Discover ip ddos attack program download, include the articles, news, trends, analysis and practical advice about ip ddos attack program download on alibabacloud.com
ipsec static add filterlist name= deny list
REM add filter to IP filter list (allow Internet access)
netsh ipsec static add filter filterlist= allow List srcaddr=me dstaddr=any description=dns access protocol=udp mirrored=yes dstport= 53
REM add filter to IP filter list (no one else to access)
netsh ipsec static add filter filterlist= deny list Srcaddr=any dstaddr=me description= others to me any access pr
Preface
As in the real world, the Internet is full of intrigue. Website DDoS attacks have become the biggest headache for webmasters. In the absence of hardware protection, finding a software alternative is the most direct method. For example, iptables is used, but iptables cannot be automatically blocked and can only be manually shielded. Today we are talking about a software that can automatically block the
suddenly rise, looked at the ranking, "Wu Move the Universe" This word incredibly to the Baidu home page, so in the article inserted links, many sites to collect, get a lot of outside the chain.
By March, the site incredibly to the second home page Baidu, although only persisted for three days, immediately fell to the fifth, but those days every day has 100,000 IP, at that time cut a map (with the plug-in of shielding ads, so no promotional links).
This function is used to count how many times each visitor has visited in a short period of time, and returns true if the number of times limit is exceeded, after which you can use PHP to call Linux iptables for blocking operations.I've used several DDoS-like tools to actually test it, and it works really well.By the way, I use files in the code to record the visitor's IP and time, it is best not using the
1. Limit the maximum number of IP connections to a 80-port connection to 10, which can be customized to modify.
The code is as follows
Copy Code
Iptables-i input-p TCP--dport 80-m connlimit--connlimit-above DROP
2. Use the recent module to limit the number of new requests connected to the same IP time, recent more features please refer to: Iptables Module recent applic
to 9-25 times per second, IP every 1-6 hours, and the IP and previous records are not duplicated. In this way, the Web site memory will suddenly be too large, light, and the other is to bring great instability to the network. Individual IP is sealed has been, I tried all the solution, a solution to a number of IP at t
, such as the discovery of the gateway MAC address by malicious program tampering, will be alerted and automatically repaired to maintain a smooth network and communication security;7. Active defense. To maintain communication with the gateway, notify the correct MAC address of the gateway, in order to keep the network smooth and communication security;8. Track the attackers. Automatically lock the attacker's IP
to 9-25 times per second, IP every 1-6 hours, and the IP and previous records are not duplicated. In this way, the Web site memory will suddenly be too large, light, and the other is to bring great instability to the network. Individual IP is sealed has been, I tried all the solution, a solution to a number of IP at t
the Turkish American program has been arrested
94.54.37.54 -- 02:44:07 --/1096 the Turkish American program has been arrested
95.14.1.97 -- 08:30:10 --/167 Turkey United States
95.15.248.177 -- 11:14:54 --/1454 Turkish American program caught
A total of 125008 times, 172 times faster than 15 seconds, only 9266 times.
This table is bad enough. Our website has bee
'============================
'Apsara stack anti-CC attack ASP
Program Plug-ins
'We recommend that you do not modify other content except the parameter content that must be modified.
'If you need to report errors or submit comments, you can contact "genuine Apsara stack" in the out-of-date (im286.com"
'============================
Dim fycc_19, fycc_20, fycc_21, fycc_05Dim fycc_18
Fycc_05 = ""'Cclog.t
'==================
' Feiyun anti-CC attack ASP Program plugin
' suggest that you do not modify other content except the parameter content that must be modified
' If you need feedback error or submit comments, you can go to the outdated (im286.com) Contact "Genuine Feiyun"
'==================
Dim fycc_19,fycc_20,fycc_21,fycc_05
Dim fycc_18
Fycc_05= ""
' CCLog.txt store the path folder! You need to create
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.