WebHostingAce
Silver Pleskian
- Server operating system version
- AlmaLinux 8.10 (Cerulean Leopard)
- Plesk version and microupdate number
- Plesk Obsidian 18.0.71 Update #2
Hi everyone,
I’m currently experiencing heavy attacks from bots using Trident and Presto user agents.
At first, I tried adding these bots to the plesk-apache-badbot jail in Fail2Ban, but this quickly led to over 100,000 IP addresses being discovered.
Since that number is extremely high, I decided to configure and use the iptables-ipset-proto6-allports action in Fail2Ban to handle the blocking more efficiently.
My main questions are:
1. Why am I seeing such a large number of unique IPs?
2. Are these real IP addresses, or are the requests being spoofed somehow?
3. Is there a more effective approach for dealing with these kinds of botnets? (without the CloudFlare)
Any advice or insights would be greatly appreciated.
Thank you!
I’m currently experiencing heavy attacks from bots using Trident and Presto user agents.
At first, I tried adding these bots to the plesk-apache-badbot jail in Fail2Ban, but this quickly led to over 100,000 IP addresses being discovered.
Since that number is extremely high, I decided to configure and use the iptables-ipset-proto6-allports action in Fail2Ban to handle the blocking more efficiently.
My main questions are:
1. Why am I seeing such a large number of unique IPs?
2. Are these real IP addresses, or are the requests being spoofed somehow?
3. Is there a more effective approach for dealing with these kinds of botnets? (without the CloudFlare)
Any advice or insights would be greatly appreciated.
Thank you!