V4.2019.06.1650 [ci skip]

This commit is contained in:
Travis 2019-06-27 15:51:47 +02:00
parent 29f2e78afa
commit a585e07897
53 changed files with 2857 additions and 2414 deletions

View file

@ -1,2 +1,2 @@
104.154.120.187 1; 35.192.136.167 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
104.154.120.187 0; 35.192.136.167 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:51 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -1,2 +1,2 @@
104.154.120.187 1; 35.192.136.167 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
104.154.120.187 0; 35.192.136.167 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:51 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -33,4 +33,4 @@
# 111.111.111.111 0; # 111.111.111.111 0;
35.224.112.202 0; 104.154.113.151 0;

View file

@ -13,8 +13,10 @@
# Version 1.1 # Version 1.1
# ! new directives also to be added to include_filelist.txt ! # # ! new directives also to be added to include_filelist.txt ! #
server_names_hash_bucket_size 128; server_names_hash_bucket_size 256;
server_names_hash_max_size 4096; server_names_hash_max_size 4096;
variables_hash_max_size 4096;
variables_hash_bucket_size 4096;
limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s; limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
limit_conn_zone $binary_remote_addr zone=addr:50m; limit_conn_zone $binary_remote_addr zone=addr:50m;

View file

@ -1,16 +1,21 @@
### ********************************** ### -----------------------------------------------------------
### THE ULTIMATE NGINX BAD BOT BLOCKER ### THE NGINX ULTIMATE BAD BOT, BAD IP AND BAD REFERRER BLOCKER
### ********************************** ### -----------------------------------------------------------
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:41 SAST 2019 ### Updated: Thu Jun 27 15:45:51 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
### --------------------------------------------
### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
############################################################################## ##############################################################################
# _ __ _ # # _ __ _ #
# / |/ /__ _(_)__ __ __ # # / |/ /__ _(_)__ __ __ #
@ -28,12 +33,16 @@
### and also has rate limiting functionality for bad bots who you only want to rate limit ### and also has rate limiting functionality for bad bots who you only want to rate limit
### and not actually block out entirely. It is very powerful and also very flexible. ### and not actually block out entirely. It is very powerful and also very flexible.
### --------------------------------------------------------------------------
### Created By: https://github.com/mitchellkrogza/ ### Created By: https://github.com/mitchellkrogza/
### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker ### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
### Copyright Mitchell Krog - <mitchellkrog@gmail.com> ### Copyright Mitchell Krog - <mitchellkrog@gmail.com>
### Contributors: Stuart Cardall - https://github.com/itoffshore ### Contributors: Stuart Cardall - https://github.com/itoffshore
### --------------------------------------------------------------------------
### --------------------------------------------------------------------------
### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04) ### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04)
### --------------------------------------------------------------------------
### This list was developed and is in use on a live Nginx server running some very busy web sites. ### This list was developed and is in use on a live Nginx server running some very busy web sites.
### It was built from the ground up using real data from daily logs and is updated almost daily. ### It was built from the ground up using real data from daily logs and is updated almost daily.
@ -41,9 +50,9 @@
### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked ### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked
### before they are added. It is monitored extensively for any false positives. ### before they are added. It is monitored extensively for any false positives.
### ********* ### ---------
### Features: ### Features:
### ********* ### ---------
### Clear formatting for Ease of Maintenance. ### Clear formatting for Ease of Maintenance.
### Alphabetically ordered lists for Ease of Maintenance. ### Alphabetically ordered lists for Ease of Maintenance.
### Extensive Commenting for Ease of Reference. ### Extensive Commenting for Ease of Reference.
@ -54,40 +63,38 @@
### IP range blocking / whitelisting. ### IP range blocking / whitelisting.
### Rate Limiting Functions. ### Rate Limiting Functions.
### ************ ### ------------
### INSTALLATION ### INSTALLATION
### ************ ### ------------
### PLEASE use the install, setup and update scripts provided for you to ease your installation. ### PLEASE use the install, setup and update scripts provided for you to ease your installation.
### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files. ### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files.
### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore ### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore
### There are also manual configuration instructions provided for those not wishing to do an auto install. ### There are also manual configuration instructions provided for those not wishing to do an auto install.
### *********************************************** ### -----------------------------------------------
### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!! ### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!!
### *********************************************** ### -----------------------------------------------
### Note that: ### SETTINGS:
### ---------------------------------------------
### 0 = allowed - no limits ### 0 = allowed - no limits
### 1 = allowed or rate limited less restrictive ### 1 = allowed or rate limited less restrictive
### 2 = rate limited more ### 2 = rate limited more
### 3 = block completely ### 3 = block completely
### ---------------------------------------------
### ************************************************************ ### ------------------------------------------------------------
### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS ### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS
### ************************************************************ ### ------------------------------------------------------------
### For contributing, corrections or adding bots or referrers to this repo, ### For contributing, corrections or adding bots or referrers to this repo,
### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder ### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder
### All Pull Requests will be checked for accuracy before being merged. ### All Pull Requests will be checked for accuracy before being merged.
# ********************************* # -----------------------
# FIRST BLOCK BY USER-AGENT STRINGS
# *********************************
# ***********************
# !!!!! PLEASE TEST !!!!! # !!!!! PLEASE TEST !!!!!
# *********************** # -----------------------
# ALWAYS test any User-Agent Strings you add here to make sure you have it right # ALWAYS test any User-Agent Strings you add here to make sure you have it right
# Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your # Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your
@ -98,36 +105,46 @@
# curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client) # curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client)
# curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection) # curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection)
# In this section we allow/disallow specific User Agents / Bots.
# ********************************************************************* # =======================
# Now we map all good and bad user agents to a variable called $bad_bot # START BLOCKER FUNCTIONS
# ********************************************************************* # =======================
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# DO NOT EDIT ANYTHING BELOW THIS LINE !!!
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# =============================
# BEGIN SECTION 1 - USER-AGENTS
# =============================
# ALLOW / BLOCK User Agents / Bots
# -------------------------------------------------------------------
# Map all GOOD and BAD UA (User Agents) to a variable called $bad_bot
# -------------------------------------------------------------------
map $http_user_agent $bad_bot { map $http_user_agent $bad_bot {
default 0; default 0;
# *********************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# ***********************************************
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it, meaning you can over-ride anything in this blocker to your liking.
# ***********************************************************************************
# START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it.
# This include file alows you to over-ride any Bad / Good UA (Bot) declared in this blocker to your liking.
include /etc/nginx/bots.d/blacklist-user-agents.conf; include /etc/nginx/bots.d/blacklist-user-agents.conf;
# ********************************************************************************* # ---------------------------------------------------------------------------------
# END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************************* # ---------------------------------------------------------------------------------
# ********************************************* # --------------------------------------------------
# Bad User-Agent Strings That We Block Outright # BAD UA (User-Agent) Strings That We Block Outright
# ********************************************* # --------------------------------------------------
# START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)360Spider(?:\b|)" 3; "~*(?:\b)360Spider(?:\b|)" 3;
@ -688,9 +705,16 @@ map $http_user_agent $bad_bot {
"~*(?:\b)ZyBorg(?:\b|)" 3; "~*(?:\b)ZyBorg(?:\b|)" 3;
# END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *********************************************** # --------------------------------------------
# Allow Good User-Agent Strings We Know and Trust # GOOD UA User-Agent Strings We Know and Trust
# *********************************************** # --------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# If you think GoogleBot is bad you would simply add them to
# blacklist-user-agents.conf with a value of 1
# -----------------------------------------------------------------------
# START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)adidxbot(?:\b|)" 0; "~*(?:\b)adidxbot(?:\b|)" 0;
@ -727,12 +751,13 @@ map $http_user_agent $bad_bot {
"~*(?:\b)yahoo(?:\b|)" 0; "~*(?:\b)yahoo(?:\b|)" 0;
# END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *************************************************** # --------------------------------------------------------
# User-Agent Strings Allowed Through but Rate Limited # GOOD UA User-Agent Rate Limiting 1 - Disabled by Default
# *************************************************** # --------------------------------------------------------
# Some people block libwww-perl, it used widely in many valid (non rogue) agents # TO ACTIVATE THIS RATE LIMITING Uncomment these two lines in blockbots.conf
# I allow libwww-perl as I use it for monitoring systems with Munin but it is rate limited #limit_conn bot1_connlimit 100;
#limit_req zone=bot1_reqlimitip burst=50;
# START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)jetmon(?:\b|)" 1; "~*(?:\b)jetmon(?:\b|)" 1;
@ -743,9 +768,14 @@ map $http_user_agent $bad_bot {
"~*(?:\b)Wget/1.15(?:\b|)" 1; "~*(?:\b)Wget/1.15(?:\b|)" 1;
# END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# ************************************************************** # -------------------------------------------------------
# Rate Limited User-Agents who get a bit aggressive on bandwidth # GOOD UA User-Agent Rate Limiting 2 - Enabled by Default
# ************************************************************** # -------------------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# -----------------------------------------------------------------------
# START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)Alexa(?:\b|)" 2; "~*(?:\b)Alexa(?:\b|)" 2;
@ -768,163 +798,186 @@ map $http_user_agent $bad_bot {
# END LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# ***************************************** # ===========================
# SECOND BLOCK BY REFERRER STRINGS AND URLS # END SECTION 1 - USER-AGENTS
# ***************************************** # ===========================
# ***************** # =======================================
# BEGIN SECTION 2 - REFERRERS AND DOMAINS
# =======================================
# ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page
# curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page
# ------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit # Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit
# make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www. # make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www.
# and it also does not care if the referrer request was sent with http https or even ftp. # and it also does not care if the referrer request was sent with http https or even ftp.
# ------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # ----------------------------------------------------------------
# Now we map all bad referrer words below to a variable called $bad_words # Map all BAD referrer words below to a variable called $bad_words
# *********************************************************************** # ----------------------------------------------------------------
# --------------------------------
# START Bad Referrer Word Scanning
# --------------------------------
map $http_referer $bad_words { map $http_referer $bad_words {
default 0; default 0;
# ************************** # -------------------------------------------------------------------------------------------
# Bad Referrer Word Scanning
# **************************
# These are Words and Terms often found tagged onto domains or within url query strings. # These are Words and Terms often found tagged onto domains or within url query strings.
# Create and Customize Your Own Bad Referrer Words Here using the new Include File Method # Create and Customize Your Own Bad Referrer Words Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# customized list of bad referrer words are automatically now included for you # customized list of bad referrer words are automatically now included for you
# Read Comments inside bad-referrer-words.conf for customization tips. # Read Comments inside bad-referrer-words.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# BE VERY CAREFUL using the bad-referrer-words.conf file - please read the comment and # BE VERY CAREFUL using this bad-referrer-words.conf file - please read the comments and
# examples inside the include file for detailed explanations into how seriously this can # examples inside the include file for detailed explanations into how seriously this can
# affect your own site from serving assets or other innocent sites from accessing your site # affect your own site from serving assets or other innocent sites from accessing your site
# For safety sake the whitelist-domains.conf file is also loaded here before the bad-referrer-words.conf file. # For safety sake the whitelist-domains.conf file is also loaded here before the
# bad-referrer-words.conf file is loaded.
# -------------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# ****************************************************************************** # ------------------------------------------------------------------------------
# START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ****************************************************************************** # ------------------------------------------------------------------------------
include /etc/nginx/bots.d/bad-referrer-words.conf; include /etc/nginx/bots.d/bad-referrer-words.conf;
# **************************************************************************** # ----------------------------------------------------------------------------
# END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# **************************************************************************** # ----------------------------------------------------------------------------
} }
# --------------------------------
# END Bad Referrer Word Scanning
# --------------------------------
# *************************
# Bad Referrer Domain Names
# *************************
# Now a list of bad referrer urls these domains or any combination of them ie .com .net # ----------------------------------------
# will be blocked out. Doesn't matter if the protocol is http, https or even ftp # START Good and Bad Referrer Domain Names
# ----------------------------------------
# -------------------------------------------------------------------------------------
# Good and Bad referrer urls Doesn't matter if the protocol is http, https or even ftp
# -------------------------------------------------------------------------------------
# ----------------------
# This section includes: # This section includes:
# ********************** # ----------------------
# --------------------------------------------------------------------------------
# Blocking of SEO company Semalt.com (now merged into this one section) # Blocking of SEO company Semalt.com (now merged into this one section)
# MIRAI Botnet Domains Used for Mass Attacks # MIRAI Botnet Domains Used for Mass Attacks
# Other known bad SEO companies and Ad Hijacking Sites # Other known bad SEO companies and Ad Hijacking Sites
# Sites linked to malware, adware, clickjacking and ransomware # Sites linked to malware, adware, clickjacking and ransomware
# Domain names and referrers used in referrer spam and seo hijacking
# Whitelisting of your own GOOD domains / referrers
# Whitelisting of any other GOOD domains / referrers you want explicitly NOT block
# --------------------------------------------------------------------------------
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test. # Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test.
# ------------------------------------------------------------------------------------------------------------------------------------
# For Example any of the following variations below of 8gold.com will be detected and blocked # For Example any of the following variations below of 8gold.com will be detected and blocked
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# So if you see a bad referrer from wearegoogle.com and you want to block them just add # So if you see a bad referrer from wearegoogle.com and you want to block them just add
# them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will # them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will
# kill all your SEO in a week. # kill all your SEO in a week.
# ------------------------------------------------------------------------------------------------------------------------------------
# To add your own custom bad referrers use the custom include file # To add your own custom bad referrers use the custom include file
# /etc/nginx/bots.d/custom-bad-referrers.conf # /etc/nginx/bots.d/custom-bad-referrers.conf
# Or send a Pull Request to add it to the global blacklist for other users. # Or send a Pull Request to add it to the global blacklist for other users.
# In the bad referrers section I also include sites that hotlink images without permission. # In the bad referrers section I also include sites that hotlink images without permission.
# ------------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # --------------------------------------------------------------------
# Now we map all good & bad referrer urls to variable called #bad_referer # Map all good & bad referrer DOMAINS to a variable called bad_referer
# *********************************************************************** # --------------------------------------------------------------------
map $http_referer $bad_referer { map $http_referer $bad_referer {
hostnames; hostnames;
default 0; default 0;
# ************************************* # --------------------------------------------
# GOOD REFERRERS - Spared from Checking # GOOD REFERRER DOMAINS - Spared from Checking
# ************************************* # --------------------------------------------
# ---------------------------------------------------------------------------------------
# Add all your own web site domain names and server names in this section # Add all your own web site domain names and server names in this section
# WHITELIST Your Own Domain Names Here using the new Include File Method # WHITELIST Your Own Domain Names Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted domain names are automatically now included for you. # whitelisted domain names are automatically now included for you.
# Read Comments inside whitelist-domains.conf for customization tips. # Read Comments inside whitelist-domains.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# ---------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# *********************************** # -----------------------------------
# CUSTOM BAD REFERRERS - Add your Own # CUSTOM BAD REFERRERS - Add your Own
# *********************************** # -----------------------------------
# Add any extra bad referrers in the following include file to have them # Add any extra bad referrers in the following include file to have them
# permanently included and blocked - avoid duplicates in your custom file # permanently included and blocked - avoid duplicates in your custom file
# custom-bad-referrers.conf is BOTH a BLACKLIST AND WHITELIST
# custom-bad-referrers.conf ALLOWS complete over-riding of anything
# If you think google.com is bad you would simply add them to
# custom-bad-referrers.conf with a value of 1
# ************************************************************************* # -------------------------------------------------------------------------
# START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
include /etc/nginx/bots.d/custom-bad-referrers.conf; include /etc/nginx/bots.d/custom-bad-referrers.conf;
# *********************************************************************** # -----------------------------------------------------------------------
# END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************** # -----------------------------------------------------------------------
# START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)000free\.us(?:\b|)" 1; "~*(?:\b)000free\.us(?:\b|)" 1;
@ -7644,137 +7697,49 @@ map $http_referer $bad_referer {
# END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# =====================================
# END SECTION 2 - REFERRERS AND DOMAINS
# =====================================
# *********************************************** # ========================================================================
# WHITELISTING AND BLACKLISTING IP ADDRESS RANGES # BEGIN SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# *********************************************** # ========================================================================
# Geo directive to deny and also whitelist certain ip addresses # --------------------------------------------------------------------------------------
# Map all GOOD and BAD IP Addresses and Ranges to a variable called geo $validate_client
# --------------------------------------------------------------------------------------
geo $validate_client { geo $validate_client {
# ********************
# First Our Safety Net
# ********************
# Anything not matching our rules is allowed through with default 0;
default 0; default 0;
# *********************************** # ----------------------------------------------
# Whitelist all your OWN IP addresses # Whitelist all your OWN IP addresses and Ranges
# *********************************** # ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below. # WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you. # whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips. # Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# ************************************************************************** # --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************** # --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************ # ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
# **************** # -------------------------------------
# Google IP Ranges # BLOCK known Wordpress Theme Detectors
# **************** # -------------------------------------
# For Safety Sake all Google's Known IP Ranges are all white listed
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# **************
# Bing IP Ranges
# **************
# For Safety Sake all Bing's Known IP Ranges are all white listed
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ********************
# Cloudflare IP Ranges
# ********************
# For Safety Sake all Cloudflare's Known IP Ranges are all white listed
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# *************************
# Wordpress Theme Detectors
# *************************
# START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
@ -7818,10 +7783,11 @@ geo $validate_client {
89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector 89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector
# END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
# **************************************** # ----------------------------------------------
# NIBBLER - SEO testing and reporting tool # BLOCK NIBBLER - SEO testing and reporting tool
# **************************************** # ----------------------------------------------
# See - http://nibbler.silktide.com/ # See - http://nibbler.silktide.com/
# ----------------------------------------------
# START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
52.201.238.175 1; 52.201.238.175 1;
@ -7834,33 +7800,10 @@ geo $validate_client {
# END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
# **************************** # -----------------------------------------
# Known Bad IP's and IP Ranges # BLOCK KNOWN BAD IP ADDRESSES
# ************************************************* # Top known bad IP Adresses from abuseIPDB
# Blacklist IP addresses and IP Ranges Customizable # -----------------------------------------
# *************************************************
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# ********************************************************************
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************
include /etc/nginx/bots.d/blacklist-ips.conf;
# ******************************************************************
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ******************************************************************
# *********************************************************************************************
# KNOWN BAD IP ADDRESSES
# Source: https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
# A Reliable Daily Updated List Included Below of Known Bad IP Addresses, Snoopers and Sniffers
# *********************************************************************************************
# START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
193.32.163.89 1; 193.32.163.89 1;
@ -17864,33 +17807,176 @@ geo $validate_client {
46.101.115.65 1; 46.101.115.65 1;
# END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
# --------------------------
# WHITELIST Google IP Ranges
# --------------------------
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------
# WHITELIST Bing IP Ranges
# ------------------------
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------------
# WHITELIST Cloudflare IP Ranges
# ------------------------------
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# -------------------------------------------------
# BLACKLIST IP addresses and IP Ranges Customizable
# -------------------------------------------------
# --------------------------------------------------------------------------------------
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# Anything added to blacklist-ips.conf will over-ride anything whitelisted above
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------
include /etc/nginx/bots.d/blacklist-ips.conf;
# ------------------------------------------------------------------
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------
# ----------------------------------------------
# Whitelist all your OWN IP addresses and Ranges
# ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf;
# ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------------
} }
# --------------------------------------------------------------------------------------
# WHITELIST your own IPs from the DDOS Filter # WHITELIST your own IPs from the DDOS Filter
# Add your own IP addresses and ranges into the custom include file whitelist-ips.conf # Add your own IP addresses and ranges into the custom include file whitelist-ips.conf
# to spare them from the rate limiting DDOS filter. # to spare them from the rate limiting DDOS filter.
# This section includes the same / single whitelist-ips.conf file so you only # This section includes the same / single whitelist-ips.conf file so you only
# need to edit that include file and have it include here for you too. # need to edit that include file and have it include here for you too.
# --------------------------------------------------------------------------------------
geo $ratelimited { geo $ratelimited {
default 1; default 1;
# *************************************************************************** # ---------------------------------------------------------------------------
# START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *************************************************************************** # ---------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************* # -------------------------------------------------------------------------
# END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
} }
# ***************************************** # ======================================================================
# MAP BAD BOTS TO OUR RATE LIMITER FUNCTION # END SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# ***************************************** # ======================================================================
# ============================================
# BEGIN SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
# ============================================
# --------------------------------------------
# 1. MAP BAD BOTS TO OUR RATE LIMITER FUNCTION
# --------------------------------------------
map $bad_bot $bot_iplimit { map $bad_bot $bot_iplimit {
0 ""; 0 "";
@ -17898,30 +17984,31 @@ geo $ratelimited {
2 $binary_remote_addr; 2 $binary_remote_addr;
} }
# *********************** # --------------------------
# SET RATE LIMITING ZONES # 2. SET RATE LIMITING ZONES
# *********************** # --------------------------
# BAD BOT RATE LIMITING ZONE # BAD BOT RATE LIMITING ZONE
# limits for Zone $bad_bot = 1 # Rate limiting will only take effect if on any User-Agents with a value of 2
# Nothing Set - you can set a different zone limiter here if you like
# We issue a 444 response instead to all bad bots.
# limits for Zone $bad_bot = 2
# this rate limiting will only take effect if you change any of the bots and change
# their block value from 1 to 2.
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=2r/s; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
### *** MAKE SURE TO ADD to your nginx.conf *** # ==========================================
### server_names_hash_bucket_size 64; # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
### server_names_hash_max_size 4096; # ==========================================
### limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
### limit_conn_zone $binary_remote_addr zone=addr:50m;
### to allow it to load this large set of domains into memory and to set the rate limiting zones for the DDOS filter.
### THE END of the Long and Winding Road # =====================
# END BLOCKER FUNCTIONS
# =====================
### Also check out my Ultimate Apache Bad Bot Blocker on Github ### --------------------------------------------
### https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker ### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
### FOR APACHE SERVERS
### ---------------------------------------------
### Check out the Ultimate Apache Bad Bot Blocker
### ---------------------------------------------

View file

@ -3,8 +3,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2018.05 ### Version: V4.2019.06
### Updated: 2018-08-21 ### Updated: 2019-06-24
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
@ -47,15 +47,14 @@
# --------------------- # ---------------------
# WHITELISTING EXAMPLES # WHITELISTING EXAMPLES
# --------------------- # ---------------------
# "~*\bsomeverygooduseragentname1\b" 0; # "~*(?:\b)someverygooduseragentname1(?:\b|)" 0;
# "~*\bsomeverygooduseragentname2\b" 0; # "~*(?:\b)someverygooduseragentname2(?:\b|)" 0;
# "~*\bsome\-very\-good\-useragentname2\b" 0; # "~*(?:\b)some\-very\-good\-useragentname2(?:\b|)" 0;
# --------------------- # ---------------------
# BLACKLISTING EXAMPLES # BLACKLISTING EXAMPLES
# --------------------- # ---------------------
# "~*\bsomeverybaduseragentname1\b" 3; # "~*(?:\b)someverybaduseragentname1(?:\b|)" 3;
# "~*\bsomeverybaduseragentname2\b" 3; # "~*(?:\b)someverybaduseragentname2(?:\b|)" 3;
# "~*\bsome\-very\-bad\-useragentname2\b" 3; # "~*(?:\b)some\-very\-bad\-useragentname2(?:\b|)" 3;

View file

@ -33,4 +33,3 @@
# 111.111.111.111 0; # 111.111.111.111 0;
35.224.112.202 0;

View file

@ -13,8 +13,10 @@
# Version 1.1 # Version 1.1
# ! new directives also to be added to include_filelist.txt ! # # ! new directives also to be added to include_filelist.txt ! #
server_names_hash_bucket_size 128; server_names_hash_bucket_size 256;
server_names_hash_max_size 4096; server_names_hash_max_size 4096;
variables_hash_max_size 4096;
variables_hash_bucket_size 4096;
limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s; limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
limit_conn_zone $binary_remote_addr zone=addr:50m; limit_conn_zone $binary_remote_addr zone=addr:50m;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V3.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:52 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -1,2 +1,2 @@
104.154.120.187 1; 104.154.113.151 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -3,8 +3,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2018.05 ### Version: V4.2019.06
### Updated: 2018-08-21 ### Updated: 2019-06-24
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
@ -47,15 +47,14 @@
# --------------------- # ---------------------
# WHITELISTING EXAMPLES # WHITELISTING EXAMPLES
# --------------------- # ---------------------
# "~*\bsomeverygooduseragentname1\b" 0; # "~*(?:\b)someverygooduseragentname1(?:\b|)" 0;
# "~*\bsomeverygooduseragentname2\b" 0; # "~*(?:\b)someverygooduseragentname2(?:\b|)" 0;
# "~*\bsome\-very\-good\-useragentname2\b" 0; # "~*(?:\b)some\-very\-good\-useragentname2(?:\b|)" 0;
# --------------------- # ---------------------
# BLACKLISTING EXAMPLES # BLACKLISTING EXAMPLES
# --------------------- # ---------------------
# "~*\bsomeverybaduseragentname1\b" 3; # "~*(?:\b)someverybaduseragentname1(?:\b|)" 3;
# "~*\bsomeverybaduseragentname2\b" 3; # "~*(?:\b)someverybaduseragentname2(?:\b|)" 3;
# "~*\bsome\-very\-bad\-useragentname2\b" 3; # "~*(?:\b)some\-very\-bad\-useragentname2(?:\b|)" 3;

View file

@ -1,4 +1,4 @@
104.154.120.187 0; 104.154.113.151 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V3.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:52 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -1,2 +1,2 @@
104.154.120.187 1; 104.154.113.151 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
104.154.120.187 0; 104.154.113.151 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V3.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:52 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -1,2 +1,2 @@
104.154.120.187 1; 104.154.113.151 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
104.154.120.187 0; 104.154.113.151 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V3.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:52 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -1,2 +1,2 @@
104.154.120.187 1; 35.192.136.167 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,4 +1,4 @@
104.154.120.187 0; 35.192.136.167 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:51 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V3.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:52 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:51 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################

0
.dev-tools/test-blocker-badwords.sh Normal file → Executable file
View file

0
.dev-tools/test-blocker-rate-limiting.sh Normal file → Executable file
View file

0
.dev-tools/test-blocker-whitelist-domains.sh Normal file → Executable file
View file

0
.dev-tools/test-blocker-whitelist-ips.sh Normal file → Executable file
View file

0
.dev-tools/test-blocker-whitelist.sh Normal file → Executable file
View file

View file

@ -1,2 +1,2 @@
104.154.120.187 1; 104.154.113.151 1;
127.0.0.1 1; 127.0.0.1 1;

View file

@ -1,50 +1,50 @@
Anarchie 360Spider
Bigfoot Aboundex
BLEXBot Alexibot
Blow Battleztar Bazinga
Bullseye CrunchBot
CATExplorador
CheTeam
com.plumanalytics
demandbase-bot demandbase-bot
Disco evc-batch
Drip
EirGrabber
Evil Evil
FlashGet ExtractorPro
Foobot FHscan
GetRight
Go-Ahead-Got-It Go-Ahead-Got-It
Haansoft Grabber
Iblog HMView
IDBot HTMLparser
InternetSeer HybridBot
JamesBOT InfoNaviRobot
LinkScan InterGET
Lipperhey Spider Iskanie
Mediatoolkitbot JikeSpider
mediawords Jorgee
NPbot JustView
Picscout LNSpiderguy
plumanalytics Ltx71
POE-Component-Client-HTTP meanpathbot
PxBroker MFC_Tear_Sample
Searchestate Nibbler
seoscanners Nikto
SISTRIX PictureFinder
SputnikBot ProWebWalker
spyfu PyCurl
Sqlworm Reaper
SurveyBot RepoMonkey
Suzuran Ripper
SEOkicks
SEOprofiler
SiteSucker
SpankBot
Sqworm
Sucker
Trendictionbot Trendictionbot
WebAuto Turingos
Web Fetch VeriCiteCrawler
WebLeacher WallpapersHD
Web Sauger Web Collage
WebSucker WebImageCollector
Who.is Bot WebSauger
WiseGuys Robot Whack
WWW::Mechanize Wprecon
xpymep1.exe WWW-Mechanize
zauba.io zgrab

View file

@ -1,250 +1,250 @@
360Spider
80legs 80legs
Aboundex
Acunetix Acunetix
ADmantX AfD-Verbotsverfahren
AhrefsBot Aipbot
AIBOT
Alligator Alligator
AllSubmitter
AlphaBot
Anarchie
Apexoo
archive.org_bot
ASPSeek ASPSeek
Backlink-Ceck Backlink-Ceck
backlink-check BacklinkCrawler
Bandit Barkrowler
BatchFTP
BBBike BBBike
BDCbot BDCbot
BetaBot BetaBot
Bigfoot Bitacle
BlackWidow Black Hole
Blow Blow
BlowFish BlowFish
Boardreader Boardreader
BotALot Buddy
BunnySlippers BuiltWith
Bullseye
Calculon
CATExplorador
CazoodleBot CazoodleBot
CCBot CCBot
CherryPicker Claritybot
CheTeam
Cliqzbot
Cloud mapping
Cogentbot Cogentbot
com.plumanalytics cognitiveseo
Copier
CopyRightCheck
Copyscape Copyscape
Cosmos Cosmos
Craftbot Craftbot
crawl.sogou.com crawler4j
CrazyWebCrawler crawler.feedback
Crescent
CrunchBot CrunchBot
CSHttp
Curious
DatabaseDriverMysqli
Deusu Deusu
Devil Digincore
DigitalPebble DigitalPebble
Dirbuster Discoverybot
Disco
Discobot
Dispatch
DittoSpyder DittoSpyder
DnyzBot DnyzBot
DomainCrawler DomainCrawler
DomainSigmaCrawler DomainSigmaCrawler
Dotbot
Download Wonder
Dragonfly Dragonfly
DTS Agent
EasyDL EasyDL
ECCP/1.0
Ecxi Ecxi
Evil EMail Siphon
EMail Wolf
Express WebPictures
ExtLinksBot ExtLinksBot
Extreme Picture Finder ExtractorPro
EyeNetIE FemtosearchBot
FDM Fimap
FHscan FyberSpider
Firefox/7.0 Fyrebot
Flunky GalaxyBot
FrontPage
Genieo Genieo
Getintent GetWeb
GetRight
Go-Ahead-Got-It
GoZilla GoZilla
Go!Zilla Grafula
Grabber
GrapeshotCrawler GrapeshotCrawler
GridBot HaosouSpider
Havij Harvest
Heritrix
Hloader
HMView HMView
HTMLparser
HTTP::Lite HTTP::Lite
Iblog HTTrack
IDBot
Id-search Id-search
IlseBot IndeedBot
Image Fetch
Image Sucker
Indy Library
InfoNaviRobot
instabid instabid
Intelliseek Intelliseek
InterGET InterGET
Internet Ninja Internet Ninja
InternetSeer InternetSeer
ips-agent
Iria Iria
IRLbot
Iskanie
IstellaBot IstellaBot
JamesBOT
JennyBot
Jetty Jetty
JOC Web Spider JOC Web Spider
Joomla Jorgee
Jyxobot
Kenjin Spider Kenjin Spider
Lanshanbot Keyword Density
Larbin Kozmosbot
Lftp LeechFTP
LibWeb LeechGet
Lightspeedsystems Lightspeedsystems
Likse
Linkdexbot
LinkextractorPro LinkextractorPro
LinkWalker LinkScan
Litemage_walker LinqiaRSSBot
lwp-request LinqiaScrapeBot
LWP::Simple Lmspider
LNSpiderguy
Magnet Magnet
Mail.RU_Bot Mag-Net
Majestic12 Majestic SEO
MarkMonitor MarkMonitor
Mata Hari Masscan
MauiBot
meanpathbot meanpathbot
Meanpathbot
MeanPath Bot MeanPath Bot
Mediatoolkitbot Mediatoolkitbot
mediawords
MegaIndex.ru MegaIndex.ru
Metauri
MFC_Tear_Sample
Microsoft Data Access Microsoft Data Access
Microsoft URL Control Microsoft URL Control
MIDown tool
MIIxpc MIIxpc
Mister PiX Mister PiX
MJ12bot
MSFrontPage MSFrontPage
MSIECrawler
Musobot Musobot
Name Intelligence
Nameprotect Nameprotect
Navroad
NearSite
Needle
Nessus Nessus
NetAnts
netEstate NE Crawler
NetLyzer NetLyzer
NetMechanic NetMechanic
Nettrack
Netvibes Netvibes
NICErsPRO NICErsPRO
Niki-bot
Nikto
NimbleCrawler NimbleCrawler
NPbot NPbot
Nutch Octopus
oBot
Offline Navigator
OnCrawl
OpenLinkProfiler OpenLinkProfiler
Openvas Openvas
OrangeSpider
OutclicksBot
PageAnalyzer
Page Analyzer Page Analyzer
PageGrabber
page scorer page scorer
Panscient PageScorer
Pandalytics
Papa Foto
pcBrowser
PECL::HTTP PECL::HTTP
Picscout PeoplePal
Picsearch PHPCrawl
PictureFinder
Pimonster Pimonster
Pixray PleaseCrawl
POE-Component-Client-HTTP POE-Component-Client-HTTP
ProPowerBot Psbot
Pump
PxBroker
PyCurl PyCurl
QueryN Metasearch
Quick-Crawler Quick-Crawler
RankActive RankActive
RankActiveLinkBot RankFlex
RankingBot
RankingBot2 RankingBot2
Rankivabot
RealDownload
RebelMouse
Recorder Recorder
RedesScrapy
Ripper Ripper
SalesIntelligent Rogerbot
SBIder SBIder
ScoutJet ScanAlert
Screaming Screaming
Semrush
SemrushBot SemrushBot
SEOkicks
SEOkicks-Robot
SEOlyticsCrawler SEOlyticsCrawler
Seomoz
seoscanners
SEOstats SEOstats
serpstatbot
Shodan
Siphon
SISTRIX SISTRIX
Siteimprove SiteLockSpider
SiteSucker SiteSnagger
Snake Snapbot
Snoopy
SocialRankIOBot
sogouspider sogouspider
Sottopop SpaceBison
Spammen Spammen
Spanner sp_auditbot
Spinn3r Spinn3r
SputnikBot
spyfu spyfu
Sqlmap Sqlmap
Sqlworm Steeler
Sqworm
Stripper Stripper
Sucker
SuperHTTP SuperHTTP
Surfbot
Swiftbot Swiftbot
sysscan T8Abot
T0PHackTeam
tAkeOut tAkeOut
Teleport
TeleportPro
Telesoft Telesoft
Telesphoreo
Telesphorep Telesphorep
TheNomad
Titan Titan
Trendiction Toata
TurnitinBot Toweyabot
UnisterBot Trendictionbot
Upflow trendiction.de
Turingos
Turnitin
URLy Warning
URLy.Warning URLy.Warning
Vacuum VCI
Vagabondo VidibleScraper
VeriCiteCrawler
Voil Voil
Voltron Voltron
Wallpapers/3.0 Wallpapers/3.0
WallpapersHD
WASALive-Bot
Webalta
WebAuto WebAuto
WebCollage WebBandit
Web Collage Web Collage
WebCopier
Web Enhancer
Web Fetch Web Fetch
WebFuck WebGo IS
WebLeacher
WebmasterWorldForumBot
webmeup-crawler
WebPix
Web Pix Web Pix
WebReaper
WebSauger WebSauger
Webster Web Sauger
WebSucker Webshag
WebsiteExtractor
WebsiteQuester
WebStripper
Web Sucker Web Sucker
WebZIP WebWhacker
Who.is Bot WeSEE
WiseGuys Robot WinHTTrack
WISENutbot Wonderbot
Woobot Woobot
Wotbox Wotbox
Wprecon WWW-Collector-E
WPScan WWW-Mechanize
WWW::Mechanize WWW::Mechanize
x09Mozilla x09Mozilla
YoudaoBot Xaldon WebSpider
Zade Xenu
xpymep1.exe
Zauba Zauba
zauba.io
Zermelo Zermelo
zgrab
Zitebot
ZyBorg

View file

@ -1,250 +1,250 @@
360Spider 360Spider
404checker
80legs 80legs
AfD-Verbotsverfahren Abonti
ADmantX
AhrefsBot AhrefsBot
AIBOT
AiHitBot AiHitBot
Aipbot Aipbot
ASPSeek Alligator
AllSubmitter
archive.org_bot
Asterias
Attach
BackDoorBot BackDoorBot
backlink-check
BackWeb BackWeb
Bandit Bandit
BatchFTP Barkrowler
Battleztar Bazinga
BDCbot BDCbot
BDFetch Blackboard
Bigfoot Black Hole
BlackWidow BlackWidow
Blow Blow
BlowFish BlowFish
Bolt Bolt
Brandprotect
Brandwatch Brandwatch
Buddy BuiltBotTough
BunnySlippers BuzzSumo
Calculon
CATExplorador
CazoodleBot
CCBot CCBot
Cegbfeieh CherryPicker
CheTeam CheTeam
Chlooe ChinaClaw
Cliqzbot Cliqzbot
coccocbot-web cognitiveseo
com.plumanalytics com.plumanalytics
Copier crawler.feedback
Craftbot
crawl.sogou.com
CrazyWebCrawler
Crescent Crescent
Curious
Custo Custo
DataCha0s DataCha0s
Demon DBLBot
Digincore Deusu
Disco DIIbot
Dirbuster
Discoverybot
Dispatch
DittoSpyder
DnyzBot DnyzBot
DomainAppender DomainAppender
DomainCrawler DomainStatsBot
Dotbot
Download Wonder
Dragonfly Dragonfly
Drip DTS Agent
DSearch
EasyDL EasyDL
ECCP/1.0
Ecxi
EirGrabber EirGrabber
EMail Wolf EMail Wolf
Evil EroCrawler
evc-batch
Exabot Exabot
Express WebPictures Express WebPictures
Ezooms ExtLinksBot
facebookscraper Extractor
ExtractorPro
FDM FDM
FemtosearchBot FemtosearchBot
FHscan FHscan
FlashGet
Flunky Flunky
Foobot
FrontPage FrontPage
GalaxyBot Fyrebot
Genieo Gigabot
Getintent
GetRight
Gigablast
G-i-g-a-b-o-t
Go-Ahead-Got-It Go-Ahead-Got-It
GoZilla Gotit
GrabNet GrapeFX
GridBot GridBot
Harvest
HEADMasterSEO HEADMasterSEO
Heritrix HMView
HTTP::Lite HTTP::Lite
Humanlinks HybridBot
Iblog
IDBot
Id-search
IlseBot
IndeedBot
InfoNaviRobot InfoNaviRobot
instabid
Intelliseek Intelliseek
Internet Ninja Internet Ninja
Iria InternetSeer
JamesBOT internetVista monitor
JennyBot ips-agent
JetCar Jbrofuzz
JOC Web Spider JikeSpider
Joomla Keyword Density
Kozmosbot Kozmosbot
Larbin Libwhisker
LeechFTP
Lftp
Lightspeedsystems
Linkdexbot Linkdexbot
LinkextractorPro LinkextractorPro
LinkScan LinkpadBot
LinqiaMetadataDownloaderBot LinksManager
LinqiaRSSBot LinqiaRSSBot
Lipperhey Spider LinqiaScrapeBot
Litemage_walker
Lmspider
LNSpiderguy LNSpiderguy
Ltx71
lwp-request lwp-request
Magnet Magnet
Mag-Net
Majestic12 Majestic12
Majestic-SEO Majestic-SEO
Mass Downloader MarkMonitor
MarkWatch
Masscan
Mata Hari
meanpathbot
MeanPath Bot MeanPath Bot
Mediatoolkitbot
MegaIndex.ru MegaIndex.ru
Metauri Metauri
MFC_Tear_Sample MFC_Tear_Sample
Microsoft Data Access
MIDown tool
MIIxpc
Mister PiX
MJ12bot MJ12bot
Morfeus Fucking Scanner
Mr.4x3
MSFrontPage
MSIECrawler MSIECrawler
MS Web Services Client Protocol
Musobot
Nameprotect Nameprotect
Navroad Navroad
NearSite Needle
Nessus
NetAnts NetAnts
Netcraft
netEstate NE Crawler
NetLyzer NetLyzer
NetMechanic NetMechanic
Nettrack Nettrack
Net Vampire Netvibes
Nikto NetZIP
NextGenSearchBot
NICErsPRO
Niki-bot
Nimbostratus Nimbostratus
NPbot NPbot
Nutch
Octopus Octopus
Offline Explorer Offline Navigator
OnCrawl OnCrawl
Openfind Openfind
OpenLinkProfiler OpenLinkProfiler
Openvas Openvas
PageAnalyzer OpenVAS
OrangeBot
OrangeSpider
OutclicksBot
Page Analyzer
PageGrabber PageGrabber
PageScorer
Papa Foto
pcBrowser pcBrowser
PeoplePal
Picscout
Picsearch Picsearch
PictureFinder
Pimonster Pimonster
Pi-Monster
Pixray Pixray
plumanalytics
Pockey
Probethenet
ProPowerBot ProPowerBot
Psbot ProWebWalker
PxBroker PyCurl
Quick-Crawler
RankActive RankActive
RankActiveLinkBot RankFlex
RankingBot2 Rankivabot
RankurBot
RealDownload RealDownload
Reaper Reaper
Recorder
RepoMonkey
RocketCrawler RocketCrawler
ScoutJet Rogerbot
SBIder
Scrapy Scrapy
Searchestate
Semrush Semrush
SEOlyticsCrawler SeoSiteCheckup
SEOprofiler serpstatbot
sexsearcher Siteimprove
Shodan SiteLockSpider
SISTRIX
Sitebeam
SiteExplorer
SiteSnagger SiteSnagger
SiteSucker SiteSucker
Site Sucker Site Sucker
Sitevigil SmartDownload
SlySearch Snake
Snoopy
Sociscraper
sogouspider sogouspider
Sottopop Sogou web spider
SpaceBison Sosospider
SpankBot sp_auditbot
Spbot
SputnikBot SputnikBot
spyfu Sqlmap
Steeler Sqlworm
Sqworm
Stripper Stripper
Sucker Suzuran
Sucuri sysscan
SuperBot Szukacz
SuperHTTP T8Abot
SurveyBot
T0PHackTeam
tAkeOut
Teleport Teleport
Telesoft Telesoft
Telesphorep
The Intraformant The Intraformant
Thumbor
TightTwatBot TightTwatBot
Toata Titan
Tracemyfile Toweyabot
Trendiction
Trendictionbot Trendictionbot
trendiction.com
Turnitin Turnitin
TurnitinBot
TwengaBot TwengaBot
Twice
Typhoeus Typhoeus
Upflow
URLy Warning
URLy.Warning URLy.Warning
Vacuum
VB Project
VCI VCI
VoidEYE
Voil
Voltron Voltron
WallpapersHD WallpapersHD
WASALive-Bot
WBSearchBot WBSearchBot
Webalta Webalta
WebAuto WebBandit
Web Auto
WebCollage WebCollage
WebCopier WebFetch
WebEnhancer
WebFuck
WebGo IS WebGo IS
WebLeacher WebImageCollector
Web Sauger webmeup-crawler
WebPix
WebsiteExtractor WebsiteExtractor
WebsiteQuester WebsiteQuester
Website Quester Website Quester
WebStripper WebStripper
WebSucker
WebZIP WebZIP
WeSEE Whack
Whacker
Who.is Bot
Widow
WinHTTrack WinHTTrack
WiseGuys Robot
WISENutbot
Wonderbot
Woobot Woobot
Wprecon Wprecon
WPScan
WWW-Collector-E
WWW-Mechanize WWW-Mechanize
WWW::Mechanize
x09Mozilla x09Mozilla
Xaldon_WebSpider Xaldon WebSpider
Xenu Xenu
YoudaoBot
Zade Zade
zauba.io Zeus
ZmEu ZumBot
ZyBorg ZyBorg

View file

@ -1,100 +1,100 @@
100dollars-seo.com 12u.info
178evakuator178.ru 2ads.co.uk
4inn.ru absolute-s.ru
5elementov.ru acgs.tk
aa8780bb28a1de4eb5bff33c28a218a930.com allmarketsnewdayli.gdn
agapovdg.ru amazingninja.com
allpdfmags.net apibetweenlinesn-a.akamaihd.net
avon-novosib.ru apidiamondatanet-a.akamaihd.net
avtolombard-krasnodar.com bestadbid.com
bankiem.pl best-games.today
big-cash.net bestwaystogetpaid.us
bloke.com bizlist.com.de
bonux.nextview.ru brandehk.dk
bus-offer.com b-styles.xyz
checkhit.com burkesales.com
dev33.dioniqlabb.se buy-meds24.com
dfwu1019.info cercacamion.it
divci-hry.info chocoslim.pro
diy-handmade-ideas.com cometorussia.net
djonwatch.ru compliance-alex.xyz
domainroam.win compliance-julianna.top
erotik0049.com coolingoods.com
ez8motelseaworldsandiego.com customcatchcan.com
familienzahnaerzte.com davebestdeals.com
fba-mexico.com design-lands.ru
fidelityfunding.com deutschehobbyhuren.net
footballfarrago.com directrev.com
foto-sisek.porngalleries.top dmmspy.com
foto-telok.net dogsrun.net
frvo.alptandem.ru domaincheck.io
fungirlsgames.net ebooknovel.club
girlsfuckdick.com e-buyeasy.com
gk-atlant.info efnor-ac.com
gktt.ru ezigaretteshop.webs.com
gyffu.com fanrto.com
hdimagegallery.net forex-indextop20.ru
hkladys.com freenode.info
hptwaakw.blog.fc2.com funtoonez.com
imperiafilm.ru getoutofdebtfree.org
jav-way.site gkvector.ru
jimmychoosale.online hexpilot.com
kinky-fetishes.com homik.pw
kinopolet.net hotel-mkad.ru
life.biz.ua husky-shop.cz
locationdesaison.com hyiphunter.org
macdamaged.tech imagine-ex.co
mac-shield.com isotoner.com
malwareremovalcenter.com istanbulit.com
marketland.ml kino-filmi.com
mecash.ru kletkimehan.ru
medictube.ru labafydjxa.su
meget.co.za lion.snapmap.us
member-quiz.com lsp-awak-perikanan.com
metabar.ru m0r0zk0-krava.ru
misswell.net maglid.ru
moroccosurfadventures.com marcoislandvacations.net
mygameplus.com meetingrainstorm.bid
myperiod.club metaxalonevstizanidine.blogspot.com
npoet.ru monarhs.info
o00.in moscow-clining.ru
offf.info naperehresti.info
orhonit.com news-readers.ru
perso.wanadoo.es nhl09.ru
physfunc.ru online-hit.info
picsforkeywordsuggestion.com openstat.com
pills24h.com optibuymac.com
powenlite24.ru osagonline.ru
pricheskaonline.ru pcimforum.com
purchasepillsnorx.com pixell.club
qcstrtvt.bloger.index.hr pk-services.ru
realting-moscow.ru porndroids.com
renecaovillasale.online portside.cc
ricorsogiustizia.org productarium.com
rimedia.org promoheads.com
risparmiocasa.bz.it psoriasis-file.trade
search.xtconnect.com qexyfu.bugs3.com
se.bnt-team.com queerspace.com
seeresultshub-a.akamaihd.net radiogambling.com
seofied.com remont-mobile-phones.ru
soft-terminal.ru royal-betting.net
staticfs.host rvi.biz
sugarlyflex.pw scanner-josh.top
superstarfloraluk.com sc-specialhost.com
svnuppsalaorebro.se sex-tracker.com
tizanidinevssoma.blogspot.com sitebeam.net
tongkatmadura.info solitaire-game.ru
trichizobswiv.agddns.net spymac.net
tt-ipd.info tizanidine4mg.blogspot.com
tuckpointingmasonrysystems.com traffic100.com
uptime-delta.net tubeline.biz
vepad.com tvand.ru
ukkelberg.no
unblocksit.es
uptime-alpha.net
uroki.net
vucms.com vucms.com
websites-reviews.com x-true.info
whatistizanidine2mg.blogspot.com zakazfutbolki.com
wineration.com zixizop.net.ru
w-journal.ru zoolubimets.ru
x-diesel.info
xn--80aaagvmjabrs1aoc9luc.xn--p1ai
ypmuseum.ru
zaapplesales.blogspot.com

File diff suppressed because it is too large Load diff

View file

@ -1,250 +1,250 @@
01apple.com 0lovespells0.blogspot.com
100searchengines.com 11pikachu.ru
1j7740kd.website 2nt.ru
20pascals.nl 4istoshop.com
8gold.com 4pp13.com
acgs.tk 7minuteworkout.com
adidas.frwebs.fr 7yue.org
adult-shop.com.ua 883zy.com
alfabot.xyz adman.gr
alf-img.com adviceforum.info
alibestsale.com advokateg.xyz
app5.letmacworkfaster.world afftrack001.com
arewater.com allnews24.in
amt-k.ru
apartment.ru
apidigidocketnet-a.akamaihd.net
apifasterlightin-a.akamaihd.net
apimegabrowsebiz-a.akamaihd.net
apps-analytics.net
arendakvartir.kz
arendovalka.xyz
arius.tech arius.tech
asscenihotosidea.blogspot.co.za azartclub.org
auto.rusvile.lt azartmix.com
batanga.net
battlecarnival.su
bedandbreakfast.com
bestdraws.com
best-games.today
bestimagecoollibrary.com
bestprofits-there.com bestprofits-there.com
bingo8888.com bidbuy.co.kr
blacktwhite.com blog.axant.it
bloke.com brandbucket.com
bonvillan.com buntube.net
boostmyppc.com buyhoverboard.com
brandehk.dk buypillsorderonline.com
bumascloset.com capacitacionyaprendizaje.com
butstrap.space carina-sy.de
cacheimages.com cartierreplica.pw
cakemediahq.com.au casinorewards.info
carloans.com casite-513049.cloudaccess.net
cayado.snn.gr cejewelry.xyz
cdncash.net cheap-trusted-backlinks.com
c-english.ru chelnytruck.ru
cenoval.ru cindymatches.com
cfcl.co.uk cjs.com.ru
chee-by.biz cleanallvirus.com
cl.s7.exct.net collegeessay19.blogspot.ru
colehaanoutlet.store com-cleaner.systems
communisave.co.za compliance-jane.top
compliance-jess.top compliance-margo.top
compliance-viktor.top consorzioilmosaico.org
compucelunlock.net contentsexpress.com
continent-e.tv cosmetic.donna7753191.ru
cranly.net customerguru.in
cubs-jerseys.us cypernhuset.se
daisye.top data.vtc.pw
dandiyabeats.in dengi-pod-zalog-nedvizhimosti.ru
dating-time-now.com dev33.dioniqlabb.se
daymusam.com de.zapmeta.com
ddospanel.com dfwu1013.info
delta-line.men doeco.ru
depositfiles-porn.ga domainanalyzing.xyz
dfiles.me
djstools.com
doctissimo.fr
dogclothing.store
domashneeruporno.com
dosugrostov.site dosugrostov.site
dotmass.top
doxyporno.com doxyporno.com
dyshagi.ru e-buyeasy.com
eaplay.ru editors.choice6912650.hulfingtonpost.com
eladkarako.com ekobata.ru
elektrischezigarette1.onsugar.com elektrozigaretten2.yn.lt
evogarage.com enhand.se
extractorandburner.com f1nder.org
extremal-blog.com falllow.gq
favorcosmetics.com fanpagerobot.com
filefilter.weebly.com felizporno.com
flytourisme.org financehint.eu
food.dtu.dk financetip.eu
forexgb.ru finuse.com
free-fbook-traffic.com flex4launch.ru
fun2cell.net formularz-konkurs.tk
game-mmorpg.net forpostlock.ru
gay-site.store foxjuegos.com
gilbertbanda.net freelifetimefuckbook.com
go2album.com freshwallpapers.info
goforexvps.com frighteningremain.cf
goldandcard.ru frvo.alptandem.ru
goldenggames.com fuckmill.com
gonextmedia.com funcrushgames.com
good-mummy.ru fun-mobi.pl
goodwinmetals.co gateway.zscalerone.net
gotwebsite1.com gdebestkupit.ru
gribkovye-zabolevaniya.com generalporn.org
growshop.es gg.zzyjxs.com
gwebtools.com.br globalsurfari.com
heroz.fr glogow.pl
hitcpm.com golmau.host.sk
hledejvshopech.cz google-liar.ru
hobbyhuren24.net greatdealshop.com
hotblognetwork.com gsbs.com.ua
hothor.se guigyverpo.cf
hotsocialz.com hasfun.com
houseofgaga.ru hd720kino.ru
images-free.net hdhc.ru
impotentik.com hopeonthestreet.co.uk
inbabes.sexushost.com hotloans.ru
integritylandscapeservices.com housekuba.org
investzalog.ru hyiphunter.org
ibb.com.ua
igrovyeavtomaty777.ru
iideaidekonkatu.info
images-graphics-pics.com
imgata.com
inome.com.ua
internetartfair.com
io9.com
iptool.xyz
iqupdatetmz.win
i-service.kz
itronics.ca itronics.ca
ivanstroi.ru jbl-charge.info
jennyfire.ru kalb.ru
jongose.ninja kanimage.com
jpcycles.com kareliatobacco.ru
juliaworld.net
kakadu-interior.com.ua
kaliningrad.zrus.org
keywordhouse.com
kiinomaniak.pl kiinomaniak.pl
kinohit1.ru kinky-fetishes.com
kndxbkdx.bloger.index.hr kinomaniatv.pl
knowyournextmove.com klosetkitten.com
labplus.ru klumba55.ru
lacapilla.info krynica.info
letmacwork.world kung-fu-ru.com
li-er.ru kw21.org
linksharingt.com lalalove.ru
lion.misba.us landinez.co
liver-chintai.org lankarns.com
lmrauction.com levaquin750mg.blogspot.com
lollypopgaming.com linkrr.com
lonerangergames.com liumimgx.pw
lostfilm-online.ru liveu.infoteka.hu
lotto6888.com loginduepunti.it
ltvperf.com masturbate.co.uk
magento-crew.net medicines-choice.com
magicplayer-s.acestream.net medkletki.ru
master-muznachas.ru minharevisao.com
meendo-free-traffic.ga mixtapetorrent.com
michaelkorsoutlet.store monclercoats.xyz
mmog-play.ru monetizationking.net
musflashtv.com moxo.com
myfreemp3.eu mrpornogratis.xxx
myindospace.com muzaporn.com
mystats.xyz myfreecams.com
natali-forex.com myperiod.club
naughtyconnect.com myseoconsultant.com
nelc.edu.eg nalogovyykodeks.ru
nextrent-crimea.ru net-profits.xyz
nonews.co nfvsz.com
nhl09.ru
normalegal.ru
nrv.co.za
offtime.ru
of-ireland.info of-ireland.info
onlinetvseries.me okel.co
oops-cinema.ru onemantrip.com
optom-deshevo.ru onlinadverts.com
onlinebay.ru
onlythegames.com
openlibrary.org
optibuymac.com
ordernorxx.com
orenburg-gsm.ru orenburg-gsm.ru
oyster-green.com paramountmarble.co.uk
patol01.pw partner-high.men
pavlodar.xkaz.org perm-profnastil.ru
pelfind.me
perso.wanadoo.es
petitions.whitehouse.gov
picturesify.com
plugingeorgia.com plugingeorgia.com
pobeiranie.pl poem-paying.gq
pochtovyi-index.ru pornmania.pl
polybuild.ru pornotubexxx.name
pooleroadmedicalcentre.co.uk pourvous.info
potolokelekor.ru pravoholding.ru
pozvonim.com
priora-2.com
privatbank46.ru
privhosting.com privhosting.com
prlog.ru produkto.net
pronorm.fr profolan.pl
prostitutki-tolyatti.org promodj.com
pst2017.onlinewebshop.net proprostatit.com
pussyspace.net prostitutki-astana.org
putitin.me
puzo2arbuza.ru puzo2arbuza.ru
rangjued.com qld10000.net
r-control.ru razleton.com
redbottomheels.xyz reversing.cc
remont-komputerov-notebook.ru ringtonepartner.com
rniaeba.ga rubbed.us
robertefuller.com runtnc.net
roznica.com.ua s1z.ru
rus-pornuha.com sammlungfotos.online
russkoe-zdorovie.ru sax-sex.com
sale-japan.com sbtdesign.co.uk
saneyes.com searchinquire.com
santechnik.jimdo.com semaltmedia.com
scanner-jane.top seoanalyses.com
seogadget.ru seolab.top
service.adtech.us servethis.com
service-core.ru shakhtar-doneck.ru
sexkontakte-seite.com shmetall.com.ua
sexsearch.com shtaketniki.kz
sexvporno.ru sibecoprom.ru
sex-watch.com simplepooltips.com
sfj-ror.no siteimprove.com
shinikiev.com.ua small-game.com
shodanhq.com smichovbike.cz
sims-sims.ru stauga.altervista.org
socialbutton.xyz sugarlyflex.pw
socialsignals24.com surcentro.com
solnplast.ru surgut.zrus.org
souvenirua.com surintech.ac.th
spacash.com tattomedia.com
staff.prairiesouth.ca td-l-market.ru
sugarkun.com tecspb.ru
sukirgenk.dvrlists.com testingads.pro
sundrugstore.com thefarmergame.com
svarbit.com thefds.net
symphonyintegratedhealthcare.com titangel-vietnam.com
tabletkinaodchudzanie.com.pl top-l2.com
thedownloadfromwarez.blogspot.com torrentdownloadhub.com
thewebsitetemplate.info trkdf.com
tilido.com try-rx.com
tizanidineandcipro.blogspot.com twitlinks.com
tizanidineforopiatewithdrawal.blogspot.com unitexindia.com
tizanidinehydrochloride2mg.blogspot.com unrealcommander.org
tizanidineoral.blogspot.com uptimebot.net
tjkckpytpnje.com urll.eu
tkanorganizma.ru usacasino.com
torture.ml vadimkravtcov.ru
touchmods.fr via-energy-order.com
tourcroatia.co.uk video-woman.com
trafficgenius.xyz vipromoffers.com
trafficnetzwerk.de vucms.com
tripper.de waysbetter.cn
tupper-posuda.ru weekes.biz.tc
uptime-as.net while.cheapwebsitehoster.com
ural-buldozer.ru word-vorlagen.xyz
vchulkax.com
velobikestock.com
venta-prom.ru
videochat.tv.br
video-hollywood.ru
videospornogratisx.net
vietimgy.pw
vigrx-original.ru
vilingstore.net
vkak.ru
vladimir.zrus.org
wesharepics.info
whatistizanidinehclusedfor.blogspot.com
whatzmyip.net
ws.ampower.me ws.ampower.me
xmronta.com wwwadultcheck.com
xn--80ab4aa2g.xn--p1ai xcombear.ru
xxlargepop.com x-diesel.info
yaderenergy.ru xfire.com
xmladserver.com
xn--80aafb2a.xn--p1ai
xn--b1agm2d.net
yopoint.in yopoint.in
zeroredirect10.com zacreditom.ru
zootoplist.com zajm-pod-zalog-nedvizhimosti.ru
zona-aqua.ru
zoogdisany.com
zoominfo.com
zoompegs.com
zs2vm.top

View file

@ -0,0 +1,59 @@
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html>

View file

@ -0,0 +1,122 @@
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<html>
<head><title>503 Service Temporarily Unavailable</title></head>
<body bgcolor="white">
<center><h1>503 Service Temporarily Unavailable</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html><!DOCTYPE html>
<html>
<head>
<title>Welcome to the Nginx</title>
</head>
<body>
<div align=center>
<h1>Welcome to the Nginx Ultimate Bad Bot Blocker</h1>
<p>This is merely used for testing !!!</p>
</body>
</html>

View file

@ -1,4 +1,4 @@
104.154.120.187 0; 104.154.113.151 0;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;
127.0.0.1 1; 127.0.0.1 1;

Binary file not shown.

Binary file not shown.

View file

@ -4,7 +4,7 @@
### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation: ### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation:
_______________ _______________
#### Version: V4.2019.06.1647 #### Version: V4.2019.06.1650
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -4,7 +4,7 @@
### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation: ### PLEASE READ CONFIGURATION INSTRUCTIONS BELOW THOROUGHLY :exclamation:
_______________ _______________
#### Version: V4.2019.06.1647 #### Version: V4.2019.06.1650
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -11,7 +11,7 @@
##### The Ultimate Nginx Bad Bot, User-Agent, Spam Referrer Blocker, Adware, Malware and Ransomware Blocker, Clickjacking Blocker, Click Re-Directing Blocker, SEO Companies and Bad IP Blocker with Anti DDOS System, Nginx Rate Limiting and Wordpress Theme Detector Blocking. Stop and Block all kinds of bad internet traffic from ever reaching your web sites. [PLEASE SEE: Definition of Bad Bots](#define-bad-bots) ##### The Ultimate Nginx Bad Bot, User-Agent, Spam Referrer Blocker, Adware, Malware and Ransomware Blocker, Clickjacking Blocker, Click Re-Directing Blocker, SEO Companies and Bad IP Blocker with Anti DDOS System, Nginx Rate Limiting and Wordpress Theme Detector Blocking. Stop and Block all kinds of bad internet traffic from ever reaching your web sites. [PLEASE SEE: Definition of Bad Bots](#define-bad-bots)
_______________ _______________
#### Version: V4.2019.06.1647 #### Version: V4.2019.06.1650
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -3,7 +3,7 @@
# EASY CONFIGURATION INSTRUCTIONS FOR STOPPING GOOGLE ANALYTICS "GHOST" SPAM # EASY CONFIGURATION INSTRUCTIONS FOR STOPPING GOOGLE ANALYTICS "GHOST" SPAM
_______________ _______________
#### Version: V4.2019.06.1647 #### Version: V4.2019.06.1650
#### Bad Referrer Count: 6713 #### Bad Referrer Count: 6713
#### Bad Bot Count: 556 #### Bad Bot Count: 556
____________________ ____________________

View file

@ -1,16 +1,21 @@
### ********************************** ### -----------------------------------------------------------
### THE ULTIMATE NGINX BAD BOT BLOCKER ### THE NGINX ULTIMATE BAD BOT, BAD IP AND BAD REFERRER BLOCKER
### ********************************** ### -----------------------------------------------------------
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:41 SAST 2019 ### Updated: Thu Jun 27 15:45:51 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
### --------------------------------------------
### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
############################################################################## ##############################################################################
# _ __ _ # # _ __ _ #
# / |/ /__ _(_)__ __ __ # # / |/ /__ _(_)__ __ __ #
@ -28,12 +33,16 @@
### and also has rate limiting functionality for bad bots who you only want to rate limit ### and also has rate limiting functionality for bad bots who you only want to rate limit
### and not actually block out entirely. It is very powerful and also very flexible. ### and not actually block out entirely. It is very powerful and also very flexible.
### --------------------------------------------------------------------------
### Created By: https://github.com/mitchellkrogza/ ### Created By: https://github.com/mitchellkrogza/
### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker ### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
### Copyright Mitchell Krog - <mitchellkrog@gmail.com> ### Copyright Mitchell Krog - <mitchellkrog@gmail.com>
### Contributors: Stuart Cardall - https://github.com/itoffshore ### Contributors: Stuart Cardall - https://github.com/itoffshore
### --------------------------------------------------------------------------
### --------------------------------------------------------------------------
### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04) ### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04)
### --------------------------------------------------------------------------
### This list was developed and is in use on a live Nginx server running some very busy web sites. ### This list was developed and is in use on a live Nginx server running some very busy web sites.
### It was built from the ground up using real data from daily logs and is updated almost daily. ### It was built from the ground up using real data from daily logs and is updated almost daily.
@ -41,9 +50,9 @@
### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked ### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked
### before they are added. It is monitored extensively for any false positives. ### before they are added. It is monitored extensively for any false positives.
### ********* ### ---------
### Features: ### Features:
### ********* ### ---------
### Clear formatting for Ease of Maintenance. ### Clear formatting for Ease of Maintenance.
### Alphabetically ordered lists for Ease of Maintenance. ### Alphabetically ordered lists for Ease of Maintenance.
### Extensive Commenting for Ease of Reference. ### Extensive Commenting for Ease of Reference.
@ -54,40 +63,38 @@
### IP range blocking / whitelisting. ### IP range blocking / whitelisting.
### Rate Limiting Functions. ### Rate Limiting Functions.
### ************ ### ------------
### INSTALLATION ### INSTALLATION
### ************ ### ------------
### PLEASE use the install, setup and update scripts provided for you to ease your installation. ### PLEASE use the install, setup and update scripts provided for you to ease your installation.
### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files. ### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files.
### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore ### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore
### There are also manual configuration instructions provided for those not wishing to do an auto install. ### There are also manual configuration instructions provided for those not wishing to do an auto install.
### *********************************************** ### -----------------------------------------------
### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!! ### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!!
### *********************************************** ### -----------------------------------------------
### Note that: ### SETTINGS:
### ---------------------------------------------
### 0 = allowed - no limits ### 0 = allowed - no limits
### 1 = allowed or rate limited less restrictive ### 1 = allowed or rate limited less restrictive
### 2 = rate limited more ### 2 = rate limited more
### 3 = block completely ### 3 = block completely
### ---------------------------------------------
### ************************************************************ ### ------------------------------------------------------------
### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS ### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS
### ************************************************************ ### ------------------------------------------------------------
### For contributing, corrections or adding bots or referrers to this repo, ### For contributing, corrections or adding bots or referrers to this repo,
### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder ### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder
### All Pull Requests will be checked for accuracy before being merged. ### All Pull Requests will be checked for accuracy before being merged.
# ********************************* # -----------------------
# FIRST BLOCK BY USER-AGENT STRINGS
# *********************************
# ***********************
# !!!!! PLEASE TEST !!!!! # !!!!! PLEASE TEST !!!!!
# *********************** # -----------------------
# ALWAYS test any User-Agent Strings you add here to make sure you have it right # ALWAYS test any User-Agent Strings you add here to make sure you have it right
# Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your # Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your
@ -98,36 +105,46 @@
# curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client) # curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client)
# curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection) # curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection)
# In this section we allow/disallow specific User Agents / Bots.
# ********************************************************************* # =======================
# Now we map all good and bad user agents to a variable called $bad_bot # START BLOCKER FUNCTIONS
# ********************************************************************* # =======================
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# DO NOT EDIT ANYTHING BELOW THIS LINE !!!
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# =============================
# BEGIN SECTION 1 - USER-AGENTS
# =============================
# ALLOW / BLOCK User Agents / Bots
# -------------------------------------------------------------------
# Map all GOOD and BAD UA (User Agents) to a variable called $bad_bot
# -------------------------------------------------------------------
map $http_user_agent $bad_bot { map $http_user_agent $bad_bot {
default 0; default 0;
# *********************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# ***********************************************
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it, meaning you can over-ride anything in this blocker to your liking.
# ***********************************************************************************
# START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it.
# This include file alows you to over-ride any Bad / Good UA (Bot) declared in this blocker to your liking.
include /etc/nginx/bots.d/blacklist-user-agents.conf; include /etc/nginx/bots.d/blacklist-user-agents.conf;
# ********************************************************************************* # ---------------------------------------------------------------------------------
# END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************************* # ---------------------------------------------------------------------------------
# ********************************************* # --------------------------------------------------
# Bad User-Agent Strings That We Block Outright # BAD UA (User-Agent) Strings That We Block Outright
# ********************************************* # --------------------------------------------------
# START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)360Spider(?:\b|)" 3; "~*(?:\b)360Spider(?:\b|)" 3;
@ -688,9 +705,16 @@ map $http_user_agent $bad_bot {
"~*(?:\b)ZyBorg(?:\b|)" 3; "~*(?:\b)ZyBorg(?:\b|)" 3;
# END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *********************************************** # --------------------------------------------
# Allow Good User-Agent Strings We Know and Trust # GOOD UA User-Agent Strings We Know and Trust
# *********************************************** # --------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# If you think GoogleBot is bad you would simply add them to
# blacklist-user-agents.conf with a value of 1
# -----------------------------------------------------------------------
# START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)adidxbot(?:\b|)" 0; "~*(?:\b)adidxbot(?:\b|)" 0;
@ -727,12 +751,13 @@ map $http_user_agent $bad_bot {
"~*(?:\b)yahoo(?:\b|)" 0; "~*(?:\b)yahoo(?:\b|)" 0;
# END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *************************************************** # --------------------------------------------------------
# User-Agent Strings Allowed Through but Rate Limited # GOOD UA User-Agent Rate Limiting 1 - Disabled by Default
# *************************************************** # --------------------------------------------------------
# Some people block libwww-perl, it used widely in many valid (non rogue) agents # TO ACTIVATE THIS RATE LIMITING Uncomment these two lines in blockbots.conf
# I allow libwww-perl as I use it for monitoring systems with Munin but it is rate limited #limit_conn bot1_connlimit 100;
#limit_req zone=bot1_reqlimitip burst=50;
# START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)jetmon(?:\b|)" 1; "~*(?:\b)jetmon(?:\b|)" 1;
@ -743,9 +768,14 @@ map $http_user_agent $bad_bot {
"~*(?:\b)Wget/1.15(?:\b|)" 1; "~*(?:\b)Wget/1.15(?:\b|)" 1;
# END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# ************************************************************** # -------------------------------------------------------
# Rate Limited User-Agents who get a bit aggressive on bandwidth # GOOD UA User-Agent Rate Limiting 2 - Enabled by Default
# ************************************************************** # -------------------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# -----------------------------------------------------------------------
# START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)Alexa(?:\b|)" 2; "~*(?:\b)Alexa(?:\b|)" 2;
@ -768,163 +798,186 @@ map $http_user_agent $bad_bot {
# END LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# ***************************************** # ===========================
# SECOND BLOCK BY REFERRER STRINGS AND URLS # END SECTION 1 - USER-AGENTS
# ***************************************** # ===========================
# ***************** # =======================================
# BEGIN SECTION 2 - REFERRERS AND DOMAINS
# =======================================
# ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page
# curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page
# ------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit # Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit
# make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www. # make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www.
# and it also does not care if the referrer request was sent with http https or even ftp. # and it also does not care if the referrer request was sent with http https or even ftp.
# ------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # ----------------------------------------------------------------
# Now we map all bad referrer words below to a variable called $bad_words # Map all BAD referrer words below to a variable called $bad_words
# *********************************************************************** # ----------------------------------------------------------------
# --------------------------------
# START Bad Referrer Word Scanning
# --------------------------------
map $http_referer $bad_words { map $http_referer $bad_words {
default 0; default 0;
# ************************** # -------------------------------------------------------------------------------------------
# Bad Referrer Word Scanning
# **************************
# These are Words and Terms often found tagged onto domains or within url query strings. # These are Words and Terms often found tagged onto domains or within url query strings.
# Create and Customize Your Own Bad Referrer Words Here using the new Include File Method # Create and Customize Your Own Bad Referrer Words Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# customized list of bad referrer words are automatically now included for you # customized list of bad referrer words are automatically now included for you
# Read Comments inside bad-referrer-words.conf for customization tips. # Read Comments inside bad-referrer-words.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# BE VERY CAREFUL using the bad-referrer-words.conf file - please read the comment and # BE VERY CAREFUL using this bad-referrer-words.conf file - please read the comments and
# examples inside the include file for detailed explanations into how seriously this can # examples inside the include file for detailed explanations into how seriously this can
# affect your own site from serving assets or other innocent sites from accessing your site # affect your own site from serving assets or other innocent sites from accessing your site
# For safety sake the whitelist-domains.conf file is also loaded here before the bad-referrer-words.conf file. # For safety sake the whitelist-domains.conf file is also loaded here before the
# bad-referrer-words.conf file is loaded.
# -------------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# ****************************************************************************** # ------------------------------------------------------------------------------
# START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ****************************************************************************** # ------------------------------------------------------------------------------
include /etc/nginx/bots.d/bad-referrer-words.conf; include /etc/nginx/bots.d/bad-referrer-words.conf;
# **************************************************************************** # ----------------------------------------------------------------------------
# END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# **************************************************************************** # ----------------------------------------------------------------------------
} }
# --------------------------------
# END Bad Referrer Word Scanning
# --------------------------------
# *************************
# Bad Referrer Domain Names
# *************************
# Now a list of bad referrer urls these domains or any combination of them ie .com .net # ----------------------------------------
# will be blocked out. Doesn't matter if the protocol is http, https or even ftp # START Good and Bad Referrer Domain Names
# ----------------------------------------
# -------------------------------------------------------------------------------------
# Good and Bad referrer urls Doesn't matter if the protocol is http, https or even ftp
# -------------------------------------------------------------------------------------
# ----------------------
# This section includes: # This section includes:
# ********************** # ----------------------
# --------------------------------------------------------------------------------
# Blocking of SEO company Semalt.com (now merged into this one section) # Blocking of SEO company Semalt.com (now merged into this one section)
# MIRAI Botnet Domains Used for Mass Attacks # MIRAI Botnet Domains Used for Mass Attacks
# Other known bad SEO companies and Ad Hijacking Sites # Other known bad SEO companies and Ad Hijacking Sites
# Sites linked to malware, adware, clickjacking and ransomware # Sites linked to malware, adware, clickjacking and ransomware
# Domain names and referrers used in referrer spam and seo hijacking
# Whitelisting of your own GOOD domains / referrers
# Whitelisting of any other GOOD domains / referrers you want explicitly NOT block
# --------------------------------------------------------------------------------
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test. # Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test.
# ------------------------------------------------------------------------------------------------------------------------------------
# For Example any of the following variations below of 8gold.com will be detected and blocked # For Example any of the following variations below of 8gold.com will be detected and blocked
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# So if you see a bad referrer from wearegoogle.com and you want to block them just add # So if you see a bad referrer from wearegoogle.com and you want to block them just add
# them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will # them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will
# kill all your SEO in a week. # kill all your SEO in a week.
# ------------------------------------------------------------------------------------------------------------------------------------
# To add your own custom bad referrers use the custom include file # To add your own custom bad referrers use the custom include file
# /etc/nginx/bots.d/custom-bad-referrers.conf # /etc/nginx/bots.d/custom-bad-referrers.conf
# Or send a Pull Request to add it to the global blacklist for other users. # Or send a Pull Request to add it to the global blacklist for other users.
# In the bad referrers section I also include sites that hotlink images without permission. # In the bad referrers section I also include sites that hotlink images without permission.
# ------------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # --------------------------------------------------------------------
# Now we map all good & bad referrer urls to variable called #bad_referer # Map all good & bad referrer DOMAINS to a variable called bad_referer
# *********************************************************************** # --------------------------------------------------------------------
map $http_referer $bad_referer { map $http_referer $bad_referer {
hostnames; hostnames;
default 0; default 0;
# ************************************* # --------------------------------------------
# GOOD REFERRERS - Spared from Checking # GOOD REFERRER DOMAINS - Spared from Checking
# ************************************* # --------------------------------------------
# ---------------------------------------------------------------------------------------
# Add all your own web site domain names and server names in this section # Add all your own web site domain names and server names in this section
# WHITELIST Your Own Domain Names Here using the new Include File Method # WHITELIST Your Own Domain Names Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted domain names are automatically now included for you. # whitelisted domain names are automatically now included for you.
# Read Comments inside whitelist-domains.conf for customization tips. # Read Comments inside whitelist-domains.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# ---------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# *********************************** # -----------------------------------
# CUSTOM BAD REFERRERS - Add your Own # CUSTOM BAD REFERRERS - Add your Own
# *********************************** # -----------------------------------
# Add any extra bad referrers in the following include file to have them # Add any extra bad referrers in the following include file to have them
# permanently included and blocked - avoid duplicates in your custom file # permanently included and blocked - avoid duplicates in your custom file
# custom-bad-referrers.conf is BOTH a BLACKLIST AND WHITELIST
# custom-bad-referrers.conf ALLOWS complete over-riding of anything
# If you think google.com is bad you would simply add them to
# custom-bad-referrers.conf with a value of 1
# ************************************************************************* # -------------------------------------------------------------------------
# START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
include /etc/nginx/bots.d/custom-bad-referrers.conf; include /etc/nginx/bots.d/custom-bad-referrers.conf;
# *********************************************************************** # -----------------------------------------------------------------------
# END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************** # -----------------------------------------------------------------------
# START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)000free\.us(?:\b|)" 1; "~*(?:\b)000free\.us(?:\b|)" 1;
@ -7644,137 +7697,49 @@ map $http_referer $bad_referer {
# END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# =====================================
# END SECTION 2 - REFERRERS AND DOMAINS
# =====================================
# *********************************************** # ========================================================================
# WHITELISTING AND BLACKLISTING IP ADDRESS RANGES # BEGIN SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# *********************************************** # ========================================================================
# Geo directive to deny and also whitelist certain ip addresses # --------------------------------------------------------------------------------------
# Map all GOOD and BAD IP Addresses and Ranges to a variable called geo $validate_client
# --------------------------------------------------------------------------------------
geo $validate_client { geo $validate_client {
# ********************
# First Our Safety Net
# ********************
# Anything not matching our rules is allowed through with default 0;
default 0; default 0;
# *********************************** # ----------------------------------------------
# Whitelist all your OWN IP addresses # Whitelist all your OWN IP addresses and Ranges
# *********************************** # ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below. # WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you. # whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips. # Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# ************************************************************************** # --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************** # --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************ # ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
# **************** # -------------------------------------
# Google IP Ranges # BLOCK known Wordpress Theme Detectors
# **************** # -------------------------------------
# For Safety Sake all Google's Known IP Ranges are all white listed
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# **************
# Bing IP Ranges
# **************
# For Safety Sake all Bing's Known IP Ranges are all white listed
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ********************
# Cloudflare IP Ranges
# ********************
# For Safety Sake all Cloudflare's Known IP Ranges are all white listed
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# *************************
# Wordpress Theme Detectors
# *************************
# START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
@ -7818,10 +7783,11 @@ geo $validate_client {
89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector 89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector
# END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
# **************************************** # ----------------------------------------------
# NIBBLER - SEO testing and reporting tool # BLOCK NIBBLER - SEO testing and reporting tool
# **************************************** # ----------------------------------------------
# See - http://nibbler.silktide.com/ # See - http://nibbler.silktide.com/
# ----------------------------------------------
# START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
52.201.238.175 1; 52.201.238.175 1;
@ -7834,33 +7800,10 @@ geo $validate_client {
# END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
# **************************** # -----------------------------------------
# Known Bad IP's and IP Ranges # BLOCK KNOWN BAD IP ADDRESSES
# ************************************************* # Top known bad IP Adresses from abuseIPDB
# Blacklist IP addresses and IP Ranges Customizable # -----------------------------------------
# *************************************************
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# ********************************************************************
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************
include /etc/nginx/bots.d/blacklist-ips.conf;
# ******************************************************************
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ******************************************************************
# *********************************************************************************************
# KNOWN BAD IP ADDRESSES
# Source: https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
# A Reliable Daily Updated List Included Below of Known Bad IP Addresses, Snoopers and Sniffers
# *********************************************************************************************
# START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
193.32.163.89 1; 193.32.163.89 1;
@ -17864,33 +17807,176 @@ geo $validate_client {
46.101.115.65 1; 46.101.115.65 1;
# END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
# --------------------------
# WHITELIST Google IP Ranges
# --------------------------
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------
# WHITELIST Bing IP Ranges
# ------------------------
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------------
# WHITELIST Cloudflare IP Ranges
# ------------------------------
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# -------------------------------------------------
# BLACKLIST IP addresses and IP Ranges Customizable
# -------------------------------------------------
# --------------------------------------------------------------------------------------
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# Anything added to blacklist-ips.conf will over-ride anything whitelisted above
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------
include /etc/nginx/bots.d/blacklist-ips.conf;
# ------------------------------------------------------------------
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------
# ----------------------------------------------
# Whitelist all your OWN IP addresses and Ranges
# ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf;
# ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------------
} }
# --------------------------------------------------------------------------------------
# WHITELIST your own IPs from the DDOS Filter # WHITELIST your own IPs from the DDOS Filter
# Add your own IP addresses and ranges into the custom include file whitelist-ips.conf # Add your own IP addresses and ranges into the custom include file whitelist-ips.conf
# to spare them from the rate limiting DDOS filter. # to spare them from the rate limiting DDOS filter.
# This section includes the same / single whitelist-ips.conf file so you only # This section includes the same / single whitelist-ips.conf file so you only
# need to edit that include file and have it include here for you too. # need to edit that include file and have it include here for you too.
# --------------------------------------------------------------------------------------
geo $ratelimited { geo $ratelimited {
default 1; default 1;
# *************************************************************************** # ---------------------------------------------------------------------------
# START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *************************************************************************** # ---------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************* # -------------------------------------------------------------------------
# END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
} }
# ***************************************** # ======================================================================
# MAP BAD BOTS TO OUR RATE LIMITER FUNCTION # END SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# ***************************************** # ======================================================================
# ============================================
# BEGIN SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
# ============================================
# --------------------------------------------
# 1. MAP BAD BOTS TO OUR RATE LIMITER FUNCTION
# --------------------------------------------
map $bad_bot $bot_iplimit { map $bad_bot $bot_iplimit {
0 ""; 0 "";
@ -17898,30 +17984,31 @@ geo $ratelimited {
2 $binary_remote_addr; 2 $binary_remote_addr;
} }
# *********************** # --------------------------
# SET RATE LIMITING ZONES # 2. SET RATE LIMITING ZONES
# *********************** # --------------------------
# BAD BOT RATE LIMITING ZONE # BAD BOT RATE LIMITING ZONE
# limits for Zone $bad_bot = 1 # Rate limiting will only take effect if on any User-Agents with a value of 2
# Nothing Set - you can set a different zone limiter here if you like
# We issue a 444 response instead to all bad bots.
# limits for Zone $bad_bot = 2
# this rate limiting will only take effect if you change any of the bots and change
# their block value from 1 to 2.
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=2r/s; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
### *** MAKE SURE TO ADD to your nginx.conf *** # ==========================================
### server_names_hash_bucket_size 64; # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
### server_names_hash_max_size 4096; # ==========================================
### limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
### limit_conn_zone $binary_remote_addr zone=addr:50m;
### to allow it to load this large set of domains into memory and to set the rate limiting zones for the DDOS filter.
### THE END of the Long and Winding Road # =====================
# END BLOCKER FUNCTIONS
# =====================
### Also check out my Ultimate Apache Bad Bot Blocker on Github ### --------------------------------------------
### https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker ### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
### FOR APACHE SERVERS
### ---------------------------------------------
### Check out the Ultimate Apache Bad Bot Blocker
### ---------------------------------------------

View file

@ -4,8 +4,8 @@
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V3.2019.06.1647 ### Version: V3.2019.06.1650
### Updated: Thu Jun 27 14:46:42 SAST 2019 ### Updated: Thu Jun 27 15:45:52 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
@ -17992,7 +17992,7 @@ geo $ratelimited {
# Rate limiting will only take effect if on any User-Agents with a value of 2 # Rate limiting will only take effect if on any User-Agents with a value of 2
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=6r/m; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
# ========================================== # ==========================================
# END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS

View file

@ -1,16 +1,21 @@
### ********************************** ### -----------------------------------------------------------
### THE ULTIMATE NGINX BAD BOT BLOCKER ### THE NGINX ULTIMATE BAD BOT, BAD IP AND BAD REFERRER BLOCKER
### ********************************** ### -----------------------------------------------------------
### VERSION INFORMATION # ### VERSION INFORMATION #
################################################### ###################################################
### Version: V4.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:41 SAST 2019 ### Updated: Thu Jun 27 15:45:51 SAST 2019
### Bad Referrer Count: 6713 ### Bad Referrer Count: 6713
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### VERSION INFORMATION ## ### VERSION INFORMATION ##
### --------------------------------------------
### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
############################################################################## ##############################################################################
# _ __ _ # # _ __ _ #
# / |/ /__ _(_)__ __ __ # # / |/ /__ _(_)__ __ __ #
@ -28,12 +33,16 @@
### and also has rate limiting functionality for bad bots who you only want to rate limit ### and also has rate limiting functionality for bad bots who you only want to rate limit
### and not actually block out entirely. It is very powerful and also very flexible. ### and not actually block out entirely. It is very powerful and also very flexible.
### --------------------------------------------------------------------------
### Created By: https://github.com/mitchellkrogza/ ### Created By: https://github.com/mitchellkrogza/
### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker ### Repo Url: https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
### Copyright Mitchell Krog - <mitchellkrog@gmail.com> ### Copyright Mitchell Krog - <mitchellkrog@gmail.com>
### Contributors: Stuart Cardall - https://github.com/itoffshore ### Contributors: Stuart Cardall - https://github.com/itoffshore
### --------------------------------------------------------------------------
### --------------------------------------------------------------------------
### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04) ### Tested on: nginx/1.10.3 up to latest Mainstream Version (Ubuntu 16.04)
### --------------------------------------------------------------------------
### This list was developed and is in use on a live Nginx server running some very busy web sites. ### This list was developed and is in use on a live Nginx server running some very busy web sites.
### It was built from the ground up using real data from daily logs and is updated almost daily. ### It was built from the ground up using real data from daily logs and is updated almost daily.
@ -41,9 +50,9 @@
### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked ### spam referrers, rogue IP address, scanners, scrapers and domain hijacking sites are extensively checked
### before they are added. It is monitored extensively for any false positives. ### before they are added. It is monitored extensively for any false positives.
### ********* ### ---------
### Features: ### Features:
### ********* ### ---------
### Clear formatting for Ease of Maintenance. ### Clear formatting for Ease of Maintenance.
### Alphabetically ordered lists for Ease of Maintenance. ### Alphabetically ordered lists for Ease of Maintenance.
### Extensive Commenting for Ease of Reference. ### Extensive Commenting for Ease of Reference.
@ -54,40 +63,38 @@
### IP range blocking / whitelisting. ### IP range blocking / whitelisting.
### Rate Limiting Functions. ### Rate Limiting Functions.
### ************ ### ------------
### INSTALLATION ### INSTALLATION
### ************ ### ------------
### PLEASE use the install, setup and update scripts provided for you to ease your installation. ### PLEASE use the install, setup and update scripts provided for you to ease your installation.
### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files. ### This Auto Installation procedure is documented in the README.md and AUTO-CONFIGURATION.md files.
### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore ### Installation, Setup and Update Scripts Contributed by Stuart Cardall - https://github.com/itoffshore
### There are also manual configuration instructions provided for those not wishing to do an auto install. ### There are also manual configuration instructions provided for those not wishing to do an auto install.
### *********************************************** ### -----------------------------------------------
### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!! ### !!!!! PLEASE READ INLINE NOTES ON TESTING !!!!!
### *********************************************** ### -----------------------------------------------
### Note that: ### SETTINGS:
### ---------------------------------------------
### 0 = allowed - no limits ### 0 = allowed - no limits
### 1 = allowed or rate limited less restrictive ### 1 = allowed or rate limited less restrictive
### 2 = rate limited more ### 2 = rate limited more
### 3 = block completely ### 3 = block completely
### ---------------------------------------------
### ************************************************************ ### ------------------------------------------------------------
### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS ### CONTRIBUTING / PULL REQUESTS / ADDING YOUR OWN BAD REFERRERS
### ************************************************************ ### ------------------------------------------------------------
### For contributing, corrections or adding bots or referrers to this repo, ### For contributing, corrections or adding bots or referrers to this repo,
### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder ### Send a Pull Request (PR) on any of the .list files in the _generator_lists folder
### All Pull Requests will be checked for accuracy before being merged. ### All Pull Requests will be checked for accuracy before being merged.
# ********************************* # -----------------------
# FIRST BLOCK BY USER-AGENT STRINGS
# *********************************
# ***********************
# !!!!! PLEASE TEST !!!!! # !!!!! PLEASE TEST !!!!!
# *********************** # -----------------------
# ALWAYS test any User-Agent Strings you add here to make sure you have it right # ALWAYS test any User-Agent Strings you add here to make sure you have it right
# Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your # Use a Chrome Extension called "User-Agent Switcher for Chrome" where you can create your
@ -98,36 +105,46 @@
# curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client) # curl -I http://www.yourdomain.com -A "GoogleBot" ---- GIVES YOU: HTTP/1.1 200 OK (Meaning web page was served to Client)
# curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection) # curl -I http://www.yourdomain.com -A "80legs" ---- GIVES YOU: curl: (52) Empty reply from server (Meaning Nginx gave a 444 Dropped Connection)
# In this section we allow/disallow specific User Agents / Bots.
# ********************************************************************* # =======================
# Now we map all good and bad user agents to a variable called $bad_bot # START BLOCKER FUNCTIONS
# ********************************************************************* # =======================
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# DO NOT EDIT ANYTHING BELOW THIS LINE !!!
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# =============================
# BEGIN SECTION 1 - USER-AGENTS
# =============================
# ALLOW / BLOCK User Agents / Bots
# -------------------------------------------------------------------
# Map all GOOD and BAD UA (User Agents) to a variable called $bad_bot
# -------------------------------------------------------------------
map $http_user_agent $bad_bot { map $http_user_agent $bad_bot {
default 0; default 0;
# *********************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# ***********************************************
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it, meaning you can over-ride anything in this blocker to your liking.
# ***********************************************************************************
# START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************************** # -----------------------------------------------------------------------------------
# Include your Own Custom List of Bad User Agents
# Use the include file below to further customize your own list of additional user-agents you wish to permanently block
# This include file allows whitelisting and blacklisting of anything specified below it.
# This include file alows you to over-ride any Bad / Good UA (Bot) declared in this blocker to your liking.
include /etc/nginx/bots.d/blacklist-user-agents.conf; include /etc/nginx/bots.d/blacklist-user-agents.conf;
# ********************************************************************************* # ---------------------------------------------------------------------------------
# END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BLACKLISTED USER AGENTS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************************* # ---------------------------------------------------------------------------------
# ********************************************* # --------------------------------------------------
# Bad User-Agent Strings That We Block Outright # BAD UA (User-Agent) Strings That We Block Outright
# ********************************************* # --------------------------------------------------
# START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)360Spider(?:\b|)" 3; "~*(?:\b)360Spider(?:\b|)" 3;
@ -688,9 +705,16 @@ map $http_user_agent $bad_bot {
"~*(?:\b)ZyBorg(?:\b|)" 3; "~*(?:\b)ZyBorg(?:\b|)" 3;
# END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *********************************************** # --------------------------------------------
# Allow Good User-Agent Strings We Know and Trust # GOOD UA User-Agent Strings We Know and Trust
# *********************************************** # --------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# If you think GoogleBot is bad you would simply add them to
# blacklist-user-agents.conf with a value of 1
# -----------------------------------------------------------------------
# START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)adidxbot(?:\b|)" 0; "~*(?:\b)adidxbot(?:\b|)" 0;
@ -727,12 +751,13 @@ map $http_user_agent $bad_bot {
"~*(?:\b)yahoo(?:\b|)" 0; "~*(?:\b)yahoo(?:\b|)" 0;
# END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END GOOD BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# *************************************************** # --------------------------------------------------------
# User-Agent Strings Allowed Through but Rate Limited # GOOD UA User-Agent Rate Limiting 1 - Disabled by Default
# *************************************************** # --------------------------------------------------------
# Some people block libwww-perl, it used widely in many valid (non rogue) agents # TO ACTIVATE THIS RATE LIMITING Uncomment these two lines in blockbots.conf
# I allow libwww-perl as I use it for monitoring systems with Munin but it is rate limited #limit_conn bot1_connlimit 100;
#limit_req zone=bot1_reqlimitip burst=50;
# START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)jetmon(?:\b|)" 1; "~*(?:\b)jetmon(?:\b|)" 1;
@ -743,9 +768,14 @@ map $http_user_agent $bad_bot {
"~*(?:\b)Wget/1.15(?:\b|)" 1; "~*(?:\b)Wget/1.15(?:\b|)" 1;
# END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END ALLOWED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
# ************************************************************** # -------------------------------------------------------
# Rate Limited User-Agents who get a bit aggressive on bandwidth # GOOD UA User-Agent Rate Limiting 2 - Enabled by Default
# ************************************************************** # -------------------------------------------------------
# -----------------------------------------------------------------------
# You can over-ride these in /etc/nginx/bots.d/blacklist-user-agents.conf
# by adding the same UA line there and chaning its value of 1
# -----------------------------------------------------------------------
# START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # START LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)Alexa(?:\b|)" 2; "~*(?:\b)Alexa(?:\b|)" 2;
@ -768,163 +798,186 @@ map $http_user_agent $bad_bot {
# END LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ### # END LIMITED BOTS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# ***************************************** # ===========================
# SECOND BLOCK BY REFERRER STRINGS AND URLS # END SECTION 1 - USER-AGENTS
# ***************************************** # ===========================
# ***************** # =======================================
# BEGIN SECTION 2 - REFERRERS AND DOMAINS
# =======================================
# ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://anything.adcash.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.goodwebsite.com/not-adcash --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://www.betterwebsite.com/not/adcash --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.google.com --- GIVES YOU: full html output of the web page
# curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page # curl -I http://www.yourdomain.com -e http://www.microsoft.com --- GIVES YOU: full html output of the web page
# ------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit # Because of case-insensitive matching any combination of capitilization in the names will all produce a positive hit
# make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www. # make sure you always test thoroughly and monitor logs. This section below also does NOT check for a preceding www.
# and it also does not care if the referrer request was sent with http https or even ftp. # and it also does not care if the referrer request was sent with http https or even ftp.
# ------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # ----------------------------------------------------------------
# Now we map all bad referrer words below to a variable called $bad_words # Map all BAD referrer words below to a variable called $bad_words
# *********************************************************************** # ----------------------------------------------------------------
# --------------------------------
# START Bad Referrer Word Scanning
# --------------------------------
map $http_referer $bad_words { map $http_referer $bad_words {
default 0; default 0;
# ************************** # -------------------------------------------------------------------------------------------
# Bad Referrer Word Scanning
# **************************
# These are Words and Terms often found tagged onto domains or within url query strings. # These are Words and Terms often found tagged onto domains or within url query strings.
# Create and Customize Your Own Bad Referrer Words Here using the new Include File Method # Create and Customize Your Own Bad Referrer Words Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# customized list of bad referrer words are automatically now included for you # customized list of bad referrer words are automatically now included for you
# Read Comments inside bad-referrer-words.conf for customization tips. # Read Comments inside bad-referrer-words.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# BE VERY CAREFUL using the bad-referrer-words.conf file - please read the comment and # BE VERY CAREFUL using this bad-referrer-words.conf file - please read the comments and
# examples inside the include file for detailed explanations into how seriously this can # examples inside the include file for detailed explanations into how seriously this can
# affect your own site from serving assets or other innocent sites from accessing your site # affect your own site from serving assets or other innocent sites from accessing your site
# For safety sake the whitelist-domains.conf file is also loaded here before the bad-referrer-words.conf file. # For safety sake the whitelist-domains.conf file is also loaded here before the
# bad-referrer-words.conf file is loaded.
# -------------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# ****************************************************************************** # ------------------------------------------------------------------------------
# START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ****************************************************************************** # ------------------------------------------------------------------------------
include /etc/nginx/bots.d/bad-referrer-words.conf; include /etc/nginx/bots.d/bad-referrer-words.conf;
# **************************************************************************** # ----------------------------------------------------------------------------
# END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRER WORDS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# **************************************************************************** # ----------------------------------------------------------------------------
} }
# --------------------------------
# END Bad Referrer Word Scanning
# --------------------------------
# *************************
# Bad Referrer Domain Names
# *************************
# Now a list of bad referrer urls these domains or any combination of them ie .com .net # ----------------------------------------
# will be blocked out. Doesn't matter if the protocol is http, https or even ftp # START Good and Bad Referrer Domain Names
# ----------------------------------------
# -------------------------------------------------------------------------------------
# Good and Bad referrer urls Doesn't matter if the protocol is http, https or even ftp
# -------------------------------------------------------------------------------------
# ----------------------
# This section includes: # This section includes:
# ********************** # ----------------------
# --------------------------------------------------------------------------------
# Blocking of SEO company Semalt.com (now merged into this one section) # Blocking of SEO company Semalt.com (now merged into this one section)
# MIRAI Botnet Domains Used for Mass Attacks # MIRAI Botnet Domains Used for Mass Attacks
# Other known bad SEO companies and Ad Hijacking Sites # Other known bad SEO companies and Ad Hijacking Sites
# Sites linked to malware, adware, clickjacking and ransomware # Sites linked to malware, adware, clickjacking and ransomware
# Domain names and referrers used in referrer spam and seo hijacking
# Whitelisting of your own GOOD domains / referrers
# Whitelisting of any other GOOD domains / referrers you want explicitly NOT block
# --------------------------------------------------------------------------------
# ***************** # ----------------
# PLEASE TEST !!!! # PLEASE TEST !!!!
# ***************** # ----------------
# ------------------------------------------------------------------------------------------------------------------------------------
# ALWAYS test referrers that you add. This is done manually as follows # ALWAYS test referrers that you add. This is done manually as follows
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test. # Because of case-insensitive matching any combination of capitilization will all produce a positive hit - make sure you always test.
# ------------------------------------------------------------------------------------------------------------------------------------
# For Example any of the following variations below of 8gold.com will be detected and blocked # For Example any of the following variations below of 8gold.com will be detected and blocked
# ------------------------------------------------------------------------------------------------------------------------------------
# curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://NOT-8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e http://this.is.not8gOlD.net --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e ftp://www.weare8gold.NET --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://subdomain.8gold.com --- GIVES YOU: curl: (52) Empty reply from server
# curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server # curl -I http://www.yourdomain.com -e https://NOT8GolD.org --- GIVES YOU: curl: (52) Empty reply from server
# ------------------------------------------------------------------------------------------------------------------------------------
# So if you see a bad referrer from wearegoogle.com and you want to block them just add # So if you see a bad referrer from wearegoogle.com and you want to block them just add
# them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will # them as "~*wearegoogle.com" don't ever go and do something like "~*google(-|.)" you will
# kill all your SEO in a week. # kill all your SEO in a week.
# ------------------------------------------------------------------------------------------------------------------------------------
# To add your own custom bad referrers use the custom include file # To add your own custom bad referrers use the custom include file
# /etc/nginx/bots.d/custom-bad-referrers.conf # /etc/nginx/bots.d/custom-bad-referrers.conf
# Or send a Pull Request to add it to the global blacklist for other users. # Or send a Pull Request to add it to the global blacklist for other users.
# In the bad referrers section I also include sites that hotlink images without permission. # In the bad referrers section I also include sites that hotlink images without permission.
# ------------------------------------------------------------------------------------------------------------------------------------
# *********************************************************************** # --------------------------------------------------------------------
# Now we map all good & bad referrer urls to variable called #bad_referer # Map all good & bad referrer DOMAINS to a variable called bad_referer
# *********************************************************************** # --------------------------------------------------------------------
map $http_referer $bad_referer { map $http_referer $bad_referer {
hostnames; hostnames;
default 0; default 0;
# ************************************* # --------------------------------------------
# GOOD REFERRERS - Spared from Checking # GOOD REFERRER DOMAINS - Spared from Checking
# ************************************* # --------------------------------------------
# ---------------------------------------------------------------------------------------
# Add all your own web site domain names and server names in this section # Add all your own web site domain names and server names in this section
# WHITELIST Your Own Domain Names Here using the new Include File Method # WHITELIST Your Own Domain Names Here using the new Include File Method
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted domain names are automatically now included for you. # whitelisted domain names are automatically now included for you.
# Read Comments inside whitelist-domains.conf for customization tips. # Read Comments inside whitelist-domains.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# ---------------------------------------------------------------------------------------
# ************************************************************************ # ------------------------------------------------------------------------
# START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-domains.conf; include /etc/nginx/bots.d/whitelist-domains.conf;
# ********************************************************************** # ----------------------------------------------------------------------
# END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED DOMAINS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************** # ----------------------------------------------------------------------
# *********************************** # -----------------------------------
# CUSTOM BAD REFERRERS - Add your Own # CUSTOM BAD REFERRERS - Add your Own
# *********************************** # -----------------------------------
# Add any extra bad referrers in the following include file to have them # Add any extra bad referrers in the following include file to have them
# permanently included and blocked - avoid duplicates in your custom file # permanently included and blocked - avoid duplicates in your custom file
# custom-bad-referrers.conf is BOTH a BLACKLIST AND WHITELIST
# custom-bad-referrers.conf ALLOWS complete over-riding of anything
# If you think google.com is bad you would simply add them to
# custom-bad-referrers.conf with a value of 1
# ************************************************************************* # -------------------------------------------------------------------------
# START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
include /etc/nginx/bots.d/custom-bad-referrers.conf; include /etc/nginx/bots.d/custom-bad-referrers.conf;
# *********************************************************************** # -----------------------------------------------------------------------
# END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END CUSTOM BAD REFERRERS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *********************************************************************** # -----------------------------------------------------------------------
# START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # START BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
"~*(?:\b)000free\.us(?:\b|)" 1; "~*(?:\b)000free\.us(?:\b|)" 1;
@ -7644,137 +7697,49 @@ map $http_referer $bad_referer {
# END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ### # END BAD REFERRERS ### DO NOT EDIT THIS LINE AT ALL ###
} }
# =====================================
# END SECTION 2 - REFERRERS AND DOMAINS
# =====================================
# *********************************************** # ========================================================================
# WHITELISTING AND BLACKLISTING IP ADDRESS RANGES # BEGIN SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# *********************************************** # ========================================================================
# Geo directive to deny and also whitelist certain ip addresses # --------------------------------------------------------------------------------------
# Map all GOOD and BAD IP Addresses and Ranges to a variable called geo $validate_client
# --------------------------------------------------------------------------------------
geo $validate_client { geo $validate_client {
# ********************
# First Our Safety Net
# ********************
# Anything not matching our rules is allowed through with default 0;
default 0; default 0;
# *********************************** # ----------------------------------------------
# Whitelist all your OWN IP addresses # Whitelist all your OWN IP addresses and Ranges
# *********************************** # ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below. # WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your # New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you. # whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips. # Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files # Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# ************************************************************************** # --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************** # --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************ # ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************ # ------------------------------------------------------------------------
# **************** # -------------------------------------
# Google IP Ranges # BLOCK known Wordpress Theme Detectors
# **************** # -------------------------------------
# For Safety Sake all Google's Known IP Ranges are all white listed
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# **************
# Bing IP Ranges
# **************
# For Safety Sake all Bing's Known IP Ranges are all white listed
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ********************
# Cloudflare IP Ranges
# ********************
# For Safety Sake all Cloudflare's Known IP Ranges are all white listed
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# *************************
# Wordpress Theme Detectors
# *************************
# START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # START WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
@ -7818,10 +7783,11 @@ geo $validate_client {
89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector 89.36.223.188 1; #www.cuteseotools.net/wordpress-theme-detector
# END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ### # END WP THEME DETECTORS ### DO NOT EDIT THIS LINE AT ALL ###
# **************************************** # ----------------------------------------------
# NIBBLER - SEO testing and reporting tool # BLOCK NIBBLER - SEO testing and reporting tool
# **************************************** # ----------------------------------------------
# See - http://nibbler.silktide.com/ # See - http://nibbler.silktide.com/
# ----------------------------------------------
# START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # START NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
52.201.238.175 1; 52.201.238.175 1;
@ -7834,33 +7800,10 @@ geo $validate_client {
# END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ### # END NIBBLER ### DO NOT EDIT THIS LINE AT ALL ###
# **************************** # -----------------------------------------
# Known Bad IP's and IP Ranges # BLOCK KNOWN BAD IP ADDRESSES
# ************************************************* # Top known bad IP Adresses from abuseIPDB
# Blacklist IP addresses and IP Ranges Customizable # -----------------------------------------
# *************************************************
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# ********************************************************************
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ********************************************************************
include /etc/nginx/bots.d/blacklist-ips.conf;
# ******************************************************************
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ******************************************************************
# *********************************************************************************************
# KNOWN BAD IP ADDRESSES
# Source: https://github.com/mitchellkrogza/Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
# A Reliable Daily Updated List Included Below of Known Bad IP Addresses, Snoopers and Sniffers
# *********************************************************************************************
# START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # START KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
193.32.163.89 1; 193.32.163.89 1;
@ -17864,33 +17807,176 @@ geo $validate_client {
46.101.115.65 1; 46.101.115.65 1;
# END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ### # END KNOWN BAD IP ADDRESSES ### DO NOT EDIT THIS LINE AT ALL ###
# --------------------------
# WHITELIST Google IP Ranges
# --------------------------
# START GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
108.177.0.0/17 0;
172.217.0.0/16 0;
173.194.0.0/16 0;
2001:4860:4000::/36 0;
203.208.60.0/24 0;
207.126.144.0/20 0;
209.85.128.0/17 0;
216.239.32.0/19 0;
216.58.192.0/19 0;
2404:6800:4000::/36 0;
2607:f8b0:4000::/36 0;
2800:3f0:4000::/36 0;
2a00:1450:4000::/36 0;
2c0f:fb50:4000::/36 0;
35.192.0.0/12 0;
64.18.0.0/20 0;
64.233.160.0/19 0;
64.68.80.0/21 0;
65.52.0.0/14 0;
66.102.0.0/20 0;
66.249.64.0/19 0;
72.14.192.0/18 0;
74.125.0.0/16 0;
# END GOOGLE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------
# WHITELIST Bing IP Ranges
# ------------------------
# START BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
131.253.21.0/24 0;
131.253.22.0/23 0;
131.253.24.0/21 0;
131.253.24.0/22 0;
131.253.32.0/20 0;
157.54.0.0/15 0;
157.56.0.0/14 0;
157.60.0.0/16 0;
199.30.16.0/24 0;
199.30.27.0/24 0;
207.46.0.0/16 0;
40.112.0.0/13 0;
40.120.0.0/14 0;
40.124.0.0/16 0;
40.125.0.0/17 0;
40.74.0.0/15 0;
40.76.0.0/14 0;
40.80.0.0/12 0;
40.96.0.0/12 0;
# END BING IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# ------------------------------
# WHITELIST Cloudflare IP Ranges
# ------------------------------
# START CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
103.21.244.0/22 0;
103.22.200.0/22 0;
103.31.4.0/22 0;
104.16.0.0/12 0;
108.162.192.0/18 0;
131.0.72.0/22 0;
141.101.64.0/18 0;
162.158.0.0/15 0;
172.64.0.0/13 0;
173.245.48.0/20 0;
188.114.96.0/20 0;
190.93.240.0/20 0;
197.234.240.0/22 0;
198.41.128.0/17 0;
199.27.128.0/21 0;
2400:cb00::/32 0;
2405:8100::/32 0;
2405:b500::/32 0;
2606:4700::/32 0;
2803:f800::/32 0;
2a06:98c0::/29 0;
2c0f:f248::/32 0;
# END CLOUDFLARE IP RANGES ### DO NOT EDIT THIS LINE AT ALL ###
# -------------------------------------------------
# BLACKLIST IP addresses and IP Ranges Customizable
# -------------------------------------------------
# --------------------------------------------------------------------------------------
# BLACKLIST all your IP addresses and Ranges using the new include file below.
# New Method Uses the include file below so that when pulling future updates your
# Custom Blacklisted IP addresses are automatically now included for you.
# Read Comments inside blacklist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# Anything added to blacklist-ips.conf will over-ride anything whitelisted above
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------
# START BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------
include /etc/nginx/bots.d/blacklist-ips.conf;
# ------------------------------------------------------------------
# END BLACKLISTED IPS ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------
# ----------------------------------------------
# Whitelist all your OWN IP addresses and Ranges
# ----------------------------------------------
# --------------------------------------------------------------------------------------
# WHITELIST all your own IP addresses using the include file below.
# New Method Uses the include file below so that when pulling future updates your
# whitelisted IP addresses are automatically now included for you.
# Read Comments inside whitelist-ips.conf for customization tips.
# Updating the main globalblacklist.conf file will not touch your custom include files
# whitelist-ips.conf reigns supreme !!!
# Whatever you add to whitelist-ips.conf will be whitelisted FULL STOP
# Anything blacklisted above this line will be over-ridden by whitelist-ips.conf
# --------------------------------------------------------------------------------------
# --------------------------------------------------------------------------
# START WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# --------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf;
# ------------------------------------------------------------------------
# END WHITELISTED IP RANGES ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ------------------------------------------------------------------------
} }
# --------------------------------------------------------------------------------------
# WHITELIST your own IPs from the DDOS Filter # WHITELIST your own IPs from the DDOS Filter
# Add your own IP addresses and ranges into the custom include file whitelist-ips.conf # Add your own IP addresses and ranges into the custom include file whitelist-ips.conf
# to spare them from the rate limiting DDOS filter. # to spare them from the rate limiting DDOS filter.
# This section includes the same / single whitelist-ips.conf file so you only # This section includes the same / single whitelist-ips.conf file so you only
# need to edit that include file and have it include here for you too. # need to edit that include file and have it include here for you too.
# --------------------------------------------------------------------------------------
geo $ratelimited { geo $ratelimited {
default 1; default 1;
# *************************************************************************** # ---------------------------------------------------------------------------
# START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # START WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# *************************************************************************** # ---------------------------------------------------------------------------
include /etc/nginx/bots.d/whitelist-ips.conf; include /etc/nginx/bots.d/whitelist-ips.conf;
# ************************************************************************* # -------------------------------------------------------------------------
# END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ### # END WHITELISTED IP RANGES2 ### DO NOT EDIT OR REMOVE THIS LINE AT ALL ###
# ************************************************************************* # -------------------------------------------------------------------------
} }
# ***************************************** # ======================================================================
# MAP BAD BOTS TO OUR RATE LIMITER FUNCTION # END SECTION 3 - WHITELISTING AND BLACKLISTING IP ADDRESSESE AND RANGES
# ***************************************** # ======================================================================
# ============================================
# BEGIN SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
# ============================================
# --------------------------------------------
# 1. MAP BAD BOTS TO OUR RATE LIMITER FUNCTION
# --------------------------------------------
map $bad_bot $bot_iplimit { map $bad_bot $bot_iplimit {
0 ""; 0 "";
@ -17898,30 +17984,31 @@ geo $ratelimited {
2 $binary_remote_addr; 2 $binary_remote_addr;
} }
# *********************** # --------------------------
# SET RATE LIMITING ZONES # 2. SET RATE LIMITING ZONES
# *********************** # --------------------------
# BAD BOT RATE LIMITING ZONE # BAD BOT RATE LIMITING ZONE
# limits for Zone $bad_bot = 1 # Rate limiting will only take effect if on any User-Agents with a value of 2
# Nothing Set - you can set a different zone limiter here if you like
# We issue a 444 response instead to all bad bots.
# limits for Zone $bad_bot = 2
# this rate limiting will only take effect if you change any of the bots and change
# their block value from 1 to 2.
limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m; limit_conn_zone $bot_iplimit zone=bot2_connlimit:16m;
limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=2r/s; limit_req_zone $bot_iplimit zone=bot2_reqlimitip:16m rate=12r/m;
### *** MAKE SURE TO ADD to your nginx.conf *** # ==========================================
### server_names_hash_bucket_size 64; # END SECTION 4 - ACTIVATE BLOCKER FUNCTIONS
### server_names_hash_max_size 4096; # ==========================================
### limit_req_zone $binary_remote_addr zone=flood:50m rate=90r/s;
### limit_conn_zone $binary_remote_addr zone=addr:50m;
### to allow it to load this large set of domains into memory and to set the rate limiting zones for the DDOS filter.
### THE END of the Long and Winding Road # =====================
# END BLOCKER FUNCTIONS
# =====================
### Also check out my Ultimate Apache Bad Bot Blocker on Github ### --------------------------------------------
### https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker ### HELP SUPPORT THIS PROJECT - Send Me a Coffee
### https://ko-fi.com/mitchellkrog
### --------------------------------------------
### FOR APACHE SERVERS
### ---------------------------------------------
### Check out the Ultimate Apache Bad Bot Blocker
### ---------------------------------------------

View file

@ -6,8 +6,8 @@
### Version Information # ### Version Information #
################################################### ###################################################
### Version: V4.2019.06.1647 ### Version: V4.2019.06.1650
### Updated: Thu Jun 27 14:46:43 SAST 2019 ### Updated: Thu Jun 27 15:45:54 SAST 2019
### Bad Bot Count: 556 ### Bad Bot Count: 556
################################################### ###################################################
### Version Information ## ### Version Information ##