You will need to perform a manual modification of your nginX virtual host file to achieve this.

Add the following code to your nginX virtual host file to block the most common http user agents used for malicious purposes:

Use these rules at your own risk. If your site starts to behave unexpectedly you may need to adjust the code to suit your needs.
[ez_code]if ($http_user_agent ~* “(havij|libwww-perl|python|nikto|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner|%0A|%0D|%27|%3C|%3E|%00|^BlackWidow|^Bolt|CazoodleBot|^ChinaClaw|^Custo|^Default|^DIIbot|^DISCo|discobot|^eCatch|ecxi|^EirGrabber|^EmailCollector|^EmailSiphon|^EmailWolf|^ExtractorPro|^EyeNetIE|^FlashGet|^GetRight|^GetWeb!|^Go!Zilla|^Go-Ahead-Got-It|^GrabNet|^Grafula|GT::WWW|heritrix|^HMView|HTTP::Lite|HTTrack|ia_archiver|IDBot|id-search|id-search.org|^InterGET|^InternetSeer.com|IRLbot|^Java|^JetCar|^larbin|^LeechFTP|libwww|libwww-perl|^Link|LinksManager.com_bot|linkwalker|lwp-trivial|^Maxthon$|MFC_Tear_Sample|^microsoft.url|Microsoft|^Mozilla.*Indy|^Mozilla.*NEWT|^MSFrontPage|^Navroad|^NearSite|^NetAnts|^NetSpider|^NetZIP|^Nutch|^Octopus|^PageGrabber|panscient.com|^pavuk|PECL::HTTP|^PeoplePal|^pcBrowser|PHPCrawl|PleaseCrawl|^psbot|^RealDownload|^ReGet|^Rippers|SBIder|^SeaMonkey$|^sitecheck.internetseer.com|^SiteSnagger|^SmartDownload|Snoopy|Steeler|^SuperBot|^SuperHTTP|^Surfbot|^tAkeOut|^Teleport|^Toata|URI::Fetch|urllib|User-Agent|^VoidEYE|webalta|^WebAuto|^[Ww]eb[Bb]andit|WebCollage|^WebCopier|^WebFetch|^WebLeacher|^WebReaper|^WebSauger|^WebStripper|^WebWhacker|^WebZIP|^Widow|^WWW-Mechanize|^WWWOFFLE|zermelo|^Zeus|^Zeus.*Webster|ZyBorg)”){return 403;}[/ez_code]
1729    NginX  
Total 0 Votes:
0

Tell us! How can we improve this post?

+ = Verify Human or Spambot ?

Add A Knowledge Base Question!