Blocking tens of thousands of IP's

Rainer Duffner rainer at ultra-secure.de
Tue Nov 1 22:41:24 UTC 2016


> Am 01.11.2016 um 23:35 schrieb Cox, Eric S <eric.cox at kroger.com>:
> 
> Currently we track all access logs realtime via an in house built log aggregation solution. Various algorithms are setup to detect said IPS whether it be by hit rate, country, known types of attacks etc. These IPS are typically identified within a few mins and we reload to banned list every 60 seconds. We just moved some services from apache where we were doing this without any noticable performance impact. Have this working in nginx but was looking for general suggestion on how to optimize if at all possible. 


Ah, if you already have the data pre-processed…

I’d move blocking to the host’s firewall, as suggested.

Long term, I want to do this (or at least be able to), too. 

We (MSP) have a rather large number of firewalls and telling the network-guys „Block this IP at all of them“ does not work (it would probably take them the better part of the day).
They don’t believe in automation...
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx/attachments/20161101/809dbca9/attachment.html>


More information about the nginx mailing list