Go Back   vb.org Archive > vBulletin 4 Discussion > vB4 General Discussions
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Display Modes
  #1  
Old 01-31-2015, 06:23 AM
psyhyatr psyhyatr is offline
 
Join Date: Feb 2013
Posts: 16
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default Botnet attack

how i can block this shit?? i have 2200 bots online and this get down my site because overloading hosting server..

p.s. sry for my english
Reply With Quote
  #2  
Old 01-31-2015, 07:24 AM
Dave Dave is offline
 
Join Date: May 2010
Posts: 2,583
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

You can try this https://vborg.vbsupport.ru/showthread.php?t=268208.
Do you happen to know what kind of bots? What's the useragent of those bots?
Reply With Quote
  #3  
Old 01-31-2015, 02:00 PM
edgeless edgeless is offline
 
Join Date: Mar 2013
Posts: 115
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

If the first 2 or 3 octets of the unwanted clients' IPs are always the same, you can ban the IP range via your vBulletin ACP. For example, if a large number of the bots/spiders are using IPs that begin with 188.165 ... you simply go to ACP > Settings > Options > User Banning Options and add 188.165 to the Banned IP Addresses list and click the Save button. It will take a while before the bot instances vanish from your Who's Online list since they have already established a connection to your server. But once they drop off they won't be able to reconnect using the same IP range.

Another option to try a user agent banning add-on like the one Dave suggested, but that's not likely to work too well if most of the offending bots are connecting as "Guest". If an add-on is banning by user agent and you tell it to ban all "Guest" connections, then it would presumably keep all unregistered users from connecting to your forum site. And that likely wouldn't be a very good situation.

Yet another option is to ban the bots manually by user agent. To do this, create (or edit if it allready exists) a robots.txt file in your forum's root directory. Within that file, add the exact user agents that you wish to ban, like so:

Quote:
User-agent: Baiduspider
Disallow: /

User-agent: Baiduspider-mobile
Disallow: /

User-agent: Baiduspider-image
Disallow: /

User-agent: Baiduspider-video
Disallow: /

User-agent: Baiduspider-news
Disallow: /

User-agent: Baiduspider-favo
Disallow: /

User-agent: Baiduspider-ads
Disallow: /

User-agent: Baiduspider-cpro
Disallow: /
then save the file. This will ban all of the Baiduspider user agent groups listed. I expect that's what the add-on suggested by Dave is actually doing.

The last option is only possible if you have root access to the hosting server (dedi or vps). That would be to ban the offending IP ranges at your operating system's filtering/firewall system level. If you can do that, your forum software won't ever see the connection attempts that you've blocked.
Reply With Quote
  #4  
Old 02-05-2015, 07:53 AM
psyhyatr psyhyatr is offline
 
Join Date: Feb 2013
Posts: 16
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

thank you very much to all ! perfect !
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 10:37 PM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.03344 seconds
  • Memory Usage 2,185KB
  • Queries Executed 13 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)ad_showthread_firstpost
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (1)bbcode_quote
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (4)post_thanks_box
  • (4)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (4)post_thanks_postbit_info
  • (4)postbit
  • (4)postbit_onlinestatus
  • (4)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete