How Can I Deny All Ip From China
Apr 10, 2009how can i deny all ip from china?
they want to ligin to my ssh but lfd ban their ip
how can i deny all ip from china?
they want to ligin to my ssh but lfd ban their ip
I edited the /etc/apf/deny.hosts_rules files, then removed all lines from the file and finally restarted apf so it can restart with no deny host listed. But that is not working... the file appears empty or again with the rules removed before.
iptables -L -n shows the same banned hosts as dropped.
I already tried.. remove the deny hosts IPs from the file, then ran "iptables -F", then "service iptables save", and finally restarted apf and the deny IPs still there
As you might know if you read my other thread I'm often looking for VPS servers (at the moment Linux only), based around the world.
This weeks challenge for me is a china/hong kong based VPS, nothing too fancy, its only going to be used for small websites and as a proxy service for when we run ranking reports for our SEO clients.
Requirements
- English support if possible, although we do have some Chinese speakers in house.
- 128mb ram, 2gb disk space, 20gb transfer/mo
- CentOS 5 preferred, but any system with a working Yum or similar will do.
Budget
up to €30 a month, but could go higher if i had to.
Payment
-for various reasons we cannot use paypal at the moment, so even if its just paypal credit card processing they won't let us use it. This is something we are looking to solve but its not my dept so i'm stuck with it.
- We can pay by Visa Credit or Visa Debit cards, and if we really had to, bank transfer, but I'm told transfers to china are sometimes very tricky to get right.
I have had a look through the VPS offers forum but most of the china-related posts are from 2006 or so and so aren't relevant anymore.
Does anyone have experiences with:
[url]
or with:
www.net.cn (Net.cn)
I'm searching for a good hosting service in mainland China...
I use geoip so that if ($country="CN") { die(); }
This works on my site. But for some reason I still get the occasional IP's through.
I looked at my Lighttpd server-status and I have 600 connections from 3 different IPs that come from China.
I typically use ./route add -host 222.221.81.3 reject as the way to block them, but it changes from time to time. The Chinese are using 90mbps of bandwidth and I want it to stop as they must be directly hotlinking my content.
How to null route large blocks from China? Please note I want to keep Hong Kong, Macau and Taiwan.
For my future Chinese Bonsai website I am considering several options for hosting and domain names. Until now I have a US and an Amsterdam hosting (English version in the US and the Dutch, French and German in Amsterdam).
As the Chinese version will be non-political I think I prefer to host it in mainland China. Does anyone here knows a good webhosting that is not too cheap? I need 100Mb and some GB's (I guess under 5GB should be ok) of bandwidth.
Furthermore, I am not sure what domain name to choose. I have 4 options:
1. the name in pinyin (normal text) .com
2. the name in pinyin .cn
3. the name in Chinese characters .com
3. the name in Chinese characters .cn
If I choose to take a .com, would it matter to have this domain name registered in the US? This is cheaper than in China I think; however, it is important to me that the website is seen by Baidu as 100% Chinese (does it matter where a domain name is registered?)
I used Hostgator but my website was blocked in China.
So do anyone know of any US web host that is NOT blocked in China ? For example, Dreamhost or any web host for that matter?
My customers are complaining that my web site is extremely slow in China. But I have never received any complain from outside China (I have talked to non-China users).
What could be the reason behind this? Or how can I find the root cause?
I have registered yayigarment.com with godaddy (2.5 weeks ago), and hosted with 50webs with a one liner to redirect to yayigarment.net
My customers from China get an invalid link when trying to surf to yayigarment.com
.CN - Domain names for China (irist.com), is now just $12.99
With China's recent accession to the World Trade Organization (WTO) the economy there is taking great strides towards global accessibility. .cn offers registrants the protection of a well-established brand name in what is certain to become one of the most lucrative marketplaces in the world, and begin making inroads into the Chinese marketplace.
irist . com/china-domain.php
I currently live in China and as most businesses in China do, they host outside of China because of the severe requirements of hosting in China are time consuming to accomplish.
I am currently hosting with godaddy.com and have been happy with them until now. This is the 2nd time my site has been blocked because my site is on a server with a porn site. They switched to a different server once now they refuse to do it again. I also suggested they offer porn-free servers (I would be willing to pay more) but they refused.
Now, I noticed that even godaddy.com is blocked from China. I really think they are missing out on Many business opportunities in China by not offering porn-free servers.
Are there any Chin hosting gurus out there than can tell the best 25 meg dedicated hosting in East China ?
View 1 Replies View RelatedMy server is getting a lot of spam robots registering as fake users into my forums (altho most emails are invalid
View 2 Replies View RelatedI'm trying to get a full rack co-location services in China or Hong Kong. Co-location in Singapore is starting to get expensive...
Per additional 1 Mbps cost about USD 150 onwards. It's not feasible for us anymore.
Anyone has any suggestions which countries is better? And from which IDC? So far Asia Netcom and China Telcom seems to be the better choice. No 2 tier suppliers, e.g. Pacific Internet, they get their co-location from the above too.
1U colo, 1 mbps, 1 amp power in major China cities
Must have premium, mulit-homed bandwidth, with great connectivity to the US
Must have local cable TV cross-connect via coax, s-video, etc.
Prefer remote reboot
Some or all of the following:
Shanghai, Beijing, Chongqing, Tianjin, Wuhan, Harbin, Shengyang , Guangzhou
OK to have colo and cctv cross-connect in one or more cities - you dont have to do them all.
We do NOT need colo without the cctv availability.
Will need a /30 address space.
1 year minimum contract
How can flush csf blocked ips? (csf.deny)
View 4 Replies View RelatedI want to ban complete range of an IP address. Lets say 123.123.123.12
Can I enter 123.123.0 to ban the range of IP addresses? Cpanel does not any info on blocking a range of IP addresses.
my iptables deny very very ips. how may i delete them?
View 7 Replies View RelatedOne of my client got DDOS on his website. He has visitor tracking module in his php script so he got almost 50,000 records during couple of hours. Normally he gets around 300 unique visitors per day but that DDOS added 50,000 records in tracking table. After extracting this data I got around 400 unique IPs.
Will this work if I added all these IPs in IP Deny Manager?
Will this stop DDOS from these IPs?
Will server not treat requests from these IPs as grabadge load?
Another question is from where these attackers got so many IPs? Definitely they pay to get IPs? how much they pay? Is this very easy to get so many IPS?
how can i deny all of ip instead 2 ip to access to some website?
because these are priv8 website and personal .
i thin that .htaccessis good.
can nany one creat it for me and ist good or use another method?
Completely new stuff for me so i have a few basic questions.
It all started after i've noticed a lot "/w00tw00t.at.ISC.SANS.DFind:" lines in log and after i've found they are random scanning by some hacker tool.
It is suggested to block IP's from where those attacks is comming by putting IP+s in host.deny.
Correct me what i am doing wrong as i keep seeing those scans after I've updated deny file.
I've edited hosts.deny like this:
ALL: 77.68.37.242, 89.19.2.58, 80.93.210.194
That is correct?
After that i've restarted sshd service but i still someone scanning my server from those IP's.
I have problems configuring some ports and rules on CSF on a cPanel server.
Port 37500 is used by a Java web app, so, i opened both tcp incoming and outgoing ports:
Code:
TCP_IN = "20,21,22,25,26,53,80,110,143,443,465,587,993,995,2082,2083,2086,2087,2095,2096,37500"
TCP_OUT = "20,21,22,25,26,37,43,53,80,110,113,443,587,2087,2089,2703,37500"
Then.. to allow access from the server IP and localhost, added this at csf.allow:
Code:
tcp:in:d=37500:s=127.0.0.1
tcp:in:d=37500:s=my.server.ip.address
csf.ignore:
Code:
127.0.0.1
my.server.ip.address
And to deny all access to the server on that specific port (except for the ones I whitelisted before), added this to csf.deny:
Code:
tcp:in:d=37500:s=0.0.0.0/0
Result = no one can connect to the server on that port, not even from the web app itself, it's not connecting to the port 37500.
How can I configure port 37500 to accept local connections (from the web server) and deny all external connections?
Yes, more ssh problems. I fixed it the last time. My IP was being block in "/etc/hosts.deny". So I removed my IP and BAM worked! I could login to SSH. Now today I get locked out AGAIN. I go in a look in "/etc/hosts.deny" my IP is not in there. So now I'm so confused and can't figure out whats going on....
View 12 Replies View RelatedI run a small hosting company in Spain. I have some dedicated servers in USA with Ensim control panel.
I have found some sendmail connections from spammers that use the accounts of my customers.
I want to know if I can deny connections to sendmail from all countries except Spain. This way most of foreigns spammers could not use the accounts of my customers to send spam.
My servers has Sendmail version 8.13.6.
What are the maximum number of entries that can go in hosts.deny? Will the server bog down the more entries that are in there? How many is a safe, reasonable number?
View 2 Replies View RelatedI have amassed a large number of IP addresses [both partial and whole] in my .htaccess file-- which I deny access to. I have two questions:
[1] Can a larger list effect server performance?
[2] MySQL databases seem to be ignoring the .htaccess list. Why would this happen?
Hello, I recently got myself into an unmanaged VPS package and I noticed in my log files, countless attempts to ssh into the system. After a bit of searching, fail2ban looked like a good way to ban the brute force attacks automatically.
My question is what should I configure it with? There's the option for iptables or host.deny. I've read that iptables are not fully supported under Virtuozzo but the stuff I've read are a bit dated. Are there still some issues with iptables under Virtuozzo?
What I'm using now:
*Virtuozzo 3 -not sure on exact version. Whatever SolarVPS is using.
*Signed up with centos4
*uname -r = 2.6.9-022stab078.14-enterprise
I designed one of my web services so that 'nobody' has to put commands to cron. Unfortunately this thing stops to work from time to time because "someone" is putting 'nobody' back to cron.deny file.
How to stop that?
Is there a way to prevent accessing the website using the domain.com/~username/
Currently on most (all?) cpanel hosting plans it's possible to access the site via [rl].
Maybe there is something to prevent that as it could cause very serious duplicate content issues.
Moreover, I think it's a global bug that affects millions of hosting accounts. Yahoo, for example, many times indexes wrong URLs because of that... In many situations, if I knew your cpanel username, I could link to it instead of your domain to remove your site from search engines..
How do you guys deny run of perl/bash scripts from /tmp, /var/tmp, /dev/shm? I've tried to build simple shell wrapper, but that's not a compromise if you run for example spamassassin on the same server (it needs direct io to/from perl binary). I'm looking intro some kind of binary wrapper or patch that will deny running perl scripts from public folders (also the same for shell scripts will be great). Any ideas or solutions?
If anyone interested in primitive shell wrapper code:
Code:
#!/bin/sh
ARGS=`echo $@ | grep -v "/tmp/"`
if [ "$ARGS" != "" ]; then
/usr/bin/perl.orig $ARGS;
fi