Forum Moderators: open
That includes 193.106.136.0/22
Once you have blocked server farms, look at the browser/robot header fields and analyse them carefully - including, of course, the UA.
It is very difficult (but not impossible) to forge an IP. More likely is a bot accessing via a proxy.
One of the helpful things in following up each botnet IP is that several of them resolve to server farms, which can then be added as blocked ranges.
If you really do not want Asian or Russian-bloc IPs
then you can add those at the same time.
Some web sites are not relevant to (eg) non-UK DSL users. I block, for example, most of the world to a UK-only shopping directory because I'm fed up rejecting idiots from Ukraine, Germany, USA, India etc who cannot read the large UK Only sign on the submission form.
I've also noticed almost-daily visits from 66.55.138.243 with an http_referer that includes trafficfaker.com . Are these visits somehow related to the Ukraine visitors, or could they signal the start of something more devious?
The vaaaaaaaaast majority of the botnet hits I get are PHP exploits. I don't run PHP so any URI with "php" in it gets 403'd.
RewriteRule (.*) /script.php?param=$1 [L] (.*) is the wrong RegEx pattern here.
66.55.128.0/19
I doubt many humans download anything they can't use.
I suspect the Ukrainian scrapes you are getting is not human browsing but bots/botnets.
Not everything that comes from google SERPS is human but I take your point. Whether it's a problem would seem to depend on the number of downloads? If it's only for MAC then bar MSIE and other Windows UAs - although firefox and one or two others are perfectly ok on MAC (and safer than safari). It's easy enough to detect the UA and not show the link on the page.