From: "Lewis G Rosenthal" Received: from [192.168.100.201] (account lgrosenthal@2rosenthals.com HELO [192.168.100.21]) by 2rosenthals.com (CommuniGate Pro SMTP 5.4.10) with ESMTPSA id 6241289 for ecs-isp@2rosenthals.com; Fri, 03 Feb 2023 23:03:42 -0500 To: eCS-ISP Subject: Interesting Apache block list Organization: Rosenthal & Rosenthal, LLC Message-ID: <63DDD91C.9060600@2rosenthals.com> Date: Fri, 3 Feb 2023 23:03:40 -0500 User-Agent: Mozilla/5.0 (OS/2; Warp 4.5; rv:38.0) Gecko/20100101 Firefox/38.0 SeaMonkey/2.35 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Hi, all... I've used a set of rewrite rules for sending bad bots into a black hole for some time, but the list is long outdated, and never was quite that complete, in the first place. I've just happened upon one which seems more promising. I thought I'd share the link here to get some oninions from the group: https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker As I've likely mentioned in the past, my snort flexibility is limited in the Sophos UTM, so some things which could probably be more easily done at the border, I need to mitigate a bit farther inside. Anyway, please feel free to comment. I haven't tested this under 2.2 or 2.4, as yet. -- Lewis ------------------------------------------------------------- Lewis G Rosenthal, CNA, CLP, CLE, CWTS, EA Rosenthal & Rosenthal, LLC www.2rosenthals.com visit my IT blog www.2rosenthals.net/wordpress -------------------------------------------------------------