|
@@ -165,19 +165,38 @@ Require not ip 93.238.202.44
|
|
|
|
|
|
# Use this section at YOUR OWN RISK, you may block some legitimate networks but after many hours of
|
|
# Use this section at YOUR OWN RISK, you may block some legitimate networks but after many hours of
|
|
# Research this is now the completely updated list of all IP ranges IPV4 and IPV6 owned Qwest Communications
|
|
# Research this is now the completely updated list of all IP ranges IPV4 and IPV6 owned Qwest Communications
|
|
-# PSINET and Cyveillance
|
|
|
|
|
|
+# PSINET and Cyveillance.
|
|
|
|
|
|
# IMPORTANT NOTE: If you really want to keeps bot and things out of certain parts of your web site
|
|
# IMPORTANT NOTE: If you really want to keeps bot and things out of certain parts of your web site
|
|
# Rather implement a comlex Google Re-Captcha to reach sections of your sites and for people to be able
|
|
# Rather implement a comlex Google Re-Captcha to reach sections of your sites and for people to be able
|
|
# to access download links. Google Re-Captcha with images is too complex for any bot.
|
|
# to access download links. Google Re-Captcha with images is too complex for any bot.
|
|
|
|
|
|
-Require ip 4.17.135.32/27
|
|
|
|
-Require ip 38.0.0.0/8
|
|
|
|
-Require ip 63.144.0.0/13
|
|
|
|
-Require ip 65.112.0.0/12
|
|
|
|
-Require ip 65.192.0.0/11
|
|
|
|
-Require ip 65.213.208.128/27
|
|
|
|
-Require ip 65.222.176.96/27
|
|
|
|
-Require ip 65.222.185.72/29
|
|
|
|
-Require ip 206.2.138.0/23
|
|
|
|
-Require ip 208.71.164.0/22
|
|
|
|
|
|
+# Only uncomment the lines below if you want to block these ranges otherwise rather just leave it as is.
|
|
|
|
+
|
|
|
|
+#Require not ip 4.17.135.32/27
|
|
|
|
+#Require not ip 38.0.0.0/8
|
|
|
|
+#Require not ip 63.144.0.0/13
|
|
|
|
+#Require not ip 65.112.0.0/12
|
|
|
|
+#Require not ip 65.192.0.0/11
|
|
|
|
+#Require not ip 65.213.208.128/27
|
|
|
|
+#Require not ip 65.222.176.96/27
|
|
|
|
+#Require not ip 65.222.185.72/29
|
|
|
|
+#Require not ip 206.2.138.0/23
|
|
|
|
+#Require not ip 208.71.164.0/22
|
|
|
|
+
|
|
|
|
+# BERKELEY SCANNER
|
|
|
|
+# ****************
|
|
|
|
+# The Berkeley University has a scanner testing all over the web sending a complex
|
|
|
|
+# payload an expecting a reply from servers who are infected or who just respond to such
|
|
|
|
+# a payload. The payload looks similar to this
|
|
|
|
+# "$\xC9\xE1\xDC\x9B+\x8F\x1C\xE71\x99\xA8\xDB6\x1E#\xBB\x19#Hx\xA7\xFD\x0F9-"
|
|
|
|
+# and is sometime VERY long. You may have noticed this in your logs.
|
|
|
|
+# I support research projects and all my servers respond with an error to this type of
|
|
|
|
+# string so I do not block them but if you want to block just uncomment the following line
|
|
|
|
+# or email them asking them not to scan your server. They do respond.
|
|
|
|
+# Visit http://169.229.3.91/ for more info
|
|
|
|
+
|
|
|
|
+# If you really do want to block them uncomment the line below.
|
|
|
|
+
|
|
|
|
+#Require not ip 169.229.3.91
|
|
|
|
+
|