My boards got hit pretty hard in late November, early December but the aggressive bots mentioned in the John Large article. Implementing his suggestions completely resolved the problem for us and resource use and traffic returned back to normal.CGI1984 wrote: Sat Apr 25, 2020 6:55 am The following post titled “Blocking aggressive Chinese crawlers/scrapers/bots" also has a number of user comments where they reference the Bytespider user agent: https://www.johnlarge.co.uk/blocking-ag ... pers-bots/
John Large wrote:Tue Mar 17, 2020 3:01 pmtry adding all of this code to the very end of you .htaccess file
I’m looking for the most efficient way of blocking without sacrificing page load speeds & TTFB. This way (so far) seems a little more efficient. If you need to add a line for another user agent it should be self-explanatory – just pick a section of text from the user agent which appears to be unique to that particular bot and add that text to another line in the same format.Code: Select all
BrowserMatchNoCase "libwww-perl" bad_bot BrowserMatchNoCase "wget" bad_bot BrowserMatchNoCase "LieBaoFast" bad_bot BrowserMatchNoCase "Mb2345Browser" bad_bot BrowserMatchNoCase "zh-CN" bad_bot BrowserMatchNoCase "MicroMessenger" bad_bot BrowserMatchNoCase "zh_CN" bad_bot BrowserMatchNoCase "Kinza" bad_bot BrowserMatchNoCase "Bytespider" bad_bot BrowserMatchNoCase "Baiduspider" bad_bot BrowserMatchNoCase "Sogou" bad_bot BrowserMatchNoCase "Datanyze" bad_bot BrowserMatchNoCase "AspiegelBot" bad_bot BrowserMatchNoCase "adscanner" bad_bot BrowserMatchNoCase "serpstatbot" bad_bot BrowserMatchNoCase "spaziodat" bad_bot BrowserMatchNoCase "undefined" bad_bot Order Deny,Allow Deny from env=bad_bot
Code: Select all
<Limit GET HEAD POST>
order allow,deny
allow from all
deny from 1.2.3.4
</Limit>
BrowserMatchNoCase "libwww-perl" bad_bot
BrowserMatchNoCase "wget" bad_bot
BrowserMatchNoCase "LieBaoFast" bad_bot
BrowserMatchNoCase "Mb2345Browser" bad_bot
BrowserMatchNoCase "zh-CN" bad_bot
BrowserMatchNoCase "MicroMessenger" bad_bot
BrowserMatchNoCase "zh_CN" bad_bot
BrowserMatchNoCase "Kinza" bad_bot
BrowserMatchNoCase "Bytespider" bad_bot
BrowserMatchNoCase "Baiduspider" bad_bot
BrowserMatchNoCase "Sogou" bad_bot
BrowserMatchNoCase "Datanyze" bad_bot
BrowserMatchNoCase "AspiegelBot" bad_bot
BrowserMatchNoCase "adscanner" bad_bot
BrowserMatchNoCase "serpstatbot" bad_bot
BrowserMatchNoCase "spaziodat" bad_bot
BrowserMatchNoCase "undefined" bad_bot
Order Deny,Allow
Deny from env=bad_bot
Code: Select all
<Limit GET HEAD POST>
allow from all
deny from 1.2.3.4
BrowserMatchNoCase "libwww-perl" bad_bot
BrowserMatchNoCase "wget" bad_bot
BrowserMatchNoCase "LieBaoFast" bad_bot
BrowserMatchNoCase "Mb2345Browser" bad_bot
BrowserMatchNoCase "zh-CN" bad_bot
BrowserMatchNoCase "MicroMessenger" bad_bot
BrowserMatchNoCase "zh_CN" bad_bot
BrowserMatchNoCase "Kinza" bad_bot
BrowserMatchNoCase "Bytespider" bad_bot
BrowserMatchNoCase "Baiduspider" bad_bot
BrowserMatchNoCase "Sogou" bad_bot
BrowserMatchNoCase "Datanyze" bad_bot
BrowserMatchNoCase "AspiegelBot" bad_bot
BrowserMatchNoCase "adscanner" bad_bot
BrowserMatchNoCase "serpstatbot" bad_bot
BrowserMatchNoCase "spaziodat" bad_bot
BrowserMatchNoCase "undefined" bad_bot
Order Deny,Allow
Deny from env=bad_bot
</Limit>
Code: Select all
BrowserMatchNoCase "libwww-perl" bad_bot
BrowserMatchNoCase "wget" bad_bot
BrowserMatchNoCase "LieBaoFast" bad_bot
BrowserMatchNoCase "Mb2345Browser" bad_bot
BrowserMatchNoCase "zh-CN" bad_bot
BrowserMatchNoCase "MicroMessenger" bad_bot
BrowserMatchNoCase "zh_CN" bad_bot
BrowserMatchNoCase "Kinza" bad_bot
BrowserMatchNoCase "Bytespider" bad_bot
BrowserMatchNoCase "Baiduspider" bad_bot
BrowserMatchNoCase "Sogou" bad_bot
BrowserMatchNoCase "Datanyze" bad_bot
BrowserMatchNoCase "AspiegelBot" bad_bot
BrowserMatchNoCase "adscanner" bad_bot
BrowserMatchNoCase "serpstatbot" bad_bot
BrowserMatchNoCase "spaziodat" bad_bot
BrowserMatchNoCase "undefined" bad_bot
Order Deny,Allow
Deny from env=bad_bot
<Limit GET HEAD POST>
order allow,deny
allow from all
deny from 1.2.3.4
</Limit>
Hello I am getting the same problem, can you please let me know what you added in the ACP which will hopefully also resolve my issue too.CGI1984 wrote: Sat Apr 25, 2020 6:55 am So we created a Spider/Robot entry for it in ACP and deactivated the Bytespider user agent and it stopped the attack. I doubt it will be a problem that we deactivated it as I don't imagine any legitimate user agents will be using this same bot name.
Code: Select all
# DENY ACCESS TO amazonaws.com
# Apache 2.2
Order Allow,Deny
Allow from all
Deny from amazonaws.com
# Apache 2.4+
<RequireAll>
Require all granted
Require not host amazonaws.com
</RequireAll>
This worked for me, thank youCGI1984 wrote: Mon Apr 27, 2020 8:59 am I just decided to add it to the .htaccess file as follows in conjunction with the IP blocks we have. So far so good and no errors loading the site as far as
<snip>
They will not do a thingMick wrote: Fri Jun 23, 2023 8:18 am You can also report them to Amazon AWS, they take action pretty quickly I’m led to believe.
See: viewtopic.php?t=2642376
a3035oc_web wrote: Wed May 24, 2023 10:24 am Reported it to my hosting company but they didn't know much more that I did. I added entries to robots.txt and also used the robots/spiders entries in phpbb as well as blocking some of the common IP ranges that it was showing. But even then I was often seeing 6 or 7 anonymous entries in "Who's online".
So reported possible abuse to AmazonAWS and slowly the traffic dropped off and now I'm not seeing any (but then I don't spend all my time monitoring who is online!).
I'm assuming they had a runaway web crawler or someone was abusing their services ..