Forum Moderators: open
but they seem to be happy munching on their daily dose of 403s.
Wonder if using 410s would work better instead?
FWIW, you should change that (Google) IP to:
!^66\.249\.(6[4-9]|[78][0-9]|9[0-5])\.
!^(64\.(68\.[89][0-9]|233\.1[6-9][0-9])|66\.249\.[6-9][0-9]|72\.14\.[12][0-9][0-9]|74\.125|209\.85\.[12][0-9][0-9]|216\.239\.[3-6][0-9])\. It's a waste of time listing botnet IPs
How many separate IPs can you block before it starts noticeably slowing down your server?
How many separate IPs can you block before it starts noticeably slowing down your server?
Say you keep piling on the 403s until you're blocking something in every other /16. 256 * 128 = over 30,000 lines that the server has to plow through on every single request. How much time will that add?
block the bad guys (by whatever means) prior to the rewrites, redirects, parameter resolves, error directives, etc.
Problem is, the cleanest and simplest way to block is by CIDR numbers. That's core, so it comes after everything else. Does it make any difference if you put your most-likely-to-be-blocked ranges first, or does the server still have to read the whole rest of the list even after it has met a "Deny from" directive?