Forum Moderators: open
64.124.85.91 - - [25/Nov/2004:16:35:29 -0800] "GET /robots.txt HTTP/1.1" 200 1705 "-" "Mozilla/4.7 [en](BecomeBot'at'exava.com)"
11/26/04 14:26:20 IP block 64.124.85.91
Trying 64.124.85.91 at ARIN
Trying 64.124.85 at ARIN
Abovenet Communications, Inc ABOVENET (NET-64-124-0-0-1)
64.124.0.0 - 64.125.255.255
Exava MFN-B753-64-124-85-0-24 (NET-64-124-85-0-1)
64.124.85.0 - 64.124.85.255# ARIN WHOIS database, last updated 2004-11-25 19:10
# Enter? for additional hints on searching ARIN's WHOIS database.
69.111.170.194
64.124.85.
just blocked these IPs in cPanel, is that enough to do the trick? The last octet on the second IP I put a * in
Not sure if you cpanel uses rewrites or sets?
Did you view your htacess file afterwards?
the "*" is not a variable to be used is such numeral expressions for either set or rewrite.
The first full range denies precisely that SOLITARY IP only. (if sets are used or cpanel creates a valid rewrite.
The second line depends on IF rewrites or sets are used?
If rewrites the line is invaild on two accounts, your attempt at wildcard and not omitting the ending period.
If sets?
The ending period takes out everything below 64.124.85.
or 64.124.85.0-255
The examples provided on this page were are still functioning today and were functioning at least two years prior to when this thread was created:
[webmasterworld.com...]
The only lines which contain a *
are either in the referrer based denies or in the action closing lines.
BTW what my host knows about htaccess wouldn't fill the head of needle ;)
It is entirely posibble to create a line in htaccess which does not result in a 500 (taking the site down,) however the line fails to function as you intended when implemented.
Three good examples are multiple "¦¦", lack of a closing parenthenses, and lack of a closing [OR].
In addition these invalid lines have an effect on the other lines in the htaccess files.
[edit]
Please see this page"
[etext.lib.virginia.edu...]
Under the heading of "quantifiers"
[become.com...]
I wonder if this will turn into anything decent...
Sorry for the delay, just got back from a trip up north...
First off, thanks so much for the help and valuable information. Those links are truly helpful for anyone trying to learn htaccess (such as myself).
Actually what I ment by using the wildcard is putting it in last octet field in the cPanel IP Deny Manager module. The output htaccess file from the previously mentioned blocked IP range is this:
# -FrontPage-IndexIgnore .htaccess */.?* *~ *# */HEADER* */README* */_vti*
<Limit GET POST>
#The next line modified by DenyIP
order allow,deny
#The next line modified by DenyIP
#deny from all
allow from all
</Limit>
<Limit PUT DELETE>
order deny,allow
deny from all
</Limit>
AuthName www.mydomain.com
AuthUserFile /home/user/public_html/_vti_pvt/service.pwd
AuthGroupFile /home/user/public_html/_vti_pvt/service.grp
<Files 403.shtml>
order allow,deny
allow from all
</Files>
deny from 69.111.170.194
deny from 64.124.85.
So, it removes the wild card. I guess you could just forget the wildcard alltogether and just leave the field blank. For someone who knows little about htaccess, myself (which I'm sure my host doesn't know much about either; he he ), I was glad IP Deny Manager took care of it. BTW - The above htaccess seems to keep them out good. I see exabot/becomebot attempting a crawl with 1 hit every so often; but its haulted.
Thanks again wilderness... :)
Not at the rate this thing is going at present.
This is all I see, each time. No crawl, just a link from which they might have come...because I'm listed on that page. <shrug> That should eliminate Log Spamming.
64.124.85.193 - - [21/Dec/2004:11:40:03 -0800] "GET /robots.txt HTTP/1.1" 200 1727 "-" "Mozilla/5.0 (compatible; BecomeBot/2.0beta; +http://www.become.com/webmasters.html)"
64.124.85.193 - - [21/Dec/2004:11:40:17 -0800] "GET / HTTP/1.1" 200 20407 "http:///PAGE_REMOVED.html" "Mozilla/5.0 (compatible; BecomeBot/2.0beta; +http://www.become.com/webmasters.html)"