My boards got hit pretty hard in late November, early December but the aggressive bots mentioned in the John Large article. Implementing his suggestions completely resolved the problem for us and resource use and traffic returned back to normal.CGI1984 wrote: ↑Sat Apr 25, 2020 6:55 am The following post titled “Blocking aggressive Chinese crawlers/scrapers/bots" also has a number of user comments where they reference the Bytespider user agent: https://www.johnlarge.co.uk/blocking-ag ... pers-bots/
John Large wrote:Tue Mar 17, 2020 3:01 pmtry adding all of this code to the very end of you .htaccess file
I’m looking for the most efficient way of blocking without sacrificing page load speeds & TTFB. This way (so far) seems a little more efficient. If you need to add a line for another user agent it should be self-explanatory – just pick a section of text from the user agent which appears to be unique to that particular bot and add that text to another line in the same format.Code: Select all
BrowserMatchNoCase "libwww-perl" bad_bot BrowserMatchNoCase "wget" bad_bot BrowserMatchNoCase "LieBaoFast" bad_bot BrowserMatchNoCase "Mb2345Browser" bad_bot BrowserMatchNoCase "zh-CN" bad_bot BrowserMatchNoCase "MicroMessenger" bad_bot BrowserMatchNoCase "zh_CN" bad_bot BrowserMatchNoCase "Kinza" bad_bot BrowserMatchNoCase "Bytespider" bad_bot BrowserMatchNoCase "Baiduspider" bad_bot BrowserMatchNoCase "Sogou" bad_bot BrowserMatchNoCase "Datanyze" bad_bot BrowserMatchNoCase "AspiegelBot" bad_bot BrowserMatchNoCase "adscanner" bad_bot BrowserMatchNoCase "serpstatbot" bad_bot BrowserMatchNoCase "spaziodat" bad_bot BrowserMatchNoCase "undefined" bad_bot Order Deny,Allow Deny from env=bad_bot
Code: Select all
<Limit GET HEAD POST>
order allow,deny
allow from all
deny from 1.2.3.4
</Limit>
BrowserMatchNoCase "libwww-perl" bad_bot
BrowserMatchNoCase "wget" bad_bot
BrowserMatchNoCase "LieBaoFast" bad_bot
BrowserMatchNoCase "Mb2345Browser" bad_bot
BrowserMatchNoCase "zh-CN" bad_bot
BrowserMatchNoCase "MicroMessenger" bad_bot
BrowserMatchNoCase "zh_CN" bad_bot
BrowserMatchNoCase "Kinza" bad_bot
BrowserMatchNoCase "Bytespider" bad_bot
BrowserMatchNoCase "Baiduspider" bad_bot
BrowserMatchNoCase "Sogou" bad_bot
BrowserMatchNoCase "Datanyze" bad_bot
BrowserMatchNoCase "AspiegelBot" bad_bot
BrowserMatchNoCase "adscanner" bad_bot
BrowserMatchNoCase "serpstatbot" bad_bot
BrowserMatchNoCase "spaziodat" bad_bot
BrowserMatchNoCase "undefined" bad_bot
Order Deny,Allow
Deny from env=bad_bot
Code: Select all
<Limit GET HEAD POST>
allow from all
deny from 1.2.3.4
BrowserMatchNoCase "libwww-perl" bad_bot
BrowserMatchNoCase "wget" bad_bot
BrowserMatchNoCase "LieBaoFast" bad_bot
BrowserMatchNoCase "Mb2345Browser" bad_bot
BrowserMatchNoCase "zh-CN" bad_bot
BrowserMatchNoCase "MicroMessenger" bad_bot
BrowserMatchNoCase "zh_CN" bad_bot
BrowserMatchNoCase "Kinza" bad_bot
BrowserMatchNoCase "Bytespider" bad_bot
BrowserMatchNoCase "Baiduspider" bad_bot
BrowserMatchNoCase "Sogou" bad_bot
BrowserMatchNoCase "Datanyze" bad_bot
BrowserMatchNoCase "AspiegelBot" bad_bot
BrowserMatchNoCase "adscanner" bad_bot
BrowserMatchNoCase "serpstatbot" bad_bot
BrowserMatchNoCase "spaziodat" bad_bot
BrowserMatchNoCase "undefined" bad_bot
Order Deny,Allow
Deny from env=bad_bot
</Limit>
Code: Select all
BrowserMatchNoCase "libwww-perl" bad_bot
BrowserMatchNoCase "wget" bad_bot
BrowserMatchNoCase "LieBaoFast" bad_bot
BrowserMatchNoCase "Mb2345Browser" bad_bot
BrowserMatchNoCase "zh-CN" bad_bot
BrowserMatchNoCase "MicroMessenger" bad_bot
BrowserMatchNoCase "zh_CN" bad_bot
BrowserMatchNoCase "Kinza" bad_bot
BrowserMatchNoCase "Bytespider" bad_bot
BrowserMatchNoCase "Baiduspider" bad_bot
BrowserMatchNoCase "Sogou" bad_bot
BrowserMatchNoCase "Datanyze" bad_bot
BrowserMatchNoCase "AspiegelBot" bad_bot
BrowserMatchNoCase "adscanner" bad_bot
BrowserMatchNoCase "serpstatbot" bad_bot
BrowserMatchNoCase "spaziodat" bad_bot
BrowserMatchNoCase "undefined" bad_bot
Order Deny,Allow
Deny from env=bad_bot
<Limit GET HEAD POST>
order allow,deny
allow from all
deny from 1.2.3.4
</Limit>
Hello I am getting the same problem, can you please let me know what you added in the ACP which will hopefully also resolve my issue too.
Code: Select all
# DENY ACCESS TO amazonaws.com
# Apache 2.2
Order Allow,Deny
Allow from all
Deny from amazonaws.com
# Apache 2.4+
<RequireAll>
Require all granted
Require not host amazonaws.com
</RequireAll>
This worked for me, thank you
They will not do a thingMick wrote: ↑Fri Jun 23, 2023 8:18 am You can also report them to Amazon AWS, they take action pretty quickly I’m led to believe.
See: viewtopic.php?t=2642376
a3035oc_web wrote: ↑Wed May 24, 2023 10:24 am Reported it to my hosting company but they didn't know much more that I did. I added entries to robots.txt and also used the robots/spiders entries in phpbb as well as blocking some of the common IP ranges that it was showing. But even then I was often seeing 6 or 7 anonymous entries in "Who's online".
So reported possible abuse to AmazonAWS and slowly the traffic dropped off and now I'm not seeing any (but then I don't spend all my time monitoring who is online!).
I'm assuming they had a runaway web crawler or someone was abusing their services ..