mirror of
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker.git
synced 2025-09-11 07:44:42 +00:00
V4.2019.07.1748 [ci skip]
This commit is contained in:
parent
43cac0a02d
commit
bd71a6d02f
81 changed files with 5016 additions and 5009 deletions
|
@ -2,8 +2,8 @@
|
|||
|
||||
# VERSION INFORMATION #
|
||||
#----------------------
|
||||
# Version: V4.2019.10
|
||||
# Updated: 2019-06-28
|
||||
# Version: V4.2019.11
|
||||
# Updated: 2019-07-05
|
||||
#----------------------
|
||||
# VERSION INFORMATION #
|
||||
|
||||
|
@ -48,28 +48,28 @@
|
|||
|
||||
# BY DEFAULT ALL THE EXAMPLES BELOW ARE COMMENTED OUT AND HENCE NOT ENABLED
|
||||
|
||||
# As you can see in the examples below the word "adultgalls" is entered with a preceding \b and an ending \b
|
||||
# this makes it now "\badultgalls\b". It is crucial to use the word boundaries regex formatting.
|
||||
# As you can see in the examples below the word "adultgalls" is entered with a preceding (?:\b) and an ending (?:\b)
|
||||
# this makes it now "(?:\b)adultgalls(?:\b)". It is crucial to use the word boundaries regex formatting.
|
||||
|
||||
# ---------
|
||||
# EXAMPLES:
|
||||
# ---------
|
||||
# "~*(?:\b)adultgalls(?:\b|)" 1;
|
||||
# "~*(?:\b)amateurxpass(?:\b|)" 1;
|
||||
# "~*(?:\b)bigblackbooty(?:\b|)" 1;
|
||||
# "~*(?:\b)blacktits(?:\b|)" 1;
|
||||
# "~*(?:\b)cookie\-law\-enforcement(?:\b|)" 1;
|
||||
# "~*(?:\b)free\-share\-buttons(?:\b|)" 1;
|
||||
# "~*(?:\b)free\-social\-buttons(?:\b|)" 1;
|
||||
# "~*(?:\b)fuck\-paid\-share\-buttons(?:\b|)" 1;
|
||||
# "~*(?:\b)ilovevitaly(?:\b|)" 1;
|
||||
# "~*(?:\b)law\-enforcement\-bot(?:\b|)" 1;
|
||||
# "~*(?:\b)law\-enforcement\-check(?:\b|)" 1;
|
||||
# "~*(?:\b)share\-buttons\-for\-free(?:\b|)" 1;
|
||||
# "~*(?:\b)webfuck(?:\b|)" 1;
|
||||
# "~*(?:\b)xxxrus(?:\b|)" 1;
|
||||
# "~*(?:\b)zeroredirect(?:\b|)" 1;
|
||||
# "~*(?:\b|)x22(?:\b|)" 1; (in this string if your own domain name was sex22.com it would be blocked)
|
||||
# "~*(?:\b)adultgalls(?:\b)" 1;
|
||||
# "~*(?:\b)amateurxpass(?:\b)" 1;
|
||||
# "~*(?:\b)bigblackbooty(?:\b)" 1;
|
||||
# "~*(?:\b)blacktits(?:\b)" 1;
|
||||
# "~*(?:\b)cookie\-law\-enforcement(?:\b)" 1;
|
||||
# "~*(?:\b)free\-share\-buttons(?:\b)" 1;
|
||||
# "~*(?:\b)free\-social\-buttons(?:\b)" 1;
|
||||
# "~*(?:\b)fuck\-paid\-share\-buttons(?:\b)" 1;
|
||||
# "~*(?:\b)ilovevitaly(?:\b)" 1;
|
||||
# "~*(?:\b)law\-enforcement\-bot(?:\b)" 1;
|
||||
# "~*(?:\b)law\-enforcement\-check(?:\b)" 1;
|
||||
# "~*(?:\b)share\-buttons\-for\-free(?:\b)" 1;
|
||||
# "~*(?:\b)webfuck(?:\b)" 1;
|
||||
# "~*(?:\b)xxxrus(?:\b)" 1;
|
||||
# "~*(?:\b)zeroredirect(?:\b)" 1;
|
||||
# "~*(?:\b|)x22(?:\b)" 1; (in this string if your own domain name was sex22.com it would be blocked)
|
||||
|
||||
|
||||
# Here is a list of unsanitary words used in referrer strings - used in various injection attacks
|
||||
|
|
|
@ -5,8 +5,8 @@
|
|||
|
||||
# VERSION INFORMATION #
|
||||
#----------------------
|
||||
# Version: V4.2019.07
|
||||
# Updated: 2019-06-28
|
||||
# Version: V4.2019.08
|
||||
# Updated: 2019-07-05
|
||||
#----------------------
|
||||
# VERSION INFORMATION #
|
||||
|
||||
|
@ -40,25 +40,25 @@
|
|||
|
||||
# Make sure any words that contain special characters are escaped and include word boundaries as per the Regex examples below.
|
||||
|
||||
# Example the User-Agent name "someverybaduseragentname1" is entered as "(?:\b)someverybaduseragentname1(?:\b|)"
|
||||
# Example the User-Agent name "some-very-bad-useragentname2" is entered as "(?:\b)some\-very\-bad\-useragentname1(?:\b|)"
|
||||
# the "(?:\b)" and "(?:\b|)" are word boundaries which prevents partial matching and false positives.
|
||||
# Example the User-Agent name "someverybaduseragentname1" is entered as "(?:\b)someverybaduseragentname1(?:\b)"
|
||||
# Example the User-Agent name "some-very-bad-useragentname2" is entered as "(?:\b)some\-very\-bad\-useragentname1(?:\b)"
|
||||
# the "(?:\b)" and "(?:\b)" are word boundaries which prevents partial matching and false positives.
|
||||
|
||||
# BY DEFAULT ALL THE EXAMPLES BELOW ARE COMMENTED OUT AND HENCE NOT ENABLED
|
||||
|
||||
# ---------------------
|
||||
# WHITELISTING EXAMPLES
|
||||
# ---------------------
|
||||
# "~*(?:\b)someverygooduseragentname1(?:\b|)" 0;
|
||||
# "~*(?:\b)someverygooduseragentname2(?:\b|)" 0;
|
||||
# "~*(?:\b)some\-very\-good\-useragentname2(?:\b|)" 0;
|
||||
# "~*(?:\b)someverygooduseragentname1(?:\b)" 0;
|
||||
# "~*(?:\b)someverygooduseragentname2(?:\b)" 0;
|
||||
# "~*(?:\b)some\-very\-good\-useragentname2(?:\b)" 0;
|
||||
|
||||
# ---------------------
|
||||
# BLACKLISTING EXAMPLES
|
||||
# ---------------------
|
||||
# "~*(?:\b)someverybaduseragentname1(?:\b|)" 3;
|
||||
# "~*(?:\b)someverybaduseragentname2(?:\b|)" 3;
|
||||
# "~*(?:\b)some\-very\-bad\-useragentname2(?:\b|)" 3;
|
||||
# "~*(?:\b)someverybaduseragentname1(?:\b)" 3;
|
||||
# "~*(?:\b)someverybaduseragentname2(?:\b)" 3;
|
||||
# "~*(?:\b)some\-very\-bad\-useragentname2(?:\b)" 3;
|
||||
|
||||
# Here are some default things I block on my own server, these appear in various types of injection attacks
|
||||
# You can disable them if you have problems or don't agree by switching thir value to 0 or moving them into the whitelist section first and then making their value 0
|
||||
|
@ -73,7 +73,7 @@
|
|||
# MY BLACKLIST
|
||||
# ------------
|
||||
|
||||
"~*(?:\b)x22(?:\b|)" 3;
|
||||
"~*(?:\b){|}(?:\b|)" 3;
|
||||
"~*(?:\b|)mb_ereg_replace(?:\b|)" 3;
|
||||
"~*(?:\b|)file_put_contents(?:\b|)" 3;
|
||||
"~*(?:\b)x22(?:\b)" 3;
|
||||
"~*(?:\b){|}(?:\b)" 3;
|
||||
"~*(?:\b)mb_ereg_replace(?:\b)" 3;
|
||||
"~*(?:\b)file_put_contents(?:\b)" 3;
|
||||
|
|
|
@ -4,8 +4,8 @@
|
|||
|
||||
# VERSION INFORMATION #
|
||||
#----------------------
|
||||
# Version: V4.2019.08
|
||||
# Updated: 2019-06-28
|
||||
# Version: V4.2019.09
|
||||
# Updated: 2019-07-05
|
||||
#----------------------
|
||||
# VERSION INFORMATION #
|
||||
|
||||
|
@ -34,29 +34,29 @@
|
|||
# *****************************************************************************************
|
||||
|
||||
# As you can see in the examples below the domain "someveryveryrandomwebsitenamethatdoesnotexist1\.com"
|
||||
# is entered with a preceding \b and an ending \b
|
||||
# this makes it now "\bsomeveryveryrandomwebsitenamethatdoesnotexist1\.com\b".
|
||||
# is entered with a preceding (?:\b) and an ending (?:\b)
|
||||
# this makes it now "(?:\b)someveryveryrandomwebsitenamethatdoesnotexist1\.com(?:\b)".
|
||||
# It is crucial to use the word boundaries regex formatting.
|
||||
# ---------
|
||||
# EXAMPLES:
|
||||
# ---------
|
||||
# BY DEFAULT ALL THE EXAMPLES BELOW ARE COMMENTED OUT AND HENCE NOT ENABLED
|
||||
# "~*(?:\b)someveryveryrandomwebsitenamethatdoesnotexist1\.com(?:\b|)" 1;
|
||||
# "~*(?:\b)someveryveryrandomwebsitenamethatdoesnotexist2\.com(?:\b|)" 1;
|
||||
# "~*(?:\b)someveryveryrandomwebsitenamethatdoesnotexist3\.com(?:\b|)" 1;
|
||||
# "~*(?:\b)some\-veryvery\-randomweb\-sitenamethatdoesnotexist4\.com(?:\b|)" 1;
|
||||
# "~*(?:\b)someveryveryrandomwebsitenamethatdoesnotexist1\.com(?:\b)" 1;
|
||||
# "~*(?:\b)someveryveryrandomwebsitenamethatdoesnotexist2\.com(?:\b)" 1;
|
||||
# "~*(?:\b)someveryveryrandomwebsitenamethatdoesnotexist3\.com(?:\b)" 1;
|
||||
# "~*(?:\b)some\-veryvery\-randomweb\-sitenamethatdoesnotexist4\.com(?:\b)" 1;
|
||||
|
||||
# ------------
|
||||
# MY WHITELIST
|
||||
# ------------
|
||||
|
||||
# "~*(?:\b)mywebsite\.com(?:\b|)" 0;
|
||||
# "~*(?:\b)mywebsite\.com(?:\b)" 0;
|
||||
|
||||
|
||||
# ------------
|
||||
# MY BLACKLIST
|
||||
# ------------
|
||||
|
||||
# "~*(?:\b)someotherwebsite\.com(?:\b|)" 1;
|
||||
# "~*(?:\b)someotherwebsite\.com(?:\b)" 1;
|
||||
|
||||
|
||||
|
|
|
@ -2,8 +2,8 @@
|
|||
|
||||
# VERSION INFORMATION #
|
||||
#----------------------
|
||||
# Version: V4.2019.07
|
||||
# Updated: 2019-06-28
|
||||
# Version: V4.2019.08
|
||||
# Updated: 2019-07-05
|
||||
#----------------------
|
||||
# VERSION INFORMATION #
|
||||
|
||||
|
@ -32,15 +32,15 @@
|
|||
# PLEASE MAKE SURE that you use word regex boundaries to avoid false positive detection !!!
|
||||
# *****************************************************************************************
|
||||
|
||||
# As you can see in the examples below the domain "myfirstowndomainname\.com" is entered with a preceding \b and an ending \b
|
||||
# this makes it now "\bmyfirstowndomainname\.com\b". It is crucial to use the word boundaries regex formatting.
|
||||
# As you can see in the examples below the domain "myfirstowndomainname\.com" is entered with a preceding (?:\b) and an ending (?:\b)
|
||||
# this makes it now "(?:\b)myfirstowndomainname\.com(?:\b)". It is important to use the word boundaries regex formatting.
|
||||
|
||||
# BY DEFAULT ALL THE EXAMPLES BELOW ARE COMMENTED OUT AND HENCE NOT ENABLED
|
||||
# ---------
|
||||
# EXAMPLES:
|
||||
# ---------
|
||||
# "~*(?:\b)myfirstowndomainname\.com(?:\b|)" 0;
|
||||
# "~*(?:\b)my\-second\-owndomainname\.com(?:\b|)" 0;
|
||||
# "~*(?:\b)myfirstowndomainname\.com(?:\b)" 0;
|
||||
# "~*(?:\b)my\-second\-owndomainname\.com(?:\b)" 0;
|
||||
|
||||
# ------------
|
||||
# MY WHITELIST
|
||||
|
|
|
@ -45,5 +45,6 @@
|
|||
# - Whitelisting IP's and RANGES here ONLY affects the IP blocking functions.
|
||||
# - This file will NOT allow your own IP to bypass bad User-Agent or Referrer String checks.
|
||||
# - To bypass everything for a certain IP see notes in blockbots.conf on SUPER WHITELIST
|
||||
104.154.120.187 0;
|
||||
35.224.112.202 0;
|
||||
34.66.178.120 0;
|
||||
34.68.144.114 0;
|
||||
35.192.187.174 0;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue