You will need to perform a manual modification of your nginX virtual host file to achieve this.
Add the following code to your nginX virtual host file to block the most common http user agents used for malicious purposes:
Use these rules at your own risk. If your site starts to behave unexpectedly you may need to adjust the code to suit your needs.
[ez_code]if ($http_user_agent ~* “(havij|libwww-perl|python|nikto|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner|%0A|%0D|%27|%3C|%3E|%00|^BlackWidow|^Bolt|CazoodleBot|^ChinaClaw|^Custo|^Default|^DIIbot|^DISCo|discobot|^eCatch|ecxi|^EirGrabber|^EmailCollector|^EmailSiphon|^EmailWolf|^ExtractorPro|^EyeNetIE|^FlashGet|^GetRight|^GetWeb!|^Go!Zilla|^Go-Ahead-Got-It|^GrabNet|^Grafula|GT::WWW|heritrix|^HMView|HTTP::Lite|HTTrack|ia_archiver|IDBot|id-search|id-search.org|^InterGET|^InternetSeer.com|IRLbot|^Java|^JetCar|^larbin|^LeechFTP|libwww|libwww-perl|^Link|LinksManager.com_bot|linkwalker|lwp-trivial|^Maxthon$|MFC_Tear_Sample|^microsoft.url|Microsoft|^Mozilla.*Indy|^Mozilla.*NEWT|^MSFrontPage|^Navroad|^NearSite|^NetAnts|^NetSpider|^NetZIP|^Nutch|^Octopus|^PageGrabber|panscient.com|^pavuk|PECL::HTTP|^PeoplePal|^pcBrowser|PHPCrawl|PleaseCrawl|^psbot|^RealDownload|^ReGet|^Rippers|SBIder|^SeaMonkey$|^sitecheck.internetseer.com|^SiteSnagger|^SmartDownload|Snoopy|Steeler|^SuperBot|^SuperHTTP|^Surfbot|^tAkeOut|^Teleport|^Toata|URI::Fetch|urllib|User-Agent|^VoidEYE|webalta|^WebAuto|^[Ww]eb[Bb]andit|WebCollage|^WebCopier|^WebFetch|^WebLeacher|^WebReaper|^WebSauger|^WebStripper|^WebWhacker|^WebZIP|^Widow|^WWW-Mechanize|^WWWOFFLE|zermelo|^Zeus|^Zeus.*Webster|ZyBorg)”){return 403;}[/ez_code]
1729 NginX
Total 0 Votes:
0
0