Forum Moderators: phranque
In the IIS-logfiles I can see that without exception these requests are generated by a browser, not a bot. Also, most of them have +ru in the browser string, which suggests they're from Russia.
Has anyone seen this before, and more importantly - does anyone have any advice as to how I could stop this?
Some examples:
2008-01-14 16:02:40 <ip removed> GET / - 80 - <ip removed> Mozilla/5.0+(Windows;+U;+Windows+NT+5.1;+ru;+rv:1.8.1.1)+Gecko/20061204+Firefox/2.0.0.1 - 403 0 195 4890
2008-01-14 16:02:40 <ip removed> GET / - 80 - <ip removed> Mozilla/5.0+(Windows;+U;+Windows+NT+5.1;+ru;+rv:1.8.1.1)+Gecko/20061204+Firefox/2.0.0.1 - 403 0 195 4890
2008-01-14 16:02:40 <ip removed> GET / - 80 - <ip removed> Mozilla/5.0+(Windows;+U;+Windows+NT+5.1;+ru;+rv:1.8.1.1)+Gecko/20061204+Firefox/2.0.0.1 - 403 0 195 4890
[edited by: physics at 8:09 pm (utc) on Jan. 14, 2008]
[edit reason] ips removed [/edit]
As I'm not too familiar with IIS, but somewhat familiar with Apache, look around to find a way to block by the subnet address, maybe blocking all of <ip removed>.* with a 403 status code (forbidden). Good luck, also, check out [webmasterworld.com...]
for IIS hints on blocking by address range.
[edited by: physics at 8:08 pm (utc) on Jan. 14, 2008]
the <ip removed> IP-number is my server, the other ones (<ips removed>) are from the Russians. And there are literally thousands of them, so blocking them is not an option.
Apart from that I would have to block them at an earlier stage, since blocking them in IIS would still drive their traffic to my site.
I just hope that by tomorrow they will have gotten weary and just stop...
[edited by: physics at 8:08 pm (utc) on Jan. 14, 2008]
I don't know the policy about naming vendors on this boards, being new around here, but if you PM me I'll give you a good name. Or if I'm allowed too, I'll post it here.
Thing is that it's also my test/demo server for ongoing development projects, and that's where my main pain lies, at the moment - apart from the fact that I'm paying for the darned thing without being able to use it at the moment.
I can understand why they'd want to attack sites of banks or other high-profile websites, but it's completely beyond me why they'd go for a server with marginal websites that serves maybe 100 pages a day...
Don't know about your host, but my host has an option to rent a personal hardware firewall between my dedicated server and the internet. That might be an option, although it could mean some downtime and new IP addresses for your server.
If the requests are mainly for one site, and they are hostname based, you could change the DNS settings for that one site to a non existent number (or to one of the attacking IPs causing the attack to backfire on them ;)) (this takes some time because their DNS cache has to timeout). Also shutting down that one domainname on your server might be an option. The traffic will still come in, but IIS will hopefully not need much resources to process them.
I could change the DNS settings, but that would be a temporary solution with the same level of effectiveness as shutting IIS down completely.
The other site being hit is my own main site, and without those two there's not much worth mentioning going on on that server.
Shutting down the site being hit worst was one of the first things I tried, with no discernable effect whatsoever, unfortunately...
Changing IP-addresses also wouldn't work since they're directly requesting '/index.php', which indicates they're not approaching the server based solely on IP-number, but rather through a URL...
Bugger!
Regarding why is this happening ... maybe someone typed the wrong .com into their ddos script!? Or maybe you're beating them in the serps?
In any case you may be able to block all traffic from that country for a while until this situation dies down. You may want to start shopping for a host who will help you with this.
Linux installations have the iptables kernel firewall on board, which can be easily programmed via the command line to ignore single or a group of IPs. Works flawlessly on my dedicated server because incomming requests are dropped in the earliest possible stage. There is practically no load on the server, only bandwidth saturation may occur.
Windows servers have about the same facility to block ranges of IPs. It is called "IP security policy management". If you're interested, I can send you a sticky with an URL where you can find how to configure it. I think it is not allowed to post the URL here.
@physics - we're talking about tens of thousands of IP's...that's a lot of companies!
@lammert: dankjewel. I won't be able to block them on the first digit alone, since 91.138.* is Ukraine, where traffic comes from, but 91.1.* is Germany, which I don't want to block.
Guess I'll have to check the IP2Country database...