting will only take effect if on any User-Agents with a value of 2
# Nothing Set - you can set a different zone limiter here if you like
# We issue a 444 response instead to all bad bots.
# limits for Zone $bad_bot = 2
# this rate limiting will only take effect if you change any of the bots and change
# their block value from 1 to 2.
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=2r/s; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m;
### *** MAKE SURE TO ADD to your nginx.conf *** # ==========================================
### server_names_hash_bucket_size 64; # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
### server_names_hash_max_size 4096; # ==========================================
### limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
### limit_conn_zone $binary_remote_addr zone=addr:50m;
### to allow it to load this large set of domains into memory and to set the rate limiting zones for the DDOS filter.
### THE END of the Long and Winding Road # =====================
# END BLOCKER FUNCTIONS
# =====================
### Also check out my Ultimate Apache Bad Bot Blocker on Github ### --------------------------------------------
### https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker ### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
### FOR APACHE SERVERS
### ---------------------------------------------
### Check out the Ultimate Apache Bad Bot Blocker
### ---------------------------------------------

View file

@ -1,2 +1,2 @@
35.192.85.2 1; 104.154.120.187 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
35.192.85.2 0; 104.154.120.187 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,16 +1,21 @@
### ********************************** ### -----------------------------------------------------------
### THE ULTIMATE NGINX BAD BOT BLOCKER ### THE NGINX ULTIMATE BAD BOT, BAD IP AND BAD REFERRER BLOCKER
### ********************************** ### -----------------------------------------------------------
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1643 ### Version: V3.2019.06.1645
### Updated: Thu Jun 27 12:59:42 SAST 2019 ### Updated: Thu Jun 27 13:24:56 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
### --------------------------------------------
### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
############################################################################## ##############################################################################
# _ __ _ # # _ __ _ #
# / |/ /__ _(_)__ __ __ # # / |/ /__ _(_)__ __ __ #
@ -28,12 +33,16 @@
### and also has rate limiting functionality for bad bots who you only want to rate limit ### and also has rate limiting functionality for bad bots who you only want to rate limit
### and not actually block out entirely. It is very powerful and also very flexible. ### and not actually block out entirely. It is very powerful and also very flexible.
### --------------------------------------------------------------------------
### Created By: https://github.com/mitchellkrogza/ ### Created By: https://github.com/mitchellkrogza/
### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker ### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
### Copyright Mitchell Krog - <mitchellkrog@gmail.com> ### Copyright Mitchell Krog - <mitchellkrog@gmail.com>
### Contributors: Stuart Cardall - https://github.com/itoffshore ### Contributors: Stuart Cardall - https://github.com/itoffshore
### --------------------------------------------------------------------------
### --------------------------------------------------------------------------
### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04) ### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04)
### --------------------------------------------------------------------------
### This list was developed and is in use on a live Nginx server running some very busy web sites. ### This list was developed and is in use on a live Nginx server running some very busy web sites.
### It was built from the ground up using real data from daily logs and is updated almost daily. ### It was built from the ground up using real data from daily logs and is updated almost daily.
@ -41,9 +50,9 @@
### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked ### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked
### before they are added. It is monitored extensively for any false positives. ### before they are added. It is monitored extensively for any false positives.
### ********* ### ---------
### Features: ### Features:
### ********* ### ---------
### Clear formatting for Ease of Maintenance. ### Clear formatting for Ease of Maintenance.
### Alphabetically ordered lists for Ease of Maintenance. ### Alphabetically ordered lists for Ease of Maintenance.
### Extensive Commenting for Ease of Reference. ### Extensive Commenting for Ease of Reference.
@ -54,40 +63,38 @@
### IP range blocking / whitelisting. ### IP range blocking / whitelisting.
### Rate Limiting Functions. ### Rate Limiting Functions.
### ************ ### ------------
### INSTALLATION ### INSTALLATION
### ************ ### ------------
### PLEASE use the install, setup and update scripts provided for you to ease your installation. ### PLEASE use the install, setup and update scripts provided for you to ease your installation.
### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files. ### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files.
### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore ### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore
### There are also manual configuration instructions provided for those not wishing to do an auto install. ### There are also manual configuration instructions provided for those not wishing to do an auto install.
### *********************************************** ### -----------------------------------------------
### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!! ### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!!
### *********************************************** ### -----------------------------------------------
### Note that: ### SETTINGS:
### ---------------------------------------------
### 0 = allowed - no limits ### 0 = allowed - no limits
### 1 = allowed or rate limited less restrictive ### 1 = allowed or rate limited less restrictive
### 2 = rate limited more ### 2 = rate limited more
### 3 = block completely ### 3 = block completely
### ---------------------------------------------
### ************************************************************ ### ------------------------------------------------------------
### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS ### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS
### ************************************************************ ### ------------------------------------------------------------
### For contributing, corrections or adding bots or referrers to this repo, ### For contributing, corrections or adding bots or referrers to this repo,
### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder ### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder
### All Pull Requests will be checked for accuracy before being merged. ### All Pull Requests will be checked for accuracy before being merged.
# ********************************* # -----------------------
# FIRST BLOCK BY USER-AGENT STRINGS
# *********************************
# ***********************
# !!!!! PLEASE TEST !!!!! # !!!!! PLEASE TEST !!!!!
# *********************** # -----------------------
# ALWAYS test any User-Agent Strings you add here to make sure you have it right # ALWAYS test any User-Agent Strings you add here to make sure you have it right
# Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your # Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your
@ -98,36 +105,46 @@
# curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client) # curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client)
# curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection) # curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection)
# In this section we allow/disallow specific User Agents / Bots.
# ********************************************************************* # =======================
# Now we map all good and bad user agents to a variable called $bad_bot # START BLOCKER FUNCTIONS
# ********************************************************************* # =======================
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# DO NOT EDIT ANYTHING BELOW THIS LINE !!!
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# =============================
# BEGIN SECTION 1 - USER-AGENTS
# =============================
# ALLOW / BLOCK User Agents / Bots
# -------------------------------------------------------------------
# Map all GOOD and BAD UA (User Agents) to a variable called $bad_bot
# -------------------------------------------------------------------
map $http_user_agent $bad_bot { map $http_user_agent $bad_bot {
default 0; default 0;
# *********************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# ***********************************************
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it, meaning you can over-ride anything in this blocker to your liking.
# ***********************************************************************************
# START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it.
# This include file alows you to over-ride any Bad / Good UA (Bot) declared in this blocker to your liking.
include /etc/nginx/bots.d/blacklist-user-agents.conf; include /etc/nginx/bots.d/blacklist-user-agents.conf;
# ********************************************************************************* # ---------------------------------------------------------------------------------
# END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************************* # ---------------------------------------------------------------------------------
# ********************************************* # --------------------------------------------------
# Bad User-Agent Strings That We Block Outright # BAD UA (User-Agent) Strings That We Block Outright
# ********************************************* # --------------------------------------------------
# START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)360Spider(?:\b|)" 3; "~*(?:\b)360Spider(?:\b|)" 3;
@ -688,9 +705,16 @@ map $http_user_agent $bad_bot {
"~*(?:\b)ZyBorg(?:\b|)" 3; "~*(?:\b)ZyBorg(?:\b|)" 3;
# END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *********************************************** # --------------------------------------------
# Allow Good User-Agent Strings We Know and Trust # GOOD UA User-Agent Strings We Know and Trust
# *********************************************** # --------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# If you think GoogleBot is bad you would simply add them to
# blacklist-user-agents.conf with a value of 1
# -----------------------------------------------------------------------
# START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)adidxbot(?:\b|)" 0; "~*(?:\b)adidxbot(?:\b|)" 0;
@ -727,12 +751,13 @@ map $http_user_agent $bad_bot {
"~*(?:\b)yahoo(?:\b|)" 0; "~*(?:\b)yahoo(?:\b|)" 0;
# END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *************************************************** # --------------------------------------------------------
# User-Agent Strings Allowed Through but Rate Limited # GOOD UA User-Agent Rate Limiting 1 - Disabled by Default
# *************************************************** # --------------------------------------------------------
# Some people block libwww-perl, it used widely in many valid (non rogue) agents # TO ACTIVATE THIS RATE LIMITING Uncomment these two lines in blockbots.conf
# I allow libwww-perl as I use it for monitoring systems with Munin but it is rate limited #limit_conn bot1_connlimit 100;
#limit_req zone=bot1_reqlimitip burst=50;
# START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)jetmon(?:\b|)" 1; "~*(?:\b)jetmon(?:\b|)" 1;
@ -743,9 +768,14 @@ map $http_user_agent $bad_bot {
"~*(?:\b)Wget/1.15(?:\b|)" 1; "~*(?:\b)Wget/1.15(?:\b|)" 1;
# END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# ************************************************************** # -------------------------------------------------------
# Rate Limited User-Agents who get a bit aggressive on bandwidth # GOOD UA User-Agent Rate Limiting 2 - Enabled by Default
# ************************************************************** # -------------------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# -----------------------------------------------------------------------
# START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)Alexa(?:\b|)" 2; "~*(?:\b)Alexa(?:\b|)" 2;
@ -769,162 +799,185 @@ map $http_user_agent $bad_bot {
} }
# ===========================
# END SECTION 1 - USER-AGENTS
# ===========================
# ***************************************** # =======================================
# SECOND BLOCK BY REFERRER STRINGS AND URLS # BEGIN SECTION 2 - REFERRERS AND DOMAINS
# ***************************************** # =======================================
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page
# curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page
# ------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit # Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit
# make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www. # make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www.
# and it also does not care if the referrer request was sent with http https or even ftp. # and it also does not care if the referrer request was sent with http https or even ftp.
# ------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # ----------------------------------------------------------------
# Now we map all bad referrer words below to a variable called $bad_words # Map all BAD referrer words below to a variable called $bad_words
# *********************************************************************** # ----------------------------------------------------------------
# --------------------------------
# START Bad Referrer Word Scanning
# --------------------------------
map $http_referer $bad_words { map $http_referer $bad_words {
default 0; default 0;
# ************************** # -------------------------------------------------------------------------------------------
# Bad Referrer Word Scanning
# **************************
# These are Words and Terms often found tagged onto domains or within url query strings. # These are Words and Terms often found tagged onto domains or within url query strings.
# Create and Customize Your Own Bad Referrer Words Here using the new Include File Method # Create and Customize Your Own Bad Referrer Words Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# customized list of bad referrer words are automatically now included for you # customized list of bad referrer words are automatically now included for you
# Read Comments inside bad-referrer-words.conf for customization tips. # Read Comments inside bad-referrer-words.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# BE VERY CAREFUL using the bad-referrer-words.conf file - please read the comment and # BE VERY CAREFUL using this bad-referrer-words.conf file - please read the comments and
# examples inside the include file for detailed explanations into how seriously this can # examples inside the include file for detailed explanations into how seriously this can
# affect your own site from serving assets or other innocent sites from accessing your site # affect your own site from serving assets or other innocent sites from accessing your site
# For safety sake the whitelist-domains.conf file is also loaded here before the bad-referrer-words.conf file. # For safety sake the whitelist-domains.conf file is also loaded here before the
# bad-referrer-words.conf file is loaded.
# -------------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# ****************************************************************************** # ------------------------------------------------------------------------------
# START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ****************************************************************************** # ------------------------------------------------------------------------------
include /etc/nginx/bots.d/bad-referrer-words.conf; include /etc/nginx/bots.d/bad-referrer-words.conf;
# **************************************************************************** # ----------------------------------------------------------------------------
# END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# **************************************************************************** # ----------------------------------------------------------------------------
} }
# --------------------------------
# END Bad Referrer Word Scanning
# --------------------------------
# *************************
# Bad Referrer Domain Names
# *************************
# Now a list of bad referrer urls these domains or any combination of them ie .com .net # ----------------------------------------
# will be blocked out. Doesn't matter if the protocol is http, https or even ftp # START Good and Bad Referrer Domain Names
# ----------------------------------------
# -------------------------------------------------------------------------------------
# Good and Bad referrer urls Doesn't matter if the protocol is http, https or even ftp
# -------------------------------------------------------------------------------------
# ----------------------
# This section includes: # This section includes:
# ********************** # ----------------------
# --------------------------------------------------------------------------------
# Blocking of SEO company Semalt.com (now merged into this one section) # Blocking of SEO company Semalt.com (now merged into this one section)
# MIRAI Botnet Domains Used for Mass Attacks # MIRAI Botnet Domains Used for Mass Attacks
# Other known bad SEO companies and Ad Hijacking Sites # Other known bad SEO companies and Ad Hijacking Sites
# Sites linked to malware, adware, clickjacking and ransomware # Sites linked to malware, adware, clickjacking and ransomware
# Domain names and referrers used in referrer spam and seo hijacking
# Whitelisting of your own GOOD domains / referrers
# Whitelisting of any other GOOD domains / referrers you want explicitly NOT block
# --------------------------------------------------------------------------------
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test. # Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test.
# ------------------------------------------------------------------------------------------------------------------------------------
# For Example any of the following variations below of 8gold.com will be detected and blocked # For Example any of the following variations below of 8gold.com will be detected and blocked
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# So if you see a bad referrer from wearegoogle.com and you want to block them just add # So if you see a bad referrer from wearegoogle.com and you want to block them just add
# them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will # them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will
# kill all your SEO in a week. # kill all your SEO in a week.
# ------------------------------------------------------------------------------------------------------------------------------------
# To add your own custom bad referrers use the custom include file # To add your own custom bad referrers use the custom include file
# /etc/nginx/bots.d/custom-bad-referrers.conf # /etc/nginx/bots.d/custom-bad-referrers.conf
# Or send a Pull Request to add it to the global blacklist for other users. # Or send a Pull Request to add it to the global blacklist for other users.
# In the bad referrers section I also include sites that hotlink images without permission. # In the bad referrers section I also include sites that hotlink images without permission.
# ------------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # --------------------------------------------------------------------
# Now we map all good & bad referrer urls to variable called #bad_referer # Map all good & bad referrer DOMAINS to a variable called bad_referer
# *********************************************************************** # --------------------------------------------------------------------
map $http_referer $bad_referer { map $http_referer $bad_referer {
hostnames; hostnames;
default 0; default 0;
# ************************************* # --------------------------------------------
# GOOD REFERRERS - Spared from Checking # GOOD REFERRER DOMAINS - Spared from Checking
# ************************************* # --------------------------------------------
# ---------------------------------------------------------------------------------------
# Add all your own web site domain names and server names in this section # Add all your own web site domain names and server names in this section
# WHITELIST Your Own Domain Names Here using the new Include File Method # WHITELIST Your Own Domain Names Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted domain names are automatically now included for you. # whitelisted domain names are automatically now included for you.
# Read Comments inside whitelist-domains.conf for customization tips. # Read Comments inside whitelist-domains.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# ---------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# *********************************** # -----------------------------------
# CUSTOM BAD REFERRERS - Add your Own # CUSTOM BAD REFERRERS - Add your Own
# *********************************** # -----------------------------------
# Add any extra bad referrers in the following include file to have them # Add any extra bad referrers in the following include file to have them
# permanently included and blocked - avoid duplicates in your custom file # permanently included and blocked - avoid duplicates in your custom file
# custom-bad-referrers.conf is BOTH a BLACKLIST AND WHITELIST
# custom-bad-referrers.conf ALLOWS complete over-riding of anything
# If you think google.com is bad you would simply add them to
# custom-bad-referrers.conf with a value of 1
# ************************************************************************* # -------------------------------------------------------------------------
# START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
include /etc/nginx/bots.d/custom-bad-referrers.conf; include /etc/nginx/bots.d/custom-bad-referrers.conf;
# *********************************************************************** # -----------------------------------------------------------------------
# END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************** # -----------------------------------------------------------------------
# START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)000free\.us(?:\b|)" 1; "~*(?:\b)000free\.us(?:\b|)" 1;
@ -7644,137 +7697,49 @@ map $http_referer $bad_referer {
# END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# =====================================
# END SECTION 2 - REFERRERS AND DOMAINS
# =====================================
# *********************************************** # ========================================================================
# WHITELISTING AND BLACKLISTING IP ADDRESS RANGES # BEGIN SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# *********************************************** # ========================================================================
# Geo directive to deny and also whitelist certain ip addresses # --------------------------------------------------------------------------------------
# Map all GOOD and BAD IP Addresses and Ranges to a variable called geo $validate_client
# --------------------------------------------------------------------------------------
geo $validate_client { geo $validate_client {
# ********************
# First Our Safety Net
# ********************
# Anything not matching our rules is allowed through with default 0;
default 0; default 0;
# *********************************** # ----------------------------------------------
# Whitelist all your OWN IP addresses # Whitelist all your OWN IP addresses and Ranges
# *********************************** # ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below. # WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you. # whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips. # Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# ************************************************************************** # --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************** # --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************ # ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
# **************** # -------------------------------------
# Google IP Ranges # BLOCK known Wordpress Theme Detectors
# **************** # -------------------------------------
# For Safety Sake all Google's Known IP Ranges are all white listed
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# **************
# Bing IP Ranges
# **************
# For Safety Sake all Bing's Known IP Ranges are all white listed
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ********************
# Cloudflare IP Ranges
# ********************
# For Safety Sake all Cloudflare's Known IP Ranges are all white listed
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# *************************
# Wordpress Theme Detectors
# *************************
# START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
@ -7818,10 +7783,11 @@ geo $validate_client {
89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector 89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector
# END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
# **************************************** # ----------------------------------------------
# NIBBLER - SEO testing and reporting tool # BLOCK NIBBLER - SEO testing and reporting tool
# **************************************** # ----------------------------------------------
# See - http://nibbler.silktide.com/ # See - http://nibbler.silktide.com/
# ----------------------------------------------
# START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
52.201.238.175 1; 52.201.238.175 1;
@ -7834,33 +7800,10 @@ geo $validate_client {
# END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
# **************************** # -----------------------------------------
# Known Bad IP's and IP Ranges # BLOCK KNOWN BAD IP ADDRESSES
# ************************************************* # Top known bad IP Adresses from abuseIPDB
# Blacklist IP addresses and IP Ranges Customizable # -----------------------------------------
# *************************************************
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# ********************************************************************
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************
include /etc/nginx/bots.d/blacklist-ips.conf;
# ******************************************************************
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ******************************************************************
# *********************************************************************************************
# KNOWN BAD IP ADDRESSES
# Source: https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
# A Reliable Daily Updated List Included Below of Known Bad IP Addresses, Snoopers and Sniffers
# *********************************************************************************************
# START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
193.32.163.89 1; 193.32.163.89 1;
@ -17864,33 +17807,176 @@ geo $validate_client {
46.101.115.65 1; 46.101.115.65 1;
# END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
# --------------------------
# WHITELIST Google IP Ranges
# --------------------------
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------
# WHITELIST Bing IP Ranges
# ------------------------
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------------
# WHITELIST Cloudflare IP Ranges
# ------------------------------
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# -------------------------------------------------
# BLACKLIST IP addresses and IP Ranges Customizable
# -------------------------------------------------
# --------------------------------------------------------------------------------------
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# Anything added to blacklist-ips.conf will over-ride anything whitelisted above
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------
include /etc/nginx/bots.d/blacklist-ips.conf;
# ------------------------------------------------------------------
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------
# ----------------------------------------------
# Whitelist all your OWN IP addresses and Ranges
# ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf;
# ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------------
} }
# --------------------------------------------------------------------------------------
# WHITELIST your own IPs from the DDOS Filter # WHITELIST your own IPs from the DDOS Filter
# Add your own IP addresses and ranges into the custom include file whitelist-ips.conf # Add your own IP addresses and ranges into the custom include file whitelist-ips.conf
# to spare them from the rate limiting DDOS filter. # to spare them from the rate limiting DDOS filter.
# This section includes the same / single whitelist-ips.conf file so you only # This section includes the same / single whitelist-ips.conf file so you only
# need to edit that include file and have it include here for you too. # need to edit that include file and have it include here for you too.
# --------------------------------------------------------------------------------------
geo $ratelimited { geo $ratelimited {
default 1; default 1;
# *************************************************************************** # ---------------------------------------------------------------------------
# START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *************************************************************************** # ---------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************* # -------------------------------------------------------------------------
# END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
} }
# ***************************************** # ======================================================================
# MAP BAD BOTS TO OUR RATE LIMITER FUNCTION # END SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# ***************************************** # ======================================================================
# ============================================
# BEGIN SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
# ============================================
# --------------------------------------------
# 1. MAP BAD BOTS TO OUR RATE LIMITER FUNCTION
# --------------------------------------------
map $bad_bot $bot_iplimit { map $bad_bot $bot_iplimit {
0 ""; 0 "";
@ -17898,30 +17984,31 @@ geo $ratelimited {
2 $binary_remote_addr; 2 $binary_remote_addr;
} }
# *********************** # --------------------------
# SET RATE LIMITING ZONES # 2. SET RATE LIMITING ZONES
# *********************** # --------------------------
# BAD BOT RATE LIMITING ZONE # BAD BOT RATE LIMITING ZONE
# limits for Zone $bad_bot = 1 # Rate limiting will only take effect if on any User-Agents with a value of 2
# Nothing Set - you can set a different zone limiter here if you like
# We issue a 444 response instead to all bad bots.
# limits for Zone $bad_bot = 2
# this rate limiting will only take effect if you change any of the bots and change
# their block value from 1 to 2.
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=2r/s; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m;
### *** MAKE SURE TO ADD to your nginx.conf *** # ==========================================
### server_names_hash_bucket_size 64; # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
### server_names_hash_max_size 4096; # ==========================================
### limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
### limit_conn_zone $binary_remote_addr zone=addr:50m;
### to allow it to load this large set of domains into memory and to set the rate limiting zones for the DDOS filter.
### THE END of the Long and Winding Road # =====================
# END BLOCKER FUNCTIONS
# =====================
### Also check out my Ultimate Apache Bad Bot Blocker on Github ### --------------------------------------------
### https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker ### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
### FOR APACHE SERVERS
### ---------------------------------------------
### Check out the Ultimate Apache Bad Bot Blocker
### ---------------------------------------------

View file

@ -1,2 +1,2 @@
35.192.85.2 1; 104.154.120.187 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
35.192.85.2 0; 104.154.120.187 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,16 +1,21 @@
### ********************************** ### -----------------------------------------------------------
### THE ULTIMATE NGINX BAD BOT BLOCKER ### THE NGINX ULTIMATE BAD BOT, BAD IP AND BAD REFERRER BLOCKER
### ********************************** ### -----------------------------------------------------------
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1643 ### Version: V3.2019.06.1645
### Updated: Thu Jun 27 12:59:42 SAST 2019 ### Updated: Thu Jun 27 13:24:56 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
### --------------------------------------------
### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
############################################################################## ##############################################################################
# _ __ _ # # _ __ _ #
# / |/ /__ _(_)__ __ __ # # / |/ /__ _(_)__ __ __ #
@ -28,12 +33,16 @@
### and also has rate limiting functionality for bad bots who you only want to rate limit ### and also has rate limiting functionality for bad bots who you only want to rate limit
### and not actually block out entirely. It is very powerful and also very flexible. ### and not actually block out entirely. It is very powerful and also very flexible.
### --------------------------------------------------------------------------
### Created By: https://github.com/mitchellkrogza/ ### Created By: https://github.com/mitchellkrogza/
### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker ### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
### Copyright Mitchell Krog - <mitchellkrog@gmail.com> ### Copyright Mitchell Krog - <mitchellkrog@gmail.com>
### Contributors: Stuart Cardall - https://github.com/itoffshore ### Contributors: Stuart Cardall - https://github.com/itoffshore
### --------------------------------------------------------------------------
### --------------------------------------------------------------------------
### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04) ### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04)
### --------------------------------------------------------------------------
### This list was developed and is in use on a live Nginx server running some very busy web sites. ### This list was developed and is in use on a live Nginx server running some very busy web sites.
### It was built from the ground up using real data from daily logs and is updated almost daily. ### It was built from the ground up using real data from daily logs and is updated almost daily.
@ -41,9 +50,9 @@
### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked ### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked
### before they are added. It is monitored extensively for any false positives. ### before they are added. It is monitored extensively for any false positives.
### ********* ### ---------
### Features: ### Features:
### ********* ### ---------
### Clear formatting for Ease of Maintenance. ### Clear formatting for Ease of Maintenance.
### Alphabetically ordered lists for Ease of Maintenance. ### Alphabetically ordered lists for Ease of Maintenance.
### Extensive Commenting for Ease of Reference. ### Extensive Commenting for Ease of Reference.
@ -54,40 +63,38 @@
### IP range blocking / whitelisting. ### IP range blocking / whitelisting.
### Rate Limiting Functions. ### Rate Limiting Functions.
### ************ ### ------------
### INSTALLATION ### INSTALLATION
### ************ ### ------------
### PLEASE use the install, setup and update scripts provided for you to ease your installation. ### PLEASE use the install, setup and update scripts provided for you to ease your installation.
### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files. ### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files.
### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore ### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore
### There are also manual configuration instructions provided for those not wishing to do an auto install. ### There are also manual configuration instructions provided for those not wishing to do an auto install.
### *********************************************** ### -----------------------------------------------
### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!! ### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!!
### *********************************************** ### -----------------------------------------------
### Note that: ### SETTINGS:
### ---------------------------------------------
### 0 = allowed - no limits ### 0 = allowed - no limits
### 1 = allowed or rate limited less restrictive ### 1 = allowed or rate limited less restrictive
### 2 = rate limited more ### 2 = rate limited more
### 3 = block completely ### 3 = block completely
### ---------------------------------------------
### ************************************************************ ### ------------------------------------------------------------
### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS ### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS
### ************************************************************ ### ------------------------------------------------------------
### For contributing, corrections or adding bots or referrers to this repo, ### For contributing, corrections or adding bots or referrers to this repo,
### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder ### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder
### All Pull Requests will be checked for accuracy before being merged. ### All Pull Requests will be checked for accuracy before being merged.
# ********************************* # -----------------------
# FIRST BLOCK BY USER-AGENT STRINGS
# *********************************
# ***********************
# !!!!! PLEASE TEST !!!!! # !!!!! PLEASE TEST !!!!!
# *********************** # -----------------------
# ALWAYS test any User-Agent Strings you add here to make sure you have it right # ALWAYS test any User-Agent Strings you add here to make sure you have it right
# Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your # Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your
@ -98,36 +105,46 @@
# curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client) # curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client)
# curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection) # curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection)
# In this section we allow/disallow specific User Agents / Bots.
# ********************************************************************* # =======================
# Now we map all good and bad user agents to a variable called $bad_bot # START BLOCKER FUNCTIONS
# ********************************************************************* # =======================
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# DO NOT EDIT ANYTHING BELOW THIS LINE !!!
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# =============================
# BEGIN SECTION 1 - USER-AGENTS
# =============================
# ALLOW / BLOCK User Agents / Bots
# -------------------------------------------------------------------
# Map all GOOD and BAD UA (User Agents) to a variable called $bad_bot
# -------------------------------------------------------------------
map $http_user_agent $bad_bot { map $http_user_agent $bad_bot {
default 0; default 0;
# *********************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# ***********************************************
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it, meaning you can over-ride anything in this blocker to your liking.
# ***********************************************************************************
# START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it.
# This include file alows you to over-ride any Bad / Good UA (Bot) declared in this blocker to your liking.
include /etc/nginx/bots.d/blacklist-user-agents.conf; include /etc/nginx/bots.d/blacklist-user-agents.conf;
# ********************************************************************************* # ---------------------------------------------------------------------------------
# END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************************* # ---------------------------------------------------------------------------------
# ********************************************* # --------------------------------------------------
# Bad User-Agent Strings That We Block Outright # BAD UA (User-Agent) Strings That We Block Outright
# ********************************************* # --------------------------------------------------
# START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)360Spider(?:\b|)" 3; "~*(?:\b)360Spider(?:\b|)" 3;
@ -688,9 +705,16 @@ map $http_user_agent $bad_bot {
"~*(?:\b)ZyBorg(?:\b|)" 3; "~*(?:\b)ZyBorg(?:\b|)" 3;
# END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *********************************************** # --------------------------------------------
# Allow Good User-Agent Strings We Know and Trust # GOOD UA User-Agent Strings We Know and Trust
# *********************************************** # --------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# If you think GoogleBot is bad you would simply add them to
# blacklist-user-agents.conf with a value of 1
# -----------------------------------------------------------------------
# START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)adidxbot(?:\b|)" 0; "~*(?:\b)adidxbot(?:\b|)" 0;
@ -727,12 +751,13 @@ map $http_user_agent $bad_bot {
"~*(?:\b)yahoo(?:\b|)" 0; "~*(?:\b)yahoo(?:\b|)" 0;
# END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *************************************************** # --------------------------------------------------------
# User-Agent Strings Allowed Through but Rate Limited # GOOD UA User-Agent Rate Limiting 1 - Disabled by Default
# *************************************************** # --------------------------------------------------------
# Some people block libwww-perl, it used widely in many valid (non rogue) agents # TO ACTIVATE THIS RATE LIMITING Uncomment these two lines in blockbots.conf
# I allow libwww-perl as I use it for monitoring systems with Munin but it is rate limited #limit_conn bot1_connlimit 100;
#limit_req zone=bot1_reqlimitip burst=50;
# START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)jetmon(?:\b|)" 1; "~*(?:\b)jetmon(?:\b|)" 1;
@ -743,9 +768,14 @@ map $http_user_agent $bad_bot {
"~*(?:\b)Wget/1.15(?:\b|)" 1; "~*(?:\b)Wget/1.15(?:\b|)" 1;
# END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# ************************************************************** # -------------------------------------------------------
# Rate Limited User-Agents who get a bit aggressive on bandwidth # GOOD UA User-Agent Rate Limiting 2 - Enabled by Default
# ************************************************************** # -------------------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# -----------------------------------------------------------------------
# START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)Alexa(?:\b|)" 2; "~*(?:\b)Alexa(?:\b|)" 2;
@ -769,162 +799,185 @@ map $http_user_agent $bad_bot {
} }
# ===========================
# END SECTION 1 - USER-AGENTS
# ===========================
# ***************************************** # =======================================
# SECOND BLOCK BY REFERRER STRINGS AND URLS # BEGIN SECTION 2 - REFERRERS AND DOMAINS
# ***************************************** # =======================================
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page
# curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page
# ------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit # Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit
# make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www. # make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www.
# and it also does not care if the referrer request was sent with http https or even ftp. # and it also does not care if the referrer request was sent with http https or even ftp.
# ------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # ----------------------------------------------------------------
# Now we map all bad referrer words below to a variable called $bad_words # Map all BAD referrer words below to a variable called $bad_words
# *********************************************************************** # ----------------------------------------------------------------
# --------------------------------
# START Bad Referrer Word Scanning
# --------------------------------
map $http_referer $bad_words { map $http_referer $bad_words {
default 0; default 0;
# ************************** # -------------------------------------------------------------------------------------------
# Bad Referrer Word Scanning
# **************************
# These are Words and Terms often found tagged onto domains or within url query strings. # These are Words and Terms often found tagged onto domains or within url query strings.
# Create and Customize Your Own Bad Referrer Words Here using the new Include File Method # Create and Customize Your Own Bad Referrer Words Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# customized list of bad referrer words are automatically now included for you # customized list of bad referrer words are automatically now included for you
# Read Comments inside bad-referrer-words.conf for customization tips. # Read Comments inside bad-referrer-words.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# BE VERY CAREFUL using the bad-referrer-words.conf file - please read the comment and # BE VERY CAREFUL using this bad-referrer-words.conf file - please read the comments and
# examples inside the include file for detailed explanations into how seriously this can # examples inside the include file for detailed explanations into how seriously this can
# affect your own site from serving assets or other innocent sites from accessing your site # affect your own site from serving assets or other innocent sites from accessing your site
# For safety sake the whitelist-domains.conf file is also loaded here before the bad-referrer-words.conf file. # For safety sake the whitelist-domains.conf file is also loaded here before the
# bad-referrer-words.conf file is loaded.
# -------------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# ****************************************************************************** # ------------------------------------------------------------------------------
# START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ****************************************************************************** # ------------------------------------------------------------------------------
include /etc/nginx/bots.d/bad-referrer-words.conf; include /etc/nginx/bots.d/bad-referrer-words.conf;
# **************************************************************************** # ----------------------------------------------------------------------------
# END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# **************************************************************************** # ----------------------------------------------------------------------------
} }
# --------------------------------
# END Bad Referrer Word Scanning
# --------------------------------
# *************************
# Bad Referrer Domain Names
# *************************
# Now a list of bad referrer urls these domains or any combination of them ie .com .net # ----------------------------------------
# will be blocked out. Doesn't matter if the protocol is http, https or even ftp # START Good and Bad Referrer Domain Names
# ----------------------------------------
# -------------------------------------------------------------------------------------
# Good and Bad referrer urls Doesn't matter if the protocol is http, https or even ftp
# -------------------------------------------------------------------------------------
# ----------------------
# This section includes: # This section includes:
# ********************** # ----------------------
# --------------------------------------------------------------------------------
# Blocking of SEO company Semalt.com (now merged into this one section) # Blocking of SEO company Semalt.com (now merged into this one section)
# MIRAI Botnet Domains Used for Mass Attacks # MIRAI Botnet Domains Used for Mass Attacks
# Other known bad SEO companies and Ad Hijacking Sites # Other known bad SEO companies and Ad Hijacking Sites
# Sites linked to malware, adware, clickjacking and ransomware # Sites linked to malware, adware, clickjacking and ransomware
# Domain names and referrers used in referrer spam and seo hijacking
# Whitelisting of your own GOOD domains / referrers
# Whitelisting of any other GOOD domains / referrers you want explicitly NOT block
# --------------------------------------------------------------------------------
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test. # Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test.
# ------------------------------------------------------------------------------------------------------------------------------------
# For Example any of the following variations below of 8gold.com will be detected and blocked # For Example any of the following variations below of 8gold.com will be detected and blocked
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# So if you see a bad referrer from wearegoogle.com and you want to block them just add # So if you see a bad referrer from wearegoogle.com and you want to block them just add
# them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will # them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will
# kill all your SEO in a week. # kill all your SEO in a week.
# ------------------------------------------------------------------------------------------------------------------------------------
# To add your own custom bad referrers use the custom include file # To add your own custom bad referrers use the custom include file
# /etc/nginx/bots.d/custom-bad-referrers.conf # /etc/nginx/bots.d/custom-bad-referrers.conf
# Or send a Pull Request to add it to the global blacklist for other users. # Or send a Pull Request to add it to the global blacklist for other users.
# In the bad referrers section I also include sites that hotlink images without permission. # In the bad referrers section I also include sites that hotlink images without permission.
# ------------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # --------------------------------------------------------------------
# Now we map all good & bad referrer urls to variable called #bad_referer # Map all good & bad referrer DOMAINS to a variable called bad_referer
# *********************************************************************** # --------------------------------------------------------------------
map $http_referer $bad_referer { map $http_referer $bad_referer {
hostnames; hostnames;
default 0; default 0;
# ************************************* # --------------------------------------------
# GOOD REFERRERS - Spared from Checking # GOOD REFERRER DOMAINS - Spared from Checking
# ************************************* # --------------------------------------------
# ---------------------------------------------------------------------------------------
# Add all your own web site domain names and server names in this section # Add all your own web site domain names and server names in this section
# WHITELIST Your Own Domain Names Here using the new Include File Method # WHITELIST Your Own Domain Names Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted domain names are automatically now included for you. # whitelisted domain names are automatically now included for you.
# Read Comments inside whitelist-domains.conf for customization tips. # Read Comments inside whitelist-domains.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# ---------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# *********************************** # -----------------------------------
# CUSTOM BAD REFERRERS - Add your Own # CUSTOM BAD REFERRERS - Add your Own
# *********************************** # -----------------------------------
# Add any extra bad referrers in the following include file to have them # Add any extra bad referrers in the following include file to have them
# permanently included and blocked - avoid duplicates in your custom file # permanently included and blocked - avoid duplicates in your custom file
# custom-bad-referrers.conf is BOTH a BLACKLIST AND WHITELIST
# custom-bad-referrers.conf ALLOWS complete over-riding of anything
# If you think google.com is bad you would simply add them to
# custom-bad-referrers.conf with a value of 1
# ************************************************************************* # -------------------------------------------------------------------------
# START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
include /etc/nginx/bots.d/custom-bad-referrers.conf; include /etc/nginx/bots.d/custom-bad-referrers.conf;
# *********************************************************************** # -----------------------------------------------------------------------
# END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************** # -----------------------------------------------------------------------
# START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)000free\.us(?:\b|)" 1; "~*(?:\b)000free\.us(?:\b|)" 1;
@ -7644,137 +7697,49 @@ map $http_referer $bad_referer {
# END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# =====================================
# END SECTION 2 - REFERRERS AND DOMAINS
# =====================================
# *********************************************** # ========================================================================
# WHITELISTING AND BLACKLISTING IP ADDRESS RANGES # BEGIN SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# *********************************************** # ========================================================================
# Geo directive to deny and also whitelist certain ip addresses # --------------------------------------------------------------------------------------
# Map all GOOD and BAD IP Addresses and Ranges to a variable called geo $validate_client
# --------------------------------------------------------------------------------------
geo $validate_client { geo $validate_client {
# ********************
# First Our Safety Net
# ********************
# Anything not matching our rules is allowed through with default 0;
default 0; default 0;
# *********************************** # ----------------------------------------------
# Whitelist all your OWN IP addresses # Whitelist all your OWN IP addresses and Ranges
# *********************************** # ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below. # WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you. # whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips. # Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# ************************************************************************** # --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************** # --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************ # ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
# **************** # -------------------------------------
# Google IP Ranges # BLOCK known Wordpress Theme Detectors
# **************** # -------------------------------------
# For Safety Sake all Google's Known IP Ranges are all white listed
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# **************
# Bing IP Ranges
# **************
# For Safety Sake all Bing's Known IP Ranges are all white listed
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ********************
# Cloudflare IP Ranges
# ********************
# For Safety Sake all Cloudflare's Known IP Ranges are all white listed
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# *************************
# Wordpress Theme Detectors
# *************************
# START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
@ -7818,10 +7783,11 @@ geo $validate_client {
89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector 89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector
# END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
# **************************************** # ----------------------------------------------
# NIBBLER - SEO testing and reporting tool # BLOCK NIBBLER - SEO testing and reporting tool
# **************************************** # ----------------------------------------------
# See - http://nibbler.silktide.com/ # See - http://nibbler.silktide.com/
# ----------------------------------------------
# START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
52.201.238.175 1; 52.201.238.175 1;
@ -7834,33 +7800,10 @@ geo $validate_client {
# END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
# **************************** # -----------------------------------------
# Known Bad IP's and IP Ranges # BLOCK KNOWN BAD IP ADDRESSES
# ************************************************* # Top known bad IP Adresses from abuseIPDB
# Blacklist IP addresses and IP Ranges Customizable # -----------------------------------------
# *************************************************
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# ********************************************************************
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************
include /etc/nginx/bots.d/blacklist-ips.conf;
# ******************************************************************
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ******************************************************************
# *********************************************************************************************
# KNOWN BAD IP ADDRESSES
# Source: https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
# A Reliable Daily Updated List Included Below of Known Bad IP Addresses, Snoopers and Sniffers
# *********************************************************************************************
# START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
193.32.163.89 1; 193.32.163.89 1;
@ -17864,33 +17807,176 @@ geo $validate_client {
46.101.115.65 1; 46.101.115.65 1;
# END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
# --------------------------
# WHITELIST Google IP Ranges
# --------------------------
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------
# WHITELIST Bing IP Ranges
# ------------------------
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------------
# WHITELIST Cloudflare IP Ranges
# ------------------------------
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# -------------------------------------------------
# BLACKLIST IP addresses and IP Ranges Customizable
# -------------------------------------------------
# --------------------------------------------------------------------------------------
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# Anything added to blacklist-ips.conf will over-ride anything whitelisted above
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------
include /etc/nginx/bots.d/blacklist-ips.conf;
# ------------------------------------------------------------------
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------
# ----------------------------------------------
# Whitelist all your OWN IP addresses and Ranges
# ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf;
# ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------------
} }
# --------------------------------------------------------------------------------------
# WHITELIST your own IPs from the DDOS Filter # WHITELIST your own IPs from the DDOS Filter
# Add your own IP addresses and ranges into the custom include file whitelist-ips.conf # Add your own IP addresses and ranges into the custom include file whitelist-ips.conf
# to spare them from the rate limiting DDOS filter. # to spare them from the rate limiting DDOS filter.
# This section includes the same / single whitelist-ips.conf file so you only # This section includes the same / single whitelist-ips.conf file so you only
# need to edit that include file and have it include here for you too. # need to edit that include file and have it include here for you too.
# --------------------------------------------------------------------------------------
geo $ratelimited { geo $ratelimited {
default 1; default 1;
# *************************************************************************** # ---------------------------------------------------------------------------
# START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *************************************************************************** # ---------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************* # -------------------------------------------------------------------------
# END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
} }
# ***************************************** # ======================================================================
# MAP BAD BOTS TO OUR RATE LIMITER FUNCTION # END SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# ***************************************** # ======================================================================
# ============================================
# BEGIN SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
# ============================================
# --------------------------------------------
# 1. MAP BAD BOTS TO OUR RATE LIMITER FUNCTION
# --------------------------------------------
map $bad_bot $bot_iplimit { map $bad_bot $bot_iplimit {
0 ""; 0 "";
@ -17898,30 +17984,31 @@ geo $ratelimited {
2 $binary_remote_addr; 2 $binary_remote_addr;
} }
# *********************** # --------------------------
# SET RATE LIMITING ZONES # 2. SET RATE LIMITING ZONES
# *********************** # --------------------------
# BAD BOT RATE LIMITING ZONE # BAD BOT RATE LIMITING ZONE
# limits for Zone $bad_bot = 1 # Rate limiting will only take effect if on any User-Agents with a value of 2
# Nothing Set - you can set a different zone limiter here if you like
# We issue a 444 response instead to all bad bots.
# limits for Zone $bad_bot = 2
# this rate limiting will only take effect if you change any of the bots and change
# their block value from 1 to 2.
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=2r/s; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m;
### *** MAKE SURE TO ADD to your nginx.conf *** # ==========================================
### server_names_hash_bucket_size 64; # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
### server_names_hash_max_size 4096; # ==========================================
### limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
### limit_conn_zone $binary_remote_addr zone=addr:50m;
### to allow it to load this large set of domains into memory and to set the rate limiting zones for the DDOS filter.
### THE END of the Long and Winding Road # =====================
# END BLOCKER FUNCTIONS
# =====================
### Also check out my Ultimate Apache Bad Bot Blocker on Github ### --------------------------------------------
### https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker ### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
### FOR APACHE SERVERS
### ---------------------------------------------
### Check out the Ultimate Apache Bad Bot Blocker
### ---------------------------------------------

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1644 ### Version: V3.2019.06.1645
### Updated: Thu Jun 27 13:12:23 SAST 2019 ### Updated: Thu Jun 27 13:24:56 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1644 ### Version: V4.2019.06.1645
### Updated: Thu Jun 27 13:12:21 SAST 2019 ### Updated: Thu Jun 27 13:24:55 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -1,2 +1,2 @@
35.192.85.2 1; 104.154.120.187 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,50 +1,50 @@
AiHitBot Aboundex
Asterias Bandit
backlink-check CherryPicker
BlowFish Collector
CheTeam Craftbot
CrunchBot DomainAppender
Ebingbong EasyDL
EyeNetIE EMail Siphon
GermCrawler Fimap
Go-Ahead-Got-It Firefox/7.0
Gotit GetWeb
GT::WWW Gigablast
Humanlinks GoZilla
Image Sucker Go!Zilla
Indy Library HaosouSpider
JennyBot HTMLparser
Larbin InfoNaviRobot
Lmspider Jbrofuzz
Mass Downloader LinkextractorPro
netEstate NE Crawler LinqiaMetadataDownloaderBot
Nettrack LWP::Simple
NetZIP Masscan
Nutch MFC_Tear_Sample
OpenVAS MIDown tool
OutclicksBot Ninja
PageAnalyzer PageAnalyzer
PictureFinder Psbot
Pixray RankActiveLinkBot
scan.lol RankFlex
SEOkicks-Robot RankingBot2
SiteSnagger RankurBot
Site Sucker ScreenerBot
Snapbot Searchestate
Sottopop SemrushBot
Surfbot SISTRIX
Suzuran SpankBot
Szukacz
T8Abot T8Abot
Titan Teleport
Toweyabot Tracemyfile
trendiction.com VB Project
Webalta VeriCiteCrawler
WebAuto Wallpapers/3.0
WebImageCollector WebCopier
WebmasterWorldForumBot WEBDAV
WebWhacker WebLeacher
WISENutbot WebsiteQuester
WWW::Mechanize WeSEE
Zeus Whatweb
ZmEu Xaldon_WebSpider
zgrab

View file

@ -1,226 +1,228 @@
ADmantX 404checker
80legs
Abonti
AhrefsBot AhrefsBot
AIBOT AIBOT
AiHitBot AiHitBot
Aipbot Aipbot
Alexibot Alexibot
AllSubmitter AllSubmitter
AlphaBot archive.org_bot
Anarchie Attach
Apexoo autoemailspider
ASPSeek
Asterias
BacklinkCrawler BacklinkCrawler
BackStreet
BackWeb BackWeb
Badass Bandit
BBBike BetaBot
Bigfoot
Blackboard Blackboard
Blow Black Hole
Boardreader BlackWidow
Bolt BLEXBot
BlowFish
BotALot BotALot
Buddy
BuiltBotTough BuiltBotTough
BuiltWith BuzzSumo
CATExplorador
CazoodleBot
CCBot CCBot
Cegbfeieh CheeseBot
CherryPicker Chlooe
CheTeam
ChinaClaw
Claritybot Claritybot
Cogentbot Cliqzbot
cognitiveseo
Collector Collector
com.plumanalytics
Copier
CopyRightCheck
Copyscape Copyscape
Cosmos
Craftbot Craftbot
crawl.sogou.com crawl.sogou.com
Crescent CrunchBot
CSHttp CSHttp
Curious DatabaseDriverMysqli
DataCha0s DataCha0s
demandbase-bot
Deusu Deusu
Digincore
DigitalPebble DigitalPebble
Dirbuster DIIbot
Disco Disco
Discoverybot Discoverybot
Dispatch Dispatch
DittoSpyder
DnyzBot
DomainSigmaCrawler DomainSigmaCrawler
Dragonfly DomainStatsBot
Drip Dotbot
DSearch
DTS Agent DTS Agent
EirGrabber EirGrabber
EMail Siphon
EMail Wolf
EroCrawler
evc-batch evc-batch
Express WebPictures Extractor
Extreme Picture Finder ExtractorPro
Ezooms Ezooms
FDM FDM
FemtosearchBot FemtosearchBot
FHscan FlashGet
Fimap
Firefox/7.0
Flunky
Foobot Foobot
FyberSpider
Fyrebot
GalaxyBot GalaxyBot
Genieo
Getintent
GetRight GetRight
GetWeb
Gigablast
Gigabot
G-i-g-a-b-o-t G-i-g-a-b-o-t
Gotit
GrabNet GrabNet
GrapeFX Grafula
GrapeshotCrawler GrapeshotCrawler
GridBot HaosouSpider
Haansoft Harvest
HEADMasterSEO Hloader
Heritrix HTTrack
HTMLparser
Humanlinks
HybridBot
Iblog
Id-search Id-search
IlseBot
Image Fetch
Image Sucker Image Sucker
IndeedBot
Indy Library Indy Library
InfoNaviRobot
InfoTekies InfoTekies
Intelliseek InternetSeer
Iskanie IRLbot
JamesBOT
Jbrofuzz Jbrofuzz
JikeSpider
JOC Web Spider JOC Web Spider
Jorgee
JustView JustView
Jyxobot
Keyword Density
Lanshanbot
LexiBot LexiBot
Lftp Lftp
LinkextractorPro Lightspeedsystems
LinkpadBot Likse
LinksManager
LinkWalker LinkWalker
LinqiaScrapeBot LinqiaMetadataDownloaderBot
LinqiaRSSBot
Lipperhey
Lipperhey Spider
Ltx71
lwp-request
LWP::Simple
Mag-Net
Mail.RU_Bot
Majestic12
Majestic SEO Majestic SEO
Majestic-SEO Majestic-SEO
MarkWatch MarkWatch
Masscan
Mass Downloader
Mata Hari Mata Hari
meanpathbot Mediatoolkitbot
MegaIndex.ru MegaIndex.ru
Metauri MFC_Tear_Sample
Microsoft Data Access Microsoft Data Access
Microsoft URL Control
MIDown tool
Mister PiX Mister PiX
MJ12bot
Mojeek Mojeek
Morfeus Fucking Scanner Msrabot
Mr.4x3 MS Web Services Client Protocol
MSFrontPage
MSIECrawler
muhstik-scan
Musobot
Nameprotect
Navroad
Needle Needle
NetAnts
Netcraft Netcraft
Nettrack netEstate NE Crawler
Nibbler NetLyzer
NetSpider
Netvibes
NICErsPRO NICErsPRO
Niki-bot
NimbleCrawler
Nimbostratus
Ninja Ninja
Octopus Nutch
Offline Explorer oBot
OnCrawl Openfind
Openvas OpenVAS
OrangeBot
OrangeSpider OrangeSpider
page scorer OutclicksBot
Page Analyzer
PageGrabber
Panscient Panscient
Papa Foto Pavuk
pcBrowser pcBrowser
PeoplePal PeoplePal
Picsearch Picsearch
PictureFinder PictureFinder
Pi-Monster Pimonster
Pixray
PleaseCrawl
plumanalytics
Pockey Pockey
POE-Component-Client-HTTP
Probethenet Probethenet
PxBroker
QueryN Metasearch
Quick-Crawler Quick-Crawler
RankActiveLinkBot RankActive
RankFlex RankFlex
RankingBot
RankingBot2 RankingBot2
Rankivabot Reaper
RebelMouse
RedesScrapy
RepoMonkey RepoMonkey
RocketCrawler Ripper
SBIder SalesIntelligent
ScanAlert
Scanbot Scanbot
ScoutJet scan.lol
SearchmetricsBot
Semrush Semrush
SemrushBot SEOkicks
SEOkicks-Robot
SEOlyticsCrawler SEOlyticsCrawler
SEOprofiler Seomoz
seoscanners seoscanners
SeoSiteCheckup SEOstats
sexsearcher serpstatbot
SiteExplorer Shodan
Siphon
SISTRIX
Siteimprove Siteimprove
SiteLockSpider
SiteSnagger
Site Sucker Site Sucker
Sitevigil Sitevigil
SlySearch SlySearch
SMTBot
Snake Snake
Snoopy Sociscraper
SocialRankIOBot Sogou web spider
sogouspider
Sosospider Sosospider
Sottopop Sottopop
SpaceBison Spammen
SpankBot Spanner
SputnikBot SputnikBot
spyfu spyfu
Sqlmap
Sqworm Sqworm
Steeler Steeler
Surfbot Sucker
Sucuri
SurveyBot SurveyBot
Suzuran
Szukacz Szukacz
T0PHackTeam T0PHackTeam
Teleport tAkeOut
Telesphoreo
Telesphorep Telesphorep
The Intraformant The Intraformant
TheNomad Titan
Thumbor Toata
Trendiction Toweyabot
Trendictionbot Trendictionbot
trendiction.com
trendiction.de trendiction.de
Turingos
TurnitinBot TurnitinBot
TwengaBot TwengaBot
Twice Twice
UnisterBot Typhoeus
URLy.Warning Upflow
Vacuum Vacuum
VB Project Vagabondo
VCI VCI
VoidEYE VidibleScraper
Voltron Virusdie
Voil
Wallpapers/3.0 Wallpapers/3.0
WallpapersHD Webalta
WBSearchBot WebBandit
WebCollage WebCollage
Web Collage Web Collage
WebCopier
Web Enhancer Web Enhancer
WebFuck WebFuck
WebImageCollector WebImageCollector
@ -229,22 +231,20 @@ Web Pix
WebReaper WebReaper
WebSauger WebSauger
Web Sauger Web Sauger
Webshag
WebsiteQuester WebsiteQuester
Webster Website Quester
WebStripper Whack
WebZIP Wonderbot
WeSEE Woobot
Whacker WPScan
Whatweb WWW-Collector-E
WinHTTrack WWW-Mechanize
WISENutbot WWW::Mechanize
Wprecon
WWWOFFLE WWWOFFLE
x09Mozilla
x22Mozilla x22Mozilla
Xaldon_WebSpider Xaldon_WebSpider
Zade xpymep1.exe
Zauba
zauba.io zauba.io
Zermelo
Zitebot Zitebot
ZmEu

View file

@ -1,250 +1,250 @@
360Spider
404checker 404checker
404enemy
Aboundex
ADmantX ADmantX
AfD-Verbotsverfahren
AhrefsBot AhrefsBot
AIBOT AIBOT
AiHitBot Alexibot
Aipbot AlphaBot
Apexoo Anarchie
archive.org_bot Asterias
Attach Backlink-Ceck
Badass BacklinkCrawler
BackWeb
Bandit Bandit
Barkrowler Barkrowler
Battleztar Bazinga Bigfoot
BBBike
Bitacle
Black Hole Black Hole
BlackWidow BLEXBot
BotALot Blow
Brandprotect BlowFish
Bolt
Brandwatch Brandwatch
Buddy
BuiltWith
Bullseye Bullseye
CCBot Calculon
Cegbfeieh Cegbfeieh
CheTeam CheeseBot
CherryPicker
ChinaClaw
Chlooe
Claritybot Claritybot
Cloud mapping Cloud mapping
coccocbot-web coccocbot-web
Cogentbot
cognitiveseo cognitiveseo
com.plumanalytics Collector
Copier Copier
Cosmos CopyRightCheck
Copyscape
Craftbot
crawler4j crawler4j
crawl.sogou.com crawler.feedback
CrazyWebCrawler Crescent
Custo
DatabaseDriverMysqli DatabaseDriverMysqli
DataCha0s DataCha0s
DBLBot DBLBot
demandbase-bot
Demon Demon
Deusu
Devil
DigitalPebble
DIIbot
Disco Disco
Discoverybot
Dispatch
DnyzBot DnyzBot
DomainAppender
DomainSigmaCrawler DomainSigmaCrawler
Dotbot
Drip
EasyDL
Ebingbong Ebingbong
eCatch eCatch
ECCP/1.0 ECCP/1.0
EirGrabber EMail Wolf
EMail Siphon
EroCrawler EroCrawler
ExtLinksBot Evil
Express WebPictures
Extractor Extractor
ExtractorPro
Extreme Picture Finder Extreme Picture Finder
EyeNetIE EyeNetIE
Ezooms
facebookscraper
FemtosearchBot
FHscan
Firefox/7.0 Firefox/7.0
FlashGet FlashGet
Foobot Foobot
FyberSpider Freeuploader
Genieo Fyrebot
Getintent GalaxyBot
GermCrawler
GetRight GetRight
GetWeb
Gotit Gotit
Go!Zilla GoZilla
Grabber
GrabNet GrabNet
Grafula
GrapeshotCrawler GrapeshotCrawler
GridBot GridBot
Haansoft Haansoft
HaosouSpider HaosouSpider
Havij Havij
HMView HTMLparser
HTTP::Lite HTTP::Lite
HTTrack
Humanlinks
Iblog Iblog
IDBot Id-search
IlseBot IlseBot
IndeedBot Indy Library
InfoTekies InfoTekies
instabid Intelliseek
InternetSeer Internet Ninja
ips-agent internetVista monitor
Iria
IRLbot IRLbot
Iskanie Iskanie
JamesBOT Jbrofuzz
JennyBot JetCar
Jetty
Joomla Joomla
Jorgee Jorgee
JustView JustView
Jyxobot
Kenjin Spider Kenjin Spider
Larbin Keyword Density
LeechFTP Kozmosbot
LexiBot Libwhisker
Lightspeedsystems Linkdexbot
LinkpadBot LinkextractorPro
LinkScan LinkScan
LinksManager LinksManager
LinqiaMetadataDownloaderBot LinqiaMetadataDownloaderBot
LinqiaRSSBot
LinqiaScrapeBot LinqiaScrapeBot
Lipperhey
Lipperhey Spider
Litemage_walker
Lmspider Lmspider
LNSpiderguy
Ltx71
lwp-trivial lwp-trivial
Magnet Mag-Net
magpie-crawler MarkWatch
Mail.RU_Bot
Masscan Masscan
Mass Downloader
Mata Hari
MauiBot MauiBot
Meanpathbot
MeanPath Bot MeanPath Bot
Mediatoolkitbot
mediawords mediawords
Metauri MIIxpc
Microsoft Data Access
MIDown tool
MJ12bot MJ12bot
Mojeek
Morfeus Fucking Scanner Morfeus Fucking Scanner
Mr.4x3 muhstik-scan
Musobot
Name Intelligence
Nameprotect Nameprotect
Navroad Navroad
Needle Needle
Nessus
Netcraft Netcraft
Nettrack
Net Vampire Net Vampire
Netvibes Netvibes
Nibbler
NICErsPRO NICErsPRO
Niki-bot Niki-bot
Nikto Nmap
Ninja Octopus
Nutch
Openfind
OpenLinkProfiler
Openvas Openvas
OpenVAS OpenVAS
OutclicksBot OrangeBot
OrangeSpider
OutfoxBot OutfoxBot
PageGrabber PageAnalyzer
PageScorer Page Analyzer
Pandalytics Papa Foto
Panscient pcBrowser
PECL::HTTP PHPCrawl
PeoplePal
Picscout Picscout
ProPowerBot Pixray
plumanalytics
Pockey
POE-Component-Client-HTTP
ProWebWalker
Pump Pump
PxBroker PyCurl
QueryN Metasearch
Quick-Crawler Quick-Crawler
RankActive RankActive
RankFlex RankFlex
RankingBot2 RankingBot2
RankurBot Rankivabot
RealDownload
Reaper
RebelMouse RebelMouse
Recorder Recorder
s1z.ru RedesScrapy
ReGet
SalesIntelligent SalesIntelligent
ScanAlert SBIder
scan.lol Screaming
ScreenerBot Searchestate
SearchmetricsBot
SemrushBot SemrushBot
SEOkicks-Robot SEOkicks
SEOstats SeoSiteCheckup
Siphon
SISTRIX SISTRIX
SiteExplorer Sitebeam
Siteimprove
SiteLockSpider SiteLockSpider
SiteSnagger
SiteSucker
SiteSucker SiteSucker
SlySearch SlySearch
Snake
Snapbot
Snoopy Snoopy
SocialRankIOBot
Sociscraper Sociscraper
sogouspider Sottopop
Sogou web spider
SpaceBison SpaceBison
Spanner Spammen
sp_auditbot
SputnikBot
Sqlmap
Sqlworm Sqlworm
Sqworm Sqworm
Steeler Stripper
SuperHTTP Sucker
Surfbot Swiftbot
SurveyBot
T8Abot T8Abot
tAkeOut TeleportPro
Teleport
Telesphoreo
Telesphorep Telesphorep
Thumbor The Intraformant
Toweyabot Titan
Tracemyfile Trendiction
trendiction.de Trendictionbot
TurnitinBot
TwengaBot
Twice
UnisterBot UnisterBot
Upflow Upflow
URLy.Warning URLy Warning
Vacuum Vacuum
VCI Vagabondo
VB Project
VeriCiteCrawler VeriCiteCrawler
Virusdie Voil
WBSearchBot Voltron
Web Auto
WebBandit
WebCollage WebCollage
Web Collage Web Collage
WebCopier WEBDAV
WebEnhancer
Web Enhancer Web Enhancer
Web Fetch Web Fetch
Web Fetch
WebFuck WebFuck
WebLeacher
webmeup-crawler
Web Pix Web Pix
WebReaper
WebSauger WebSauger
Web Sauger
Webshag
WebsiteExtractor WebsiteExtractor
WebsiteQuester WebsiteQuester
Website Quester
WebStripper
WebWhacker WebWhacker
WebZIP WeSEE
Whatweb Whacker
Who.is Bot Who.is Bot
WinHTTrack
WISENutbot
Woobot
Wotbox Wotbox
WWW-Mechanize WPScan
WWW::Mechanize WWW::Mechanize
x09Mozilla x09Mozilla
x22Mozilla
Xaldon_WebSpider Xaldon_WebSpider
Xenu Xenu
xpymep1.exe xpymep1.exe
Zauba YoudaoBot
zauba.io Zade
Zermelo
Zitebot Zitebot
ZmEu

View file

@ -1,100 +1,100 @@
3th.co.in 00it.com
5i2.net 24x7-server-support.site
academia-nsk.org 4replicawatch.net
adtech.de 7makemoneyonline.com
advancedmassagebysara.com adult3dgames.com
ahmedabadwebs.com ad-words.ru
akama.com arvut.org
amt-k.ru axbocz.net
amyfoxfitness.com becuo.com
anime.dougasouko.com bildsuche.ru
apifasterlightin-a.akamaihd.net buyessay3.blogspot.ru
ap.senai.br buyfriend.ru
asrvrep-a.akamaihd.net club-musics.ru
bannerconnect.net collegeessay19.blogspot.ru
bear.gotcher.us compliance-donald.xyz
bet-prognoz.com custom-product-labels.com
blackhatworth.com downloadeer.net
blavia.00author.com euroskat.ru
bloglag.com everypony.ru
bluesalt.co ezigarettenkaufen2.dreamwidth.org
briomotor.co felizporno.com
bugof.gq flipper.top
buntube.net flowersbazar.com
cementaresearch.se fullgirl.ru
chatroulette.life geoads.com
chatseo.com gloverid.site
cowblog.fr gosreg.amchs.ru
crynet.cc gotwebsite1.com
demenageur.com graphid.com
divci-hry.info growshop.es
domain.webkeyit.com gsasearchengineranker.top
doublepimp.com gsmtlf.ru
ee77ee.com hao123.com
elektrozigaretten1.postbit.com hostnow.men
eshop.md ideibiznesa2015.ru
exchanges-bet.com incanto.in.ua
extlabs.io infogame.name
freshberry.com.ua inspiring-desperate.tk
googlemare.com iomoio.net
gotcher.us iscblog.info
gpirate.com istizanidineanopiate.blogspot.com
hermesreplica.win joingames.org
hitsbox.info journeydownthescale.info
hol.es juliadiets.com
igadgetsworld.com kadashihotel.com
immobiliaremassaro.com krasnodar.zrus.org
interfucks.net lapitec.eu
irkutsk.zrus.org lockerz.com
kinohall.ru lovi-moment.com.ua
klikbonus.com mesto-x.com
likrot.com mirtorrent.net
lottospring.com mmostrike.ru
monarchfind-a.akamaihd.net moonci.ru
montredemarque.nl mtmtv.info
mrbitsandbytes.com mypornfree.ru
mvpicton.co.uk narutonaruto.ru
myhealthcare.com notasprensa.info
myxdate.info o-o-6-o-o.ru
nac-bearings.ru pattersonsweb.com
new-post.tk pdamods.ru
nsatc.net pflexads.com
offf.info pixelrz.com
oneclickfiles.com pony-business.com
partner-host.men potoideas.us
partnerline.men promodj.com
pastaleads.com pskcijdc.bloger.index.hr
pawli.eu razorweb-a.akamaihd.net
pochemychka.net richinvestmonitor.com
pornoblood.com ric.info
pornosee.info rimedia.org
porno-video-chati.ru rockprogblog.com
remont-comp-pomosh.ru rucrypt.com
ring4rhino.com sanatorrii.ru
royalads.net
sbricur.com sbricur.com
seojokes.net sharebutton.org
socialseet.ru shemalegalls.blogporn.in
soc-proof.su siteheart.net
soheavyblog.com sitevalued.com
sonata-arctica.wz.cz skyway24.ru
soviet-portal.do.am snow.nvr163.com
spb.afora.ru sptslmtrafms.com
spidtest.org sugarkun.com
stroiminsk.org taaaak.com
tackletarts.co thebestphotos.eu
thefarmergame.com thedownloadfreeonlinegames.blogspot.com
torrentgamer.net topshef.ru
tracfone.com turizmus.us
trichizobswiv.agddns.net uggbootsoutletsale.us
umityangin.net unblocksit.es
urlopener.blogspot.com.au uptimebot.net
vertaform.com videochat.ph
vkmusics.ru vzubah.com
webjam.com winterclassichockeyjerseys.com
whiteproduct.com winx-play.ru
xn----itbeirbjbi7bc6bh2d.xn--p1ai woman-h.ru
xtube.com xaijo.com
youdao.com yellowstonesafaritours.com
zeroredirect8.com zixizop.net.ru
zverokruh-shop.cz zynax.ua
zzbroya.com.ua

File diff suppressed because it is too large Load diff

View file

@ -1,250 +1,250 @@
2020iscoming.info 1001watch.com.ua
24videos.tv 1688.com
256bit.by 4webmasters.org
7zap.com 8xv8.com
adktrailmap.com abiente.ru
ads-cool.pro academiacsmendoza.org
adultactioncam.com acc.eu.org
advancedsoftwaresupport.com actulite.com
ad-words.ru adclickthru.net
alekseevec.ru adsloads.com
allblogroll.com adtech.fr
aosexkontakte.net adultfriendfinder.com
apartmentbay.ru adultfullhd.com
apibetweenlinesn-a.akamaihd.net aktivator-windows10.blogspot.com
atmagroup.ru alarmobninsk.ru
audiofree.ru alessandraleone.com
auto4style.ru all4invest.info
autochoixspinelli.com allkrim.com
avtovolop.ru alpinism.ru
ayakino.net amazingpic.net
azadnegar.com ameblo.jp
batanga.net animal-drawings.com
battle.net apartamentwroclaw.eu
benchmarkcommunications.co.uk api.stathat.com
berrymall.ru apparel-offer.com
betonka.pro autobudpostach.club
bif-ru.info aviav.ru.com
bigames.online azazu.ru
binaryoptionscops.info babieca.com
bio-market.kz babyfactory.fr
blackwitchcraft.ru bdsmgalls.net
bolezniorganov.ru beclean-nn.ru
bongacams.com bedandbreakfast.com
bookmaker-bet.com best-deals-products.com
bosman.pluto.ro besttorrentknifta.weebly.com
bezlimitko.xyz
binomo.com
bloggers.nl
bobba.dzaba.com
brakehawk.com
brimstonehillfortress.org brimstonehillfortress.org
bristolhotel.com.ua buketeg.xyz
budilneg.xyz businesn.men
buigas.00it.com buy-cheap-pills-order-online.com
buzzonclick.com candypeople.se
calcularpagerank.com cartierlove2u.xyz
canacopegdl.com cartujano-pre.de
candycrushshop.com ccbill.com
chiblackhawks-jerseys.com chatseo.com
cialis-samples.com cheap-pills-norx.com
ciproandtizanidine.blogspot.com chelnytruck.ru
clickcash.com christianlouboutinshoes.xyz
clodo.ru colehaanoutlet.store
codysbbq.com community.allhiphop.com
compliance-alexa.xyz compliance-barak.top
custom-product-labels.com compliance-barak.xyz
dailyfinancefix.com compliance-olga.top
dalavia.ru comsysnet.com
dandiyabeats.in crynet.cc
dealwifi.com d2jsp.org
defenderxtactical.com data1.scopich.com
dekoration.us
dekorkeramik.ru dekorkeramik.ru
destinationrealestate.com dengi-pod-zalog-nedvizhimosti.ru
detmebel.su den-noch24.ru
dlya-android.org diusyawiga.tk
dominateforex.ml dmmspy.com
dptaughtme.com dnsrsearch.com
elektrischezigarette1.blog.pl docsportal.net
elkacentr.ru dojki-hd.com
elmifarhangi.com domaineaneblanc.com
elvel.com.ua donna7753191.ru
enternet.ee dvrlists.com
estelight.ru editors.choice6912650.hulfingtonpost.com
european-torches.ru elektronischezigarettekaufen1.myblog.de
encodable.com
engines-usa.com
enhand.se
eralph.tk
evogarage.com evogarage.com
extstat.com exdocsfiles.com
fbdownloader.com extremepornos.net
fdzone.org ezigarettekaufen2.yolasite.com
fickkontaktehobbyhuren.com f07.de
fickluder69.com filmi-v.online
fix-website-errors.com forum.tvmir.org
formulaantiuban.com freejabs.com
forum-engineering.ru galeon.com
free-today.com gamblingnerd.com
freza-sverlo.ru game-top.su
funcrushgames.com gamewrath.com
gazoblok.net.ua gamezblox.com
geileweiber.tk gemara.com
gfaq.ru generousdeal-a.akamaihd.net
goroda-vsego-mira.ru getyourimage.club
grtyi.com glavprofit.ru
handsandlegs.ru gojiberriess.apishops.ru
havepussy.com grizzlysgrill.com
hornymatches.com gsasearchengineranker.pw
hothor.se habermetre.com
houseofgaga.ru hidemyass.com
ideoworld.org homemature.net
igrovyeavtomaty777.ru hoverboard360.es
ilovevitaly.com ilmexico.com
imagerydatabase.com imgarcade.com
impotentik.com inspiring-desperate.tk
instakink.com instasexyblog.com
int.search.tb.ask.com investyb.com
it-max.com.ua invivo.hu
jamiembrown.com istizanidineanarcoticdrug.blogspot.com
jeremyeaton.co istizanidineanopiate.blogspot.com
jpcycles.com ivoiretechnocom.ci
juliaworld.net iwantmyfreecash.com
kanimage.com iyasimasennka.com
karadene.com japfm.com
keywordsdoctor.com jav-way.site
kidskunst.info jerseychinabizwholesale.us
lafriore.ru job.icivil.ir
landinez.co journalhome.com
larchik.net kakablog.net
laserpen.club kino-ecran.ru
leadwayau.com koleso24.com.ua
lenvred.org komputernaya-pomosh-moscow.ru
lescinq.com krasnodar.zrus.org
letslowbefast.today krassh.ru
lflash.ru kupiproday.com.ua
lider-zhaluzi.kiev.ua kursy-ege.ru
lignofix.ua law-check-seven.xyz
linkpulse.com letsrepair.in
linkredirect.biz locksmith.jp
linksharingt.com madot.onlinewebshop.net
littleberry.ru massage-info.nl
mac-shield.com matb3aa.com
master-muznachas.ru matchpal-a.akamaihd.net
m.b00kmarks.com
mbiologi.ru
mesto-x.com
metarip.ru metarip.ru
minegam.com mielec.pl
mojpreskumanie.com mir-betting.ru
moneymaster.ru mmoguider.ru
mnogolok.info
moinozhki.com
monclerboots.xyz
monetizer.com-01.site
money-for-placing-articles.com
montazhnic.ru montazhnic.ru
moroccosurfadventures.com moviemail-online.co.uk
myfreecams.com music7s.me
mylida.org mypets.by
myonigroup.com narkologiya-belgorod.ru
myplaycity.com narosty.com
nextlnk12.com newstraveller.ru
nikhilbahl.com nfljerseysforsalewholesaler.com
november-lax.com nfljerseys.online
oconto.ru normalegal.ru
olgacvetmet.com notfastfood.ru
onstrapon.purplesphere.in novodigs.com
orgasmatrix.com nvssf.com
ororodnik.goodbb.ru obnal.org
osb.se11.ru onlainbesplatno.ru
paclitor.com onlinewritingjobs17.blogspot.ru
pandarastore.top orion-code-access.net
pandroid.co osoznanie-narkotikam.net
partner-host.men paleohub.info
picsearch.com pensplan4u.com
pinkduck.ga photosaga.info
playfortuna-play.ru pic2fly.com
pochtovyi-index.ru piccdata.com
podshipniki-nsk.ru picquery.com
pony-business.com picsforkeywordsuggestion.com
pornoblood.com pictures-and-images.net
pierrehardysale.online
pipki.r.acdnpro.com
pornobrazzers.biz pornobrazzers.biz
pornofiljmi.com potolokelekor.ru
prchecker.info pozdrawleniya.ru
predmety.in.ua predmety.in.ua
primedice.com push-ad.com
privacyassistant.net pushdata.sendpulse.com
prizesbook.online qitt.ru
profitkode.com qld10000.net
propranolol40mg.blogspot.com qualitymarketzone.com
ptr.ruvds.com quelle.ru
pukaporn.com razleton.com
rasteniya-vs-zombi.ru refererx.com
realitykings.com rennlist.com
remontvsamare.su ritlweb.com
responsive-test.net roznica.com.ua
rockingclicks.com runtnc.net
sad-torg.com.ua rvtv.ru
scanmyphones.com sbprabooks.com
scanner-margo.top scanmarine.info
scanner-mary.top scanner-jess.top
searchengineranker.email scanner-willy.top
searchimpression.com scrapinghub.com
searchmywindow-a.akamaihd.net scripted.com
seccioncontrabajo.com seeingmeerkat.com
security60-e.com segol.tv
seeresultshub-a.akamaihd.net semaltmedia.com
seorank.info sexs-foto.com
serpstat.com sfd-chess.ru
sexblog.pw shopfishing.com.ua
sexkontakteao.info skylta.com
sex-watch.com smart-balancewheel.com
sfj-ror.no social-s-iii.xyz
shiksabd.com sonata-arctica.wz.cz
shoesonlinebuy.cn soundfrost.org
shoppingmiracles.co.uk sukirgenk.dvrlists.com
sideeffectsoftizanidine.blogspot.com sundrugstore.com
simul.co sweepstakes.rewardit.com
sisiynas.ru syvertsen-da.no
site-auditor.online tamada69.com
slowmac.tech
smokewithrabbits.com
snworks.com
socialbookmarksubmission.org
softxaker.ru
souvenir.cc
sticken.co
stretchingabuckblog.com
strigkaomsk.ru
stroicol.net
suchenindeutschland.com
superstats.com
susanholtphotography.com
swinger-mobil.net
swiped.su
tfxiq.com tfxiq.com
thefarmergame.com theguardlan.com
thegamerznetwork.com tmtrck.com
thetardistimes.ovh tootoo.to
thexart.club
tizanidineduringpregnancy.blogspot.com
tizanidineformigraines.blogspot.com
tizanidineingredients.blogspot.com
tjkckpytpnje.com
tmearegion26.com
topclickguru.com topclickguru.com
track-rankings.online topshef.ru
traffixer.com tourismvictoria.com
trailer.cinemaflix.website traffmonster.info
tx41tclega.ru tripper.de
uhdtv.website turkeyreport.tk
ultimatesetnewfreeallsoftupgradesystems.pw twu.com.ua
uogonline.com uptime.com
uprour.com urzedowski.eu
ussearche.cf veopornogratis.xxx
v24s.net villakohlanta.nu
vapomnoncri.tk vkak.ru
videochat.cafe vriel.batcave.net
vintontech.info vsesubwaysurfers.com
vinylvault.co.uk wait3sec.org
webenlace.com.ar watchmyfb.pl
webshoppermac.com waterefficiency.co
website-analytics.online weprik.ru
wetgames.ru
wjgony.com wjgony.com
w-journal.ru word-vorlagen.net
wladimirpayen.com worldhistory.biz
www.888.com www.kabbalah-red-bracelets.com
wwwadultcheck.com xboxster.ru
wygraj-skiny.win x-mix.info
x-diesel.info xn----7sbho2agebbhlivy.xn--p1ai
xn----itbkqkfiq.xn--p1ai xn--e1aggki3c.xn--80adxhks
xtrafficplus.com xn--h1ahbi.com.ua
your-bearings.com yeartwit.com
youtubedownload.org youtoner.it
zoogdisany.com zdesoboi.com
zrizvtrnpale.tk zeroredirect5.com
zigzog.ru
zoogdinsney.com

View file

@ -0,0 +1,99 @@
<!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html>

View file

@ -1,4 +1,4 @@
35.192.85.2 0; 104.154.120.187 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

Binary file not shown.

Binary file not shown.

View file

@ -4,7 +4,7 @@
### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation: ### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation:
_______________ _______________
#### Version: V4.2019.06.1644 #### Version: V4.2019.06.1645
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -4,7 +4,7 @@
### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation: ### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation:
_______________ _______________
#### Version: V4.2019.06.1644 #### Version: V4.2019.06.1645
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -11,7 +11,7 @@
##### The Ultimate Nginx Bad Bot, User-Agent, Spam Referrer Blocker, Adware, Malware and Ransomware Blocker, Clickjacking Blocker, Click Re-Directing Blocker, SEO Companies and Bad IP Blocker with Anti DDOS System, Nginx Rate Limiting and Wordpress Theme Detector Blocking. Stop and Block all kinds of bad internet traffic from ever reaching your web sites. [PLEASE SEE: Definition of Bad Bots](#define-bad-bots) ##### The Ultimate Nginx Bad Bot, User-Agent, Spam Referrer Blocker, Adware, Malware and Ransomware Blocker, Clickjacking Blocker, Click Re-Directing Blocker, SEO Companies and Bad IP Blocker with Anti DDOS System, Nginx Rate Limiting and Wordpress Theme Detector Blocking. Stop and Block all kinds of bad internet traffic from ever reaching your web sites. [PLEASE SEE: Definition of Bad Bots](#define-bad-bots)
_______________ _______________
#### Version: V4.2019.06.1644 #### Version: V4.2019.06.1645
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -3,7 +3,7 @@
# EASY CONFIGURATION INSTRUCTIONS FOR STOPPING GOOGLE ANALYTICS "GHOST" SPAM # EASY CONFIGURATION INSTRUCTIONS FOR STOPPING GOOGLE ANALYTICS "GHOST" SPAM
_______________ _______________
#### Version: V4.2019.06.1644 #### Version: V4.2019.06.1645
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1644 ### Version: V4.2019.06.1645
### Updated: Thu Jun 27 13:12:21 SAST 2019 ### Updated: Thu Jun 27 13:24:55 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1644 ### Version: V3.2019.06.1645
### Updated: Thu Jun 27 13:12:23 SAST 2019 ### Updated: Thu Jun 27 13:24:56 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1644 ### Version: V4.2019.06.1645
### Updated: Thu Jun 27 13:12:21 SAST 2019 ### Updated: Thu Jun 27 13:24:55 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -6,8 +6,8 @@
### Version Information # ### Version Information #
################################################### ###################################################
### Version: V4.2019.06.1644 ### Version: V4.2019.06.1645
### Updated: Thu Jun 27 13:12:24 SAST 2019 ### Updated: Thu Jun 27 13:24:58 SAST 2019
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### Version Information ## ### Version Information ##