• Resolved bckcx2

    (@bckcx2)


    I am monitoring a website remotely using curl. How can I easily whitelist my remote server’s IP. I have seen posts and I have tried but I just cant get it right.

    Any help would be appreciated.

    Below is from the log.

    [403 GET / HEAD Request: February 11, 2015 – 4:59 am]
    Event Code: BFHS – Blocked/Forbidden Hacker or Spammer
    Solution: N/A – Hacker/Spammer Blocked/Forbidden
    REMOTE_ADDR: xx.xx.xxx.xxx
    Host Name: ec2-xx-xx-xxx-xxx.compute-1.amazonaws.com
    SERVER_PROTOCOL: HTTP/1.1
    HTTP_CLIENT_IP:
    HTTP_FORWARDED:
    HTTP_X_FORWARDED_FOR:
    HTTP_X_CLUSTER_CLIENT_IP:
    REQUEST_METHOD: GET
    HTTP_REFERER:
    REQUEST_URI: /
    QUERY_STRING:
    HTTP_USER_AGENT: Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)

    https://www.ads-software.com/plugins/bulletproof-security/

Viewing 7 replies - 1 through 7 (of 7 total)
  • Plugin Author AITpro

    (@aitpro)

    This Security Log entry does not look like it is related to blocking cURL. Typically cURL code to monitor something will use a HEAD Request method. So I will assume what is being blocked is a HEAD Request. To allow/whitelist all HEAD Request see this forum topic: https://forum.ait-pro.com/forums/topic/whitelist-bots-allow-good-bots-to-make-a-head-request/

    If this does not solve the problem then I need to see the cURL code you are using to make the Request.

    Plugin Author AITpro

    (@aitpro)

    Is this issue/problem resolved?

    Thread Start Date: 2-10-2015 to 2-11-2015
    Current Date: 2-12-2015

    Plugin Author AITpro

    (@aitpro)

    Is this issue/problem resolved?

    Thread Start Date: 2-10-2015 to 2-11-2015
    Current Date: 2-16-2015

    Thread Starter bckcx2

    (@bckcx2)

    Issue is resolved. I named my bot and then used the code here to resolve:
    https://forum.ait-pro.com/forums/topic/whitelist-bots-allow-good-bots-to-make-a-head-request/

    Thank you.

    Plugin Author AITpro

    (@aitpro)

    Great. Thanks.

    seektruth

    (@seektruth)

    I’ve been reading a lot of info on allowing head 403 requests in this forum on solution to remove all HEAD 403 Request blocks.
    But I currently do get requests from bad addresses, and would like to keep blocking them. Can I use the following code in Custom to allow a specific IP?

    # REQUEST METHODS FILTERED
    # If you want to allow HEAD Requests use BPS Custom Code and
    # remove/delete HEAD| from the Request Method filter.
    # Example: RewriteCond %{REQUEST_METHOD} ^(TRACE|DELETE|TRACK|DEBUG) [NC]
    # The TRACE, DELETE, TRACK and DEBUG Request methods should never be removed.
    RewriteCond %{REQUEST_METHOD} ^(HEAD|TRACE|DELETE|TRACK|DEBUG) [NC]
    RewriteCond %{REMOTE_ADDR} !^(74.86.158.107) [NC] <– Could I just change this to the correct address?
    RewriteRule ^(.*)$ – [F]

    as you posted here: https://forum.ait-pro.com/forums/topic/split-uptimerobot-whitelist-uptimerobot-bot/page/2/#post-7168

    Thank you,

    Plugin Author AITpro

    (@aitpro)

    Yes. That should work. The rules work together to create this “and” condition: if the Request Method is HEAD or TRACE or DELETE or TRACK or DEBUG and the IP address is NOT xxx.xxx.xxx.xxx then block/forbid the Request.

Viewing 7 replies - 1 through 7 (of 7 total)
  • The topic ‘Whitelist Monitoring IP’ is closed to new replies.